You limited your search to:

 Collection: Congressional Research Service Reports
Data Security: Protecting the Privacy of Phone Records
This report discusses recent legislative and regulatory efforts to protect the privacy of customer telephone records, and efforts to prevent the unauthorized use, disclosure, or sale of such records by data brokers. In addition, it provides a brief overview of the confidentiality protections for customer information established by the Communications Act of 1934. digital.library.unt.edu/ark:/67531/metacrs9027/
Data Security: Protecting the Privacy of Phone Records
This report discusses recent legislative and regulatory efforts to protect the privacy of customer telephone records, and efforts to prevent the unauthorized use, disclosure, or sale of such records by data brokers. In addition, it provides a brief overview of the confidentiality protections for customer information established by the Communications Act of 1934. digital.library.unt.edu/ark:/67531/metacrs9026/
The Federal Excise Tax on Telephone Service: A History
No Description digital.library.unt.edu/ark:/67531/metacrs1952/
Telephone Excise Tax
No Description digital.library.unt.edu/ark:/67531/metacrs1314/
The Telephone Excise Tax: Revenues, Effects, and Repeal Proposals
No Description digital.library.unt.edu/ark:/67531/metacrs1963/
Telecommunications Services Trade and the WTO Agreement
No Description digital.library.unt.edu/ark:/67531/metacrs3554/
Copyright Protection of Digital Television: The "Broadcast Flag"
This report addresses the adoption of a “broadcast flag” system by the Federal Communications Commission (FCC) to protect digital television (DTV) broadcasts from unauthorized redistribution. The report also addresses the recent decision of the United States Court of Appeals for the District of Columbia Circuit reversing and vacating the FCC’s broadcast flag report and order. digital.library.unt.edu/ark:/67531/metacrs7772/
Regulation of the Telemarketing Industry: State and National Do-Not-Call Registries
No Description digital.library.unt.edu/ark:/67531/metacrs5542/
Regulation of the Telemarketing Industry: State and National Do-Not-Call Registries
No Description digital.library.unt.edu/ark:/67531/metacrs5541/
Regulation of the Telemarketing Industry: State and National Do-Not-Call Registries
No Description digital.library.unt.edu/ark:/67531/metacrs5540/
Regulation of Broadcast Indecency: Background and Legal Analysis
No Description digital.library.unt.edu/ark:/67531/metacrs8033/
Regulation of Broadcast Indecency: Background and Legal Analysis
No Description digital.library.unt.edu/ark:/67531/metacrs6314/
Regulation of Broadcast Indecency: Background and Legal Analysis
No Description digital.library.unt.edu/ark:/67531/metacrs6069/
Defining Cable Broadband Internet Access Service: Background and Analysis of the Supreme Court's Brand X Decision
This report provides an overview of the regulatory actions leading up to and an analysis of the Supreme Court’s decision in National Cable & Telecommunications Association v. Brand X Internet Services. It also provides a discussion of the possible legal and economic implications of the Court’s decision. digital.library.unt.edu/ark:/67531/metacrs7795/
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism. digital.library.unt.edu/ark:/67531/metacrs5513/
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. digital.library.unt.edu/ark:/67531/metacrs6315/
Network Centric Warfare: Background and Oversight Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6485/
Network Centric Warfare: Background and Oversight Issues for Congress
No Description digital.library.unt.edu/ark:/67531/metacrs6067/
Radio Marti
No Description digital.library.unt.edu/ark:/67531/metacrs9185/
Political Broadcasts - Regulate or Deregulate?
No Description digital.library.unt.edu/ark:/67531/metacrs9182/
FIRST PREV 1 2 3 4 5 NEXT LAST