This system will be undergoing maintenance April 18th between 9:00AM and 12:00PM CDT.

Search Results

open access

State Taxation of Internet Transactions

Description: This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution.
Date: April 19, 2013
Creator: Maguire, Steven
Partner: UNT Libraries Government Documents Department
open access

The Obama Administration's Proposal to Establish a National Network for Manufacturing Innovation

Description: This report discusses the proposed creation of the National Network for Manufacturing Innovation (NNMI), which would help accelerate innovation and support manufacturing technology commercialization. The report includes an overview of the topic as well as discussion on the Administration's proposal, preliminary activities, legislative status, and issues for consideration.
Date: January 29, 2014
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department
open access

Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet

Description: This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Date: November 15, 2017
Creator: Elliott, Victoria L.
Partner: UNT Libraries Government Documents Department
open access

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department
open access

The Geospatial Data Act of 2018

Description: This report provides a summary and analysis of each section of the Geospatial Data Act of 2018 (GDA). It also discusses possible implications of the new law and issues for Congress.
Date: October 22, 2018
Creator: Folger, Peter
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issu… more
Date: May 2, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

OPM Data Breach: Personnel Security Background Investigation Data

Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Date: July 24, 2015
Creator: Christensen, Michelle D.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share informati… more
Date: July 20, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress, such as how legislative and oversight roles can bolster U.S. law enforcement's abilities to confront modern-day crime, including operations in cyberspace. It also examines whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: July 19, 2011
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Date: November 26, 2014
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Date: June 3, 2015
Creator: Weiss, N. E.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: April 3, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Description: This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 1… more
Date: March 20, 2014
Creator: Lanza, Emily M.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 2, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 22, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 30, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
Back to Top of Screen