Congressional Research Service Reports - 784 Matching Results

Search Results

Fishery, Aquaculture, and Marine Mammal Online News and Information Sources
No Description Available.
Unmanned Aircraft Systems (UAS): Commercial Outlook for a New Industry
This report discusses unmanned aircraft systems (UAS)--commonly referred to as drones-- which have become a staple of U.S. military reconnaissance and weapons delivery in overseas war zones such as Afghanistan. Now some new technologies and pending federal regulations are enabling the manufacture and use of UAS in domestic commerce, giving rise to a growing commercial UAS industry.
Desalination and Membrane Technologies: Federal Research and Adoption Issues
This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) show promise for reducing desalination costs. It discusses the Research to support development of emerging technologies and to reduce desalination's environmental and social impacts.
Desalination and Membrane Technologies: Federal Research and Adoption Issues
This report discusses emerging technologies (e.g., forward osmosis, nanocomposite and chlorine resistant membranes) that show promise for reducing desalination costs. It also discusses the research to support development of emerging technologies and to reduce desalination's environmental and social impacts.
Information Services for Agriculture: The Role of Technology
Significant improvements in technology-supported information services have created opportunities for their utilization by the farmers and ranchers of our Nation. This report highlights the development and expanded offering of these systems, describes current operational and experimental systems, and presents salient legislative initiatives which address this priority area.
OPM Data Breach: Personnel Security Background Investigation Data
This report provides information on the types of data that may be collected in a typical personnel security background investigation. In a July 9, 2015, news release on the cyber-intrusions of its systems, OPM "concluded with high confidence that sensitive information, including the Social Security Numbers (SSNs) of 21.5 million individuals, was stolen from the background investigation databases." This report is not an official statement of the data that was compromised in the OPM breach.
Constitutionality of Proposals to Prohibit the Sale or Rental to Minors of Video Games with Violent or Sexual Content or "Strong Language"
It has been proposed that Congress prohibit the sale or rental to minors of video games that are rated “M” (mature) or “AO” (adults-only) by the Entertainment Software Ratings Board. This board is a non-governmental entity established by the Interactive Digital Software Association, and its ratings currently have no legal effect.
Constitutionality of Requiring Sexually Explicit Material on the Internet to be Under a Separate Domain Name
It is unclear whether making a “.xxx” domain mandatory would violate the First Amendment. Some propose making use of a “.xxx” domain voluntary, but others propose that Congress make it mandatory. The latter proposal raises the question whether a mandatory separate domain would violate the First Amendment, and this report focuses on that question.
Restrictions on Minors' Access to Material on the Internet
No Description Available.
Internet Voting
No Description Available.
Internet Voting: Issues and Legislation
No Description Available.
Internet Voting
No Description Available.
Internet Voting: Issues and Legislation
No Description Available.
U.S.-Japanese Trade: The Semiconductor Arrangement
No Description Available.
Manipulating Molecules: The National Nanotechnology Initiative
No Description Available.
Manipulating Molecules: The National Nanotechnology Initiative
No Description Available.
Manipulating Molecules: The National Nanotechnology Initiative
No Description Available.
Manipulating Molecules: The National Nanotechnology Initiative
No Description Available.
Federal R&D Funding Under a Continuing Resolution
This report discusses the continuing resolution, or CR (P.L. 109-383, H.J.Res. 102) which provides spending at FY2006 levels (through February 15, 2007), for those agencies lacking enacted FY2007 appropriations bills.
Manipulating Molecules: Federal Support for Nanotechnology Research
The Bush Administration has requested $1.277 billion for nanotechnology research for FY2007. Nanotechnology is a newly emerging field of science where scientists and engineers are beginning to manipulate matter at the molecular and atomic levels in order to obtain materials and systems with significantly improved properties. Scientists note that nanotechnology is still in its infancy, with large scale practical applications 10 to 30 year away. Congressional concerns include funding for the National Nanotechnology Initiative (NNI), the potential environmental and health concerns associated with the development and deployment of nanotechnology, and the need to adopt international measurement standards for nanotechnology.
Data Security and Breach Notification Legislation: Selected Legal Issues
This report describes the common elements of several data security and breach notification bills that have been introduced in the 114th Congress, which broadly would impose security and notification requirements on businesses regardless of industry sector. It also discusses state laws that may apply in the event of a data breach and addresses two legal issues that may arise in consideration of new legislation about data security and breach notification.
Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act.
