Search Results

open access

The Network for Manufacturing Innovation

Description: This report discusses the Revitalize American Manufacturing and Innovation Act of 2014 (RAMIA). RAMIA includes provisions authorizing the Commerce Department's National Institute of Standards and Technology (NIST), the Department of Energy, and other agencies to support the establishment of centers for manufacturing innovation, as well as establishing and providing for the operation of a Network for Manufacturing Innovation.
Date: January 8, 2015
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department
open access

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the sharing of cyberattack information by government with private companies, by private companies with the government, and among private companies. Sharing information with consumers is mentioned but is not the central focus of this report.
Date: February 23, 2015
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department
open access

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts invo… more
Date: December 15, 2014
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department
open access

Cyber Operations in DOD Policy and Plans: Issues for Congress

Description: This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out … more
Date: January 5, 2014
Creator: Theohary, Catherine A. & Harrington, Anne I.
Partner: UNT Libraries Government Documents Department
open access

State Taxation of Internet Transactions

Description: This report intends to clarify significant issues in the remote sales tax collection debate, beginning with a description of state and local sales and use taxes. Congress has a role in this issue because interstate commerce, in most cases, falls under the Commerce Clause of the Constitution.
Date: April 19, 2013
Creator: Maguire, Steven
Partner: UNT Libraries Government Documents Department
open access

The Obama Administration's Proposal to Establish a National Network for Manufacturing Innovation

Description: This report discusses the proposed creation of the National Network for Manufacturing Innovation (NNMI), which would help accelerate innovation and support manufacturing technology commercialization. The report includes an overview of the topic as well as discussion on the Administration's proposal, preliminary activities, legislative status, and issues for consideration.
Date: January 29, 2014
Creator: Sargent, John F., Jr.
Partner: UNT Libraries Government Documents Department
open access

Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet

Description: This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Date: November 15, 2017
Creator: Elliott, Victoria L.
Partner: UNT Libraries Government Documents Department
open access

House of Representatives Information Technology Management Issues: An Overview of the Effects on Institutional Operations, the Legislative Process, and Future Planning

Description: This report is an Overview of the effects on Institutional operations, the Legislative process, and future Planning related to House of Representatives Information Technology Management issues.
Date: April 2, 2003
Creator: Seifert, Jeffrey W. & Petersen, Jeffrey L.
Partner: UNT Libraries Government Documents Department
open access

Net Neutrality: Background and Issues

Description: This report discusses the continued debate amongst congressional policymakers regarding telecommunications reform. A major point of the ongoing discussion is whether action is needed to ensure unfettered access to the Internet.
Date: August 1, 2007
Creator: Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department
open access

Data Security and Breach Notification Legislation: Selected Legal Issues

Description: This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Date: December 28, 2015
Creator: Dolan, Alissa M.
Partner: UNT Libraries Government Documents Department
open access

The Geospatial Data Act of 2018

Description: This report provides a summary and analysis of each section of the Geospatial Data Act of 2018 (GDA). It also discusses possible implications of the new law and issues for Congress.
Date: October 22, 2018
Creator: Folger, Peter
Partner: UNT Libraries Government Documents Department
open access

“Junk E-mail”: An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail (“Spam”)

Description: This report discusses unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail.” Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic.
Date: November 6, 2001
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issu… more
Date: May 2, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime… more
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketc… more
Date: December 27, 2010
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity iss… more
Date: April 26, 2012
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

OPM Data Breach: Personnel Security Background Investigation Data

Description: This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Date: July 24, 2015
Creator: Christensen, Michelle D.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share informati… more
Date: July 20, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress, such as how legislative and oversight roles can bolster U.S. law enforcement's abilities to confront modern-day crime, including operations in cyberspace. It also examines whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: July 19, 2011
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department
open access

Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying

Description: This report discusses Internet crimes, such as cyberbullying, cyberharassment, and cyberstalking, along with the limitations of such laws in the current environment. While Congress, under the Commerce Clause, has authority to regulate the Internet, Internet "harassment" presents new challenges for legislators in terms of defining and prosecuting such activity.
Date: September 5, 2008
Creator: Smith, Alison M.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen