Search Results

open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the servies, as well as related issues for the 113th Congress.
Date: March 28, 2014
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Aereo and FilmOn X: Internet Television Streaming and Copyright Law

Description: This report begins with a discussion of the technology used by Aereo and FilmOn X that permit subscribers to watch live broadcast television as well as already-aired programming. It then examines the public performance right in the Copyright Act and discusses the interpretation of the transmit clause and public performance right by the courts in the Aereo and FilmOn cases. The report concludes with a brief overview of future litigation by these parties and related legislative proposals in the 1… more
Date: January 13, 2014
Creator: Lanza, Emily M.
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the servies, as well as related issues for the 113th Congress.
Date: January 3, 2013
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 2, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 22, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information on the Internet. The report includes background on the DNS and the Internet Corporation for Assigned Names and Numbers (ICANN) that manages the services, as well as related issues for the 113th Congress.
Date: May 23, 2014
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: May 30, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: January 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 9, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis

Description: This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rep… more
Date: January 28, 2013
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

An Analysis of STEM Education Funding at the NSF: Trends and Policy Discussion

Description: This report analyzes National Science Foundation funding trends and selected closely-related STEM (science, technology, engineering, and math) education policy issues to provide fiscal and policy context. It concludes with an analysis of potential policy options.
Date: December 12, 2012
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department
open access

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: January 23, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

"Amazon Laws" and Taxation of Internet Sales: Constitutional Analysis

Description: This report focuses on the ways in which the states' efforts to impose requirements on out-of-state retailers are limited by the Constitution. The report discusses recent state legislation as well as legislation introduced in the two most recent Congresses.
Date: April 3, 2013
Creator: Lunder, Erika K. & Pettit, Carol A.
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources

Description: This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, … more
Date: April 17, 2013
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international… more
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department
open access

Can Body Worn Cameras Serve as a Deterrent to Police Misconduct?

Description: This report discusses various issues regarding body worn cameras (BWCs), including the potential merits, concerns, and financial costs of use. The report also briefly states a possible method for allotting federal funds to help law enforcement agencies purchase BWCs.
Date: August 28, 2014
Creator: James, Nathan
Partner: UNT Libraries Government Documents Department
open access

America COMPETES Acts: FY2008-FY2013 Funding Tables

Description: This report discusses major provisions of the America COMPETES Reauthorization Act of 2010 that are set to expire in 2013. This report has been updated to reflect FY2013 enacted funding levels--as contained in P.L. 113- 6 (Consolidated and Further Continuing Appropriations Act, 2013)--for specified COMPETES related accounts.
Date: April 15, 2013
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen