Congressional Research Service Reports - 24 Matching Results

Search Results

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal law was enacted (27 states have anti-spam laws, however). Two bills have been introduced in the 108th Congress: S. 563 (Dayton) and S. 877 (Burns).
Date: April 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congress: H.R. 1933, S. 563, S. 877, and S. 1052. (Spam on wireless devices such as cell phones is discussed in CRS Report RL31636.)
Date: May 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Date: September 15, 2003
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Description: The Internet touches almost every aspect of modern life. The extend to which use of the Internet continues to grow, however, may be affected by a number of technology policy issues being debated in Congress. First is the availability of high speed -- or "broadband" -- Internet access. Next are a range of issues that reflect challenges faced by those who do use the Internet, such as security, privacy, unsolicited commercial electronic mail ("spam"), protecting children from unsuitable material, and computer security, including the vulnerability of the national infrastructure. Other issues include the governance of the Internet's domain name system. The evolving role of the Internet in the political economy of the United States also continues to attract congressional attention.
Date: August 15, 2006
Creator: Kruger, Lennard G.; Moteff, John D.; Gilroy, Angele A.; Seifert, Jeffrey W.; Figliola, Patricia Moloney & Tehan, Rita
Partner: UNT Libraries Government Documents Department

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Description: The continued growth of the Internet for personal, government, and business purposes may be affected by a number of technology policy issues being debated by Congress. Among them are access to and regulation of broadband (high-speed) Internet services, computer and Internet security, Internet privacy, the impact of “spam,” concerns about what children may encounter (such as pornography) when using the Internet, management of the Internet Domain Name System, and government information technology management. This report provides overviews of those issues, plus appendices providing a list of pending legislation, a list of acronyms, a discussion of legislation passed in earlier Congresses, and a list of other CRS reports that provide more detail on these and related topics.
Date: August 15, 2006
Creator: Kruger, Lennard G.; Moteff, John D.; Gilroy, Angele A.; Seifert, Jeffrey W.; Moloney Figliola, Patricia & Tehan, Rita
Partner: UNT Libraries Government Documents Department

Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth

Description: The continued growth of the Internet for personal, government, and business purposes may be affected by a number of technology policy issues being debated by Congress. Among them are access to and regulation of broadband (high-speed) Internet services, computer and Internet security, Internet privacy, the impact of “spam,” concerns about what children may encounter (such as pornography) when using the Internet, management of the Internet Domain Name System, and government information technology management. This report provides overviews of those issues, plus appendices providing a list of pending legislation, a list of acronyms, a discussion of legislation passed in earlier Congresses, and a list of other CRS reports that provide more detail on these and related topics.
Date: August 15, 2006
Creator: Kruger, Lennard G.; Moteff, John D.; Gilroy, Angele A.; Seifert, Jeffrey W.; Moloney Figliola, Patricia & Tehan, Rita
Partner: UNT Libraries Government Documents Department

The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: May 15, 2008
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

America COMPETES Act and the FY2010 Budget

Description: This report discusses in detail the America COMPETES Act, which is intended to increase the nation's investment in research and development (R&D), and in science, technology, engineering, and mathematics (STEM) education. This report discusses the funding increases authorized by the act for various relevant institutions, e.g., the National Science Foundation (NSF); the act's education activities intended to enhance the skills of STEM educators; and if Congress will continue to similarly fund the America COMPETES Act in the FY2010 budget.
Date: June 15, 2009
Creator: Stine, Deborah D.
Partner: UNT Libraries Government Documents Department

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

America COMPETES Acts: FY2008-FY2013 Funding Tables

Description: This report discusses major provisions of the America COMPETES Reauthorization Act of 2010 that are set to expire in 2013. This report has been updated to reflect FY2013 enacted funding levels--as contained in P.L. 113- 6 (Consolidated and Further Continuing Appropriations Act, 2013)--for specified COMPETES related accounts.
Date: April 15, 2013
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress

Description: The federal role in cybersecurity has been a topic of discussion and debate for over a decade. Despite significant legislative efforts in the 112th Congress on bills designed to improve the cybersecurity of U.S. critical infrastructure (CI), no legislation on that issue was enacted in that Congress. This report discusses the ramifications of Executive Order 13636, which issued in February 2013 was an attempt to enhance security and resiliency of CI through voluntary, collaborative efforts involving federal agencies and owners and operators of privately owned CI, as well as use of existing federal regulatory authorities.
Date: December 15, 2014
Creator: Fischer, Eric A.; Liu, Edward C.; Rollins, John W. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Radio Broadcasting Chips for Smartphones: A Status Report

Description: This report provides information on consumer and industry trends in radio and wireless network communications to give perspective on the proposal for widespread deployment of FM radio chips in smartphones as an emergency preparedness measure. It also provides a brief overview of the role of technology in disseminating emergency alerts and information.
Date: December 15, 2014
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

Description: This report discusses the concept of cybercrime and related cyber threats such as cyber espionage and cyber warfare, and questions whether--and under what circumstances--clear distinctions between the various threats should be delineated. It also outlines how current federal strategies may address cybercrime, including issues surrounding the measurement and tracking of cybercrime.
Date: January 15, 2015
Creator: Finklea, Kristin & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

Inspector General Community Launches Oversight.gov to Increase Accessibility to Reports

Description: This report discusses the launch of oversight.gov by the Council of Inspectors General on Integrity and Efficiency (CIGIE) and which agencies are currently participating in the beta test. The site allows Office of the Inspector General (OIG) reports related to participating agencies to be accessed in one place with keyword searchability.
Date: August 15, 2017
Creator: Francis, Kathryn A.
Partner: UNT Libraries Government Documents Department

The Net Neutrality Debate: Access to Broadband Networks

Description: This report discusses net neutrality and the concept of open internet access. A decision by the Federal Communications Commission (FCC) in 2015 to classify broadband internet service as a telecommunication subjected the industry to further regulation and provoked a debate over what level of regulation should be used for the internet. The FCC in May 2017 announced their intention to modify rules from the 2015 regulations opening the debate once again. Past and current Congressional legislation related to internet policy is included in the final section.
Date: August 15, 2017
Creator: Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department

Telehealth Services Proposed for Medicare Part B Reimbursements, 2018: Fact Sheet

Description: This report discusses telehealth services covered under Medicare and describes the five conditions that a telehealth service must meet to be covered and paid for under Medicare Part B, provides an overview of how the Secretary of the Department of Health and Human Services (HHS) adds telehealth services to Medicare's reimbursable list, and includes a table listing the proposed telehealth services to be added to the CY2018 list for Medicare reimbursement.
Date: November 15, 2017
Creator: Elliott, Victoria L.
Partner: UNT Libraries Government Documents Department