This system will be undergoing maintenance Monday, January 23 from 8:00 AM to 12:00 PM CST.

  You limited your search to:

 Collection: Congressional Research Service Reports
Broadband Internet Access: Background and Issues

Broadband Internet Access: Background and Issues

Date: April 4, 2005
Creator: Gilroy, Angele A & Kruger, Lennard G
Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Date: April 1, 2005
Creator: Wilson, Clay
Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Contributing Partner: UNT Libraries Government Documents Department
Industrial Competitiveness and Technological Advancement: Debate over Government Policy

Industrial Competitiveness and Technological Advancement: Debate over Government Policy

Date: April 1, 2005
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Navy Network-Centric Warfare Concept: Key Programs and Issues for Congress

Date: April 1, 2005
Creator: O'Rourke, Ronald
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Science and Technology Policy: Issues for the 109th Congress

Science and Technology Policy: Issues for the 109th Congress

Date: March 28, 2005
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Network Centric Warfare: Background and Oversight Issues for Congress

Network Centric Warfare: Background and Oversight Issues for Congress

Date: March 18, 2005
Creator: Wilson, Clay
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Date: February 22, 2005
Creator: Fischer, Eric A
Description: Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
Contributing Partner: UNT Libraries Government Documents Department
Computer Services Personnel: Overtime Pay Under the Fair Labor Standards Act

Computer Services Personnel: Overtime Pay Under the Fair Labor Standards Act

Date: February 7, 2005
Creator: Whittaker, William G
Description: The Fair Labor Standards Act of 1938 (FLSA), as amended, is the primary federal statute in the area of minimum wages and overtime pay. Through administrative rulemaking, the Secretary of Labor has established two tests through which to define eligibility under the Section 13(a)(1) exemption: a duties test and an earnings test. In the 106th Congress, legislation was introduced by Representatives Andrews and Lazio that would have increased the scope of the exemption: first, by expanding the range of exempt job titles, and then, through a relative reduction in the value of the earnings threshold or test. For example, were the minimum wage increased to $6.15 per hour, as pending proposals would do, the value of the computer services exemption threshold would be 4.5 times the federal minimum wage. Ultimately, neither bill was enacted, but the issue has re-emerged as H.R. 1545 (Andrews) and H.R. 546 (Quinn).
Contributing Partner: UNT Libraries Government Documents Department
Internet Taxation: Issues and Legislation

Internet Taxation: Issues and Legislation

Date: February 3, 2005
Creator: Maguire, Steven & Noto, Nonna A.
Description: The Internet Tax Freedom Act (ITFA) placed a three-year moratorium on the ability of state and local governments to (1) impose new taxes on Internet access or (2) impose any multiple or discriminatory taxes on electronic commerce. The act grandfathered the state and local access taxes that were “... generally imposed and actually enforced prior to October 1, 1998 ....” This report discusses issues of state and local taxation of Internet transactions because commerce conducted by parties in different states over the Internet.
Contributing Partner: UNT Libraries Government Documents Department
Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Date: February 2, 2005
Creator: Kruger, Lennard G.
Description: This report provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Contributing Partner: UNT Libraries Government Documents Department
Internet Privacy: Overview and Pending Legislation

Internet Privacy: Overview and Pending Legislation

Date: January 27, 2005
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Lasers Aimed at Aircraft Cockpits: Background and Possible Options to Address the Threat to Aviation Safety and Security

Lasers Aimed at Aircraft Cockpits: Background and Possible Options to Address the Threat to Aviation Safety and Security

Date: January 26, 2005
Creator: Elias, Bartholomew
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Spyware: Background and Policy Issues for Congress

Spyware: Background and Policy Issues for Congress

Date: January 26, 2005
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
State Sales Taxation of Internet Transactions

State Sales Taxation of Internet Transactions

Date: January 11, 2005
Creator: Luckey, John R.
Description: This report examines state taxation of Internet transactions as well as efforts to achieve uniform state sales and use tax treatment.
Contributing Partner: UNT Libraries Government Documents Department
Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness

Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness

Date: January 10, 2005
Creator: Schacht, Wendy H
Description: In response to the foreign challenge in the global marketplace, the United States Congress has explored ways to stimulate technological advancement in the private sector. The government has supported various efforts to promote cooperative research and development activities among industry, universities, and the federal R&D establishment designed to increase the competitiveness of American industry and to encourage the generation of new products, processes, and services. Among the issues before Congress are whether joint ventures contribute to industrial competitiveness and what role, if any, the government has in facilitating such arrangements.
Contributing Partner: UNT Libraries Government Documents Department
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Date: January 10, 2005
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Technology Transfer: Use of Federally Funded Research and Development

Technology Transfer: Use of Federally Funded Research and Development

Date: January 10, 2005
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Privacy: Overview and Pending Legislation

Internet Privacy: Overview and Pending Legislation

Date: December 22, 2004
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Data Mining: An Overview

Data Mining: An Overview

Date: December 16, 2004
Creator: Seifert, Jeffrey W
Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Contributing Partner: UNT Libraries Government Documents Department
Broadband Internet Access: Background and Issues

Broadband Internet Access: Background and Issues

Date: October 27, 2004
Creator: Gilroy, Angele A & Kruger, Lennard G
Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Contributing Partner: UNT Libraries Government Documents Department
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Industrial Competitiveness and Technological Advancement: Debate Over Government Policy

Date: September 21, 2004
Creator: Schacht, Wendy H
Description: None
Contributing Partner: UNT Libraries Government Documents Department
"Spam": An Overview of Issues Concerning Commercial Electronic Mail

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Date: September 16, 2004
Creator: Smith, Marcia S
Description: Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Contributing Partner: UNT Libraries Government Documents Department
Internet Privacy: Overview and Pending Legislation

Internet Privacy: Overview and Pending Legislation

Date: September 14, 2004
Creator: Smith, Marcia S
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Immigration: A Guide to Internet Sources

Immigration: A Guide to Internet Sources

Date: September 9, 2004
Creator: Torreon, Barbara Salazar
Description: None
Contributing Partner: UNT Libraries Government Documents Department