Congressional Research Service Reports - 46 Matching Results

Search Results

The EU-U.S. Safe Harbor Agreement on Personal Data Privacy: In Brief

Description: This report discusses a recent judgement by the Court of Justice of the European Union (CJEU) that invalidates the Safe Harbor Agreement between the United States and the 28-member European Union (EU). Safe Harbor is a 15-year-old accord, under which personal data could legally be transferred between EU member countries and the United States.
Date: October 29, 2015
Creator: Weiss, Martin A.
Partner: UNT Libraries Government Documents Department

U.S.-China Cyber Agreement

Description: During the state visit on September 24-25, 2015, President Xi Jinping of China and President Barack Obama reached a Cyber Agreement. This report briefly discusses that agreement.
Date: October 16, 2015
Creator: Rollins, John W.; Lawrence, Susan V.; Rennack, Dianne E. & Theohary, Catherine A.
Partner: UNT Libraries Government Documents Department

The Internet Tax Freedom Act: In Brief

Description: This report discusses the Internet Tax Freedom Act (ITFA; P.L. 105-277), which enacted in 1998, implemented a three-year moratorium preventing state and local governments from taxing Internet access, or imposing multiple or discriminatory taxes on electronic commerce.
Date: October 5, 2015
Creator: Stupak, Jeffrey M.
Partner: UNT Libraries Government Documents Department

America COMPETES Acts: FY2008 to FY2013 Funding Tables

Description: The 2007 America COMPETES Act (P.L. 110-69) is designed to “invest in innovation through research and development, and to improve the competitiveness of the United States.” This report tracks accounts and activities authorized by the 2007 and 2010 COMPETES Acts during each act’s authorization period. It includes only those accounts and activities for which the acts provide a defined (i.e., specific) appropriations authorization.
Date: October 31, 2014
Creator: Gonzalez, Heather B.
Partner: UNT Libraries Government Documents Department

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Description: This report discusses the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet by shielding them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Description: This report discusses The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, which is a cyber security law that outlaws conduct that victimizes computer systems. It protects federal computers, bank computers, and computers connected to the Internet from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud.
Date: October 15, 2014
Creator: Doyle, Charles
Partner: UNT Libraries Government Documents Department

Cybersecurity: Authoritative Reports and Resources, by Topic

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

Federal Lands and Natural Resources: Overview and Selected Issues for the 113th Congress

Description: This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics: policy overview; National Strategy for Trusted Identities in Cyberspace (NSTIC); cloud computing and FedRAMP; critical infrastructure; cybercrime, data breaches and data security; national security, cyber espionage, and cyberwar (including Stuxnet); international efforts; education/training/workforce; and research and development (R&D).
Date: October 14, 2014
Creator: Tehan, Rita
Partner: UNT Libraries Government Documents Department

The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: October 22, 2013
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

Manufacturing Extension Partnership Program: An Overview

Description: This report provides a brief overview of The Hollings Manufacturing Partnership (MEP), which is a program of regional centers set up to assist small and medium-sized manufacturing companies use knowledge and technologies developed under the auspices of the National Institute of Standards and Technology (NIST).
Date: October 3, 2012
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

The National Institute of Standards and Technology: An Appropriations Overview

Description: This report examines the funding for the National Institute of Standards and Technology (NIST). Congressional skepticism and pressures to balance the federal budget have effected NIST and its programs to such an extent that NIST is "currently taking the necessary actions for an orderly shutdown." Presidential promises call for an increase in funding, and the report questions how this funding will affect programs within NIST.
Date: October 3, 2012
Creator: Schacht, Wendy H.
Partner: UNT Libraries Government Documents Department

Internet Domain Names: Background and Policy Issues

Description: This report discusses the Domain Name System (DNS), which is the distributed set of databases residing in computers around the world that contain address numbers mapped to corresponding domain names, making it possible to send and receive messages and to access information from computers anywhere on the Internet.
Date: October 28, 2009
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department

Spectrum Policy in the Age of Broadband: Issues for Congress

Description: This report considers the possibility of modifying spectrum policy: (1) to support national goals for broadband deployment by placing more emphasis on attracting new providers of wireless broadband services; and (2) to accommodate the wireless broadband needs of industries that are considered by many to be the economic drivers of the future, not only communications, but also areas such as energy, health care, transportation, and education.
Date: October 22, 2009
Creator: Moore, Linda K.
Partner: UNT Libraries Government Documents Department

Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying

Description: This report discusses Internet crimes, such as cyberbullying, cyberharassment, and cyberstalking, along with the limitations of such laws in the current environment. While Congress, under the Commerce Clause, has authority to regulate the Internet, Internet "harassment" presents new challenges for legislators in terms of defining and prosecuting such activity.
Date: October 19, 2009
Creator: Smith, Alison M.
Partner: UNT Libraries Government Documents Department

Managing Electronic Waste: Issues with Exporting E-Waste

Description: This report looks at issues specifically related to export for recycling of electronic waste (e-waste). Particularly, it discusses documented impacts to human health and the environment that have been tied to unsafe recycling practices in developing countries, as well as issues that have motivated certain stakeholders to divert e-waste from landfill disposal and, hence, increase recycling.
Date: October 7, 2009
Creator: Luther, Linda
Partner: UNT Libraries Government Documents Department

The Federal Networking and Information Technology Research and Development Program: Funding Issues and Activities

Description: This report discusses the federal government's role in the country's information technology (IT) research and development (R&D) activities. The government's support of IT R&D began because it had an important interest in creating computers and software that would be capable of addressing the problems and issues the government needed to solve and study.
Date: October 23, 2008
Creator: Figliola, Patricia Moloney
Partner: UNT Libraries Government Documents Department

America COMPETES Act: Programs, Funding, and Selected Issues

Description: This report provides an overview of the America COMPETES Act provisions, summarizes its legislative origin and the origins of some of the new programs it authorizes, analyzes selected America COMPETES Act programs that are the focus of appropriation discussions, and provides a comparison of the President's budget, congressional appropriations, and America COMPETES Act authorization levels for FY2008.
Date: October 17, 2008
Creator: Stine, Deborah D.
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report discusses the "digital divide," a term that has been used to characterize a gap between those Americans who use or have access to telecommunications technologies (e.g., telephones, computers, the Internet) and those who do not. It particularly discusses one important subset of the digital divide debate concerns high speed Internet access or broadband.
Date: October 31, 2006
Creator: Kruger, Lennard G. & Gilroy, Angele A.
Partner: UNT Libraries Government Documents Department

Weapons of Mass Destruction: Trade Between North Korea and Pakistan

Description: U.S. intelligence officials claimed Pakistan was a key supplier of uranium enrichment technology to North Korea, and some media reports suggested that Pakistan had exchanged centrifuge enrichment technology for North Korean help in developing longer range missiles. U.S. official statements leave little doubt that cooperation occurred, but there are significant details missing on the scope of cooperation and the role of Pakistan's government. The roots of cooperation are deep. North Korea and Pakistan have been engaged in conventional arms trade for over thirty years. Weapons of mass destruction (WMD) trade between North Korea and Pakistan raises significant issues for Congress, which are discussed at length in this report.
Date: October 11, 2006
Creator: Squassoni, Sharon A.
Partner: UNT Libraries Government Documents Department