Search Results

open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: June 25, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: July 24, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: October 6, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing te… more
Date: January 30, 2004
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Description: Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing techni… more
Date: September 16, 2004
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

Description: This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity inte… more
Date: October 17, 2003
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Partner: UNT Libraries Government Documents Department
open access

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Description: Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions:… more
Date: February 22, 2005
Creator: Fischer, Eric A.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. … more
Date: May 28, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. … more
Date: October 23, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal… more
Date: April 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congres… more
Date: May 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

Radiofrequency Spectrum Management

Description: The radio spectrum, a limited and valuable resource, is used for all forms of wireless communications including cellular telephony, paging, personal communications service, radio, and television broadcast, telephone radio relay, aeronautical and maritime radio navigation, and satellite command and control.
Date: April 23, 1998
Creator: Nunno, Richard M.
Partner: UNT Libraries Government Documents Department
open access

V-Chip and TV Ratings: Helping Parents Supervise Their Children's Television Viewing

Description: To assist parents in supervising the television viewing habits of their children, Congress included a provision in the Telecommunications Act of 1996 (P.L. 104-104) that television sets with screens 13 inches or larger sold in the United States be equipped with a "V-chip" to screen out objectionable programming. A V-chip is a computer chip that can detect program rating information that is transmitted with the television signal (broadcast or cable) and block the display of programs designated a… more
Date: April 14, 1998
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department
open access

E-Rate for Schools: Background on Telecommunications Discounts Through the Universal Service Fund

Description: Congressional Research Service (CRS) report entailing information about telecommunications discounts through the Universal Service Fund, in regards to E-rate for schools. Topics include, impacts on education, current level of access, available federal assistance, application and award process, etc..
Date: January 4, 2001
Creator: Stedman, James B. & Osorio-O'Dea, Patricia
Partner: UNT Libraries Government Documents Department
Back to Top of Screen