Cybersecurity: Cyber Crime Protection Security Act (S. 2111, 112th Congress)— A Legal Analysis
This report discusses the Cyber Crime Protection Security Act (S. 2111) that would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Cybersecurity: Cyber Crime Protection Security Act (S. 2111)—A Legal Analysis
The Cyber Crime Protection Security Act (S. 2111) would enhance the criminal penalties for the cyber crimes outlawed in the Computer Fraud and Abuse Act (CFAA). Those offenses include espionage, hacking, fraud, destruction, password trafficking, and extortion committed against computers and computer networks. S. 2111 contains some of the enhancements approved by the Senate Judiciary Committee when it reported the Personal Data Privacy and Security Act (S. 1151), S.Rept. 112-91 (2011).
Internet Gambling: A Sketch of Legislative Proposals in the 108th and 109th Congresses
This report examines two bills that have been introduced in the 109th Congress to address issues regarding Internet gambling.
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
The federal computer fraud and abuse statute, 18 U.S.C. 1030, protects federal computers, bank computers, and computers used in interstate and foreign commerce. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills crack and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of section 1030 and some of its federal statutory companions.
Protecting Civil Aviation from Cyberattacks
This report briefly discusses cyber-security issues in civil aviation. unclear. A recent probe into alleged hacking incidents unfolded just weeks after the Federal Bureau of Investigation (FBI) and the Transportation Security Administration (TSA) alerted airlines to be on the lookout for passengers trying to tap into aircraft electronics and for evidence of tampering or network intrusions.
Lasers Aimed at Aircraft Cockpits: Background and Possible Options to Address the Threat to Aviation Safety and Security
No Description Available.
Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet
This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Electronic Payments and the U.S. Payments System
This report provides a framework for understanding the paper-based and electronic components of the current U.S. payments system. It begins with a basic overview of the payments system, explaining the relative size and growth of various methods of payment. The report discusses paper-based payments and then examines the operations of wholesale and retail electronic payments. Finally, the report discusses some of the major policy issues concerning the regulation and supervision of electronic payments.
Legal Issues Related to Prescription Drug Sales on the Internet
No Description Available.
Prescription Drug Importation and Internet Sales: A Legal Overview
No Description Available.
Expansion of WTO Information Technology Agreement Targets December Conclusion
This report discusses the World Trade Organization (WTO) expansion and agreement to expand the Information Technology Agreement (ITA) and eliminate tariffs on 201 goods not included in the original 1996 ITA.
Digital Trade and U.S. Trade Policy
This report discusses the role of digital trade in the U.S. economy, barriers to digital trade, digital trade agreement provisions, and other selected policy issues.
Spyware: Background and Policy Issues for Congress
This report discusses whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law, as well as the opinions of both the opponents and the supporters of industry self-regulation.
Digital Surveillance: The Communications Assistance for Law Enforcement Act
The Communications Assistance for Law Enforcement Act (CALEA, P.L. 103- 414, 47 USC 1001-1010), enacted October 25, 1994, is intended to preserve the ability of law enforcement officials to conduct electronic surveillance effectively and efficiently despite the deployment of new digital technologies and wireless services that have altered the character of electronic surveillance. CALEA requires telecommunications carriers to modify their equipment, facilities, and services, wherever reasonably achievable, to ensure that they are able to comply with authorized electronic surveillance actions.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
In the early 1990s, Congress recognized that several federal agencies had ongoing high performance computing programs, but no central coordinating body existed to ensure long-term coordination and planning. To provide such a framework, Congress passed the High-Performance Computing and Communications Program Act of 1991 to enhance the effectiveness of the various programs. In conjunction with the passage of the act, the White House Office of Science and Technology Policy released Grand Challenges: High-Performance Computing and Communications. Current concerns are the role of the federal government in supporting IT R&D and the level of funding to allot to it. This report also looks at federal budgets for the Networking and Information Technology Research and Development Program.
The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities
The federal government has long played a key role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses the High-Performance Computing and Communications Program Act of 1991 (P.L. 102-194), which was passed to enhance the effectiveness of the various high-performance computing programs. The HPCC Program has evolved over time and is now called the Networking and Information Technology Research and Development (NITRD) Program, to better reflect its expanded mission.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
This report discusses federal funding for IT research and development. Proponents assert that federal support of IT R&D has produced positive outcomes for the country and played a crucial role in supporting long-term research into fundamental aspects of computing. Critics assert that the government, through its funding mechanisms, may be picking “winners and losers” in technological development, a role more properly residing with the private sector.
The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities
No Description Available.