Congressional Research Service Reports - 65 Matching Results

Search Results

Science and Technology Policy: Issues for the 109th Congress
Science and technology have a pervasive influence over a wide range of issues confronting the nation. Decisions on how much federal funding to invest in research and development (R&D) and determining what programs have the highest priority, for example, may have implications for homeland security, new high technology industries, government/private sector cooperation in R&D, and myriad other areas. This report indicates the sweep of science and technology in many public policy issues, such as global climate change, stem cell research, patent protection, and telecommunications reform. This report also addresses key issues that directly affect, or are affected by, science and technology.
International Science and Technology: Issues for U.S. Policymakers
No Description Available.
Science and Technology Policy: Issues for the 108th Congress, 2nd Session
No Description Available.
Science and Technology Policy: Issues for the 109th Congress
No Description Available.
Computer Services Personnel: Overtime Pay Under the Fair Labor Standards Act
The Fair Labor Standards Act of 1938 (FLSA), as amended, is the primary federal statute in the area of minimum wages and overtime pay. Through administrative rulemaking, the Secretary of Labor has established two tests through which to define eligibility under the Section 13(a)(1) exemption: a duties test and an earnings test. In the 106th Congress, legislation was introduced by Representatives Andrews and Lazio that would have increased the scope of the exemption: first, by expanding the range of exempt job titles, and then, through a relative reduction in the value of the earnings threshold or test. For example, were the minimum wage increased to $6.15 per hour, as pending proposals would do, the value of the computer services exemption threshold would be 4.5 times the federal minimum wage. Ultimately, neither bill was enacted, but the issue has re-emerged as H.R. 1545 (Andrews) and H.R. 546 (Quinn).
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy
No Description Available.
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy
No Description Available.
Industrial Competitiveness and Technological Advancement: Debate Over Government Policy
No Description Available.
Science and Technology Policy: Issues for the 109th Congress
No Description Available.
Net Neutrality: Background and Issues
No Description Available.
Internet Voting
No Description Available.
The Net Neutrality Debate: Access to Broadband Networks
This report introduces the basics of the net neutrality debate over open access to the internet and discusses current court cases and legislation related to the Federal Communication Commission's (FCC) 2015 Open Internet Order and its latest proposed revisions.
The Computer Industry: Growth and Evolution with Special Emphasis on Government Regulation and Antitrust, Selected References, 1974
This report provides bibliography of resources related to the growth of the computer industry that were published in 1974.
Science, Technology, and Medicine: Issues Facing the 105th Congress, Second Session
No Description Available.
Digital Searches and Seizures: Overview of Proposed Amendments to Rule 41 of the Rules of Criminal Procedure
This report provides a brief overview of the proposed amendment to Rule 41, which would amend the federal search and seizure rules to permit the government to remotely access electronic devices although the location of the device may be unknown. First, the report provides a background on the origin of, and rationale underlying, the proposed amendment and a description of the rule as currently written. Second, it reviews the potential changes made by the proposed amendment and will survey various concerns commenters have raised with the proposal. Lastly, this report addresses efforts being made in Congress to alter, delay, or stop this rule change.
Information Operations and Cyberwar: Capabilities and Related Policy Issues
This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.
Digital Television: An Overview
Digital television (DTV) is a new television service representing the most significant development in television technology since the advent of color television in the 1950s. DTV can provide sharper pictures, a wider screen, CD-quality sound, better color rendition, and other new services currently being developed. A successful deployment of DTV requires: the development by content providers of compelling digital programming; the delivery of digital signals to consumers by broadcast television stations, as well as cable and satellite television systems; and the widespread purchase and adoption by consumers of digital television equipment. A key issue in the Congressional debate over the digital transition has been addressing the millions of American over-the-air households whose existing analog televisions will require converter boxes in order to receive digital signals when the analog signal is turned off.
Cybersecurity: Authoritative Reports and Resources
Report that provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
America COMPETES Acts: FY2008-FY2013 Funding Tables
This report has been updated to reflect FY2013 funding levels contained in P.L. 113-6 (Consolidated and Further Continuing Appropriations Act, 2013) and the explanatory statement published in the March 11, 2013. This report also provides selected FY2013 current or operational plan funding levels, which have been adjusted to account for the effects of sequestration and other currently known legal determinations made by the Office of Management and Budget (OMB) that may affect the final appropriations levels.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues, including: legislation, hearings in the 112th Congress, data and statistics, and cybersecurity glossaries.
Electric Power Storage
This report summarizes the technical, regulatory, and policy issues that surround implementation of electric power storage.
America COMPETES Acts: FY2008-FY2013 Funding Tables
This report has been updated to reflect FY2013 funding levels contained in P.L. 113-6 (Consolidated and Further Continuing Appropriations Act, 2013) and the explanatory statement published in the March 11, 2013.
Internet Tax Legislation: Distinguishing Issues
No Description Available.
Manipulating Molecules: The National Nanotechnology Initiative
No Description Available.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Internet Privacy: Overview and Pending Legislation
No Description Available.
Internet Tax Bills in the 108th Congress
No Description Available.
Internet Privacy: Overview and Pending Legislation
No Description Available.
"Spam": An Overview of Issues Concerning Commercial Electronic Mail
Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Small Business Innovation Research Program
No Description Available.
Information Operations and Cyberwar: Capabilities and Related Policy Issues
This report describes the emerging areas of information operations in the context of U.S. national security. It assesses known U.S. capabilities and plans, and suggests related policy issues of potential interest to Congress.
Data Security Breaches: Context and Incident Summaries
Personal data security breaches are being reported with increasing regularity. Within the last few years, numerous examples of data such as Social Security numbers, bank account, credit card, driver’s license numbers, and medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation.
Intellectual Property Protection for Noncreative Databases
No Description Available.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
This report looks at considerations of the 112th Congress in furthering encouragement of broadband deployment and adoption so as decrease the "digital divide" between "information haves and have-nots."
Universal Service Fund: Background and Options for Reform
This report discusses the idea that all Americans should be able to afford access to the telecommunications network; this is commonly called the "universal service concept" and can trace its origins back to the 1934 Communications Act.
The U.S. Newspaper Industry in Transition
This report analyzes the current crises that the U.S. newspaper industry is facing in light of the recent economic downturn and the increasing number of readers who turn to the Internet for their news instead of to traditional media. Congress has begun debating whether the financial problems in the newspaper industry pose a public policy issue that warrants federal action.
Spectrum Policy in the Age of Broadband: Issues for Congress
This report considers the possibility of modifying spectrum policy: (1) to support national goals for broadband deployment by placing more emphasis on attracting new providers of wireless broadband services; and (2) to accommodate the wireless broadband needs of industries that are considered by many to be the economic drivers of the future, not only communications, but also areas such as energy, health care, transportation, and education.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a "digital divide" in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the "digital divide," and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress
This report identifies cybersecurity policy issues that have been proposed for priority consideration. The report lists and synopsizes current legislation that has been developed to address various aspects of the cybersecurity problem. It then lists the current status of the legislation and compares legislation with existing executive branch initiatives. Finally, analysis of information contained in executive branch initiatives and congressional legislation is used to further highlight related considerations for Congress.
Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations
This report provides an overview of the perennial issue involving technology outpacing law enforcement and discusses how policy makers and law enforcement officials have dealt with this issue in the past. It discusses the current debate surrounding smartphone data encryption and how this may impact U.S. law enforcement operations. The report also discusses existing law enforcement capabilities, the debate over whether law enforcement is "going dark" because of rapid technological advances, and resulting issues that policy makers may consider.
Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry
This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
The Department of Defense, Science and Technology Program: An Analysis, FY1998-FY2007
The purpose of this report is to help understand how the budget increases of the last ten years have been allocated.
Public Participation and Technology Assessment: A Survey of the Legislative History of the Office of Technology Assessment
This report provides an overview of the history and functions of the Office of Technology Assessment and discusses the concept of public participation in technology assessment.
China: Possible Missile Technology Transfers from U.S. Satellite Export Policy - Actions and Chronology
This CRS Report discusses security concerns, significant congressional and administration action, and a comprehensive chronology pertaining to satellite exports to the PRC. The report discusses issues for U.S. foreign and security policy (including that on China and weapons nonproliferation), such as: What are the benefits and costs of satellite exports to China for U.S. economic and security interests? Should the United States continue, change, or cease the policy in place since the Reagan Administration that has allowed exports of satellites to China (for its launch and – increasingly – for its use)? Etc.
Technology Transfer: Use of Federally Funded Research and Development
No Description Available.
Analysis of Ten Selected Science and Technology Policy Studies
Since the end of the Cold War in the early 1990s, a number of reports have been prepared on a broad range of science and technology (S&T) policy issues, most notably dealing with national research and development (R&D) goals, priorities, and budgets, and university-government-industry relationships. This report discusses and analyzes ten of these S&T reports.
Technology Transfer: Use of Federally Funded Research and Development
No Description Available.
Cybercrime: The Council of Europe Convention
Forty-three countries, including the United States, have signed the Council of Europe’s Convention on Cybercrime of November 2001. The U.S. Senate ratified the Convention on August 3, 2006. The Convention seeks to better combat cybercrime by harmonizing national laws, improving investigative abilities, and boosting international cooperation. Supporters argue that the Convention will enhance deterrence, while critics counter it will have little effect without participation by countries in which cybercriminals operate freely. Others warn it will endanger privacy and civil liberties.
Year 2000 Computer Problem: State Government Issues
The federal government sends and receives data from the states in support of many social service programs. Examples of such programs are: Medicare, Medicaid, Welfare, Food Stamps, and Unemployment Insurance. The federal government will not be able to deliver critical social services if data exchanges with state governments are not Y2K- compliant, yet there is no complete picture of their readiness.