You limited your search to:

 Collection: Congressional Research Service Reports
Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Date: March 11, 2004
Creator: Squassoni, Sharon
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Internet Taxation: Issues and Legislation in the 108th Congress

Internet Taxation: Issues and Legislation in the 108th Congress

Date: March 8, 2004
Creator: Maguire, Steven & Noto, Nonna A
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Legal Issues Related to Prescription Drug Sales on the Internet

Legal Issues Related to Prescription Drug Sales on the Internet

Date: March 5, 2004
Creator: Feder, Jody
Description: None
Contributing Partner: UNT Libraries Government Documents Department
State Sales Taxation of Internet Transactions

State Sales Taxation of Internet Transactions

Date: March 1, 2004
Creator: Luckey, John R
Description: None
Contributing Partner: UNT Libraries Government Documents Department
"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Date: January 30, 2004
Creator: Smith, Marcia S
Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
Contributing Partner: UNT Libraries Government Documents Department
Broadband Internet Access: Background and Issues

Broadband Internet Access: Background and Issues

Date: January 21, 2004
Creator: Gilroy, Angele A & Kruger, Lennard G
Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Contributing Partner: UNT Libraries Government Documents Department
Safe Harbor for Service Providers Under the Digital Millennium Copyright Act

Safe Harbor for Service Providers Under the Digital Millennium Copyright Act

Date: January 9, 2004
Creator: Yeh, Brian T & Jeweler, Robin
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Prescription Drug Importation and Internet Sales: A Legal Overview

Prescription Drug Importation and Internet Sales: A Legal Overview

Date: January 8, 2004
Creator: Feder, Jody
Description: None
Contributing Partner: UNT Libraries Government Documents Department
Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues

Election Reform and Electronic Voting Systems (DREs): Analysis of Security Issues

Date: November 4, 2003
Creator: Fischer, Eric A
Description: This report discusses several questions about voting-system security. To address these questions, this report begins with a description of the historical and policy context of the controversy. That is followed by an analysis of the issues in the broader context of computer security. The next section discusses several proposals that have been made for addressing those issues, and the last section discusses options for action that might be considered by policymakers.
Contributing Partner: UNT Libraries Government Documents Department
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Date: October 17, 2003
Creator: Wilson, Clay
Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Contributing Partner: UNT Libraries Government Documents Department