Congressional Research Service Reports - Browse

ABOUT BROWSE FEED

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: April 4, 2005
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Description: This report provides background information for three types of attacks against computers (cyber-attack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack. The report also describes the possible effects of a coordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists.
Date: April 1, 2005
Creator: Wilson, Clay
Item Type: Report
Partner: UNT Libraries Government Documents Department

Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

Description: Cyber- security refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavor. This report aims to examine what kind of national cyber-security framework may be needed and how it might be implemented, and it addresses three questions: 1. Where are the major cyber-security weaknesses currently, and where might weaknesses be anticipated in the future? What are the major means of leverage for addressing those weaknesses? What roles should government and the private sector play in the use of those means of leverage to address current and potential future weaknesses?
Date: February 22, 2005
Creator: Fischer, Eric A
Item Type: Report
Partner: UNT Libraries Government Documents Department

Computer Services Personnel: Overtime Pay Under the Fair Labor Standards Act

Description: The Fair Labor Standards Act of 1938 (FLSA), as amended, is the primary federal statute in the area of minimum wages and overtime pay. Through administrative rulemaking, the Secretary of Labor has established two tests through which to define eligibility under the Section 13(a)(1) exemption: a duties test and an earnings test. In the 106th Congress, legislation was introduced by Representatives Andrews and Lazio that would have increased the scope of the exemption: first, by expanding the range of exempt job titles, and then, through a relative reduction in the value of the earnings threshold or test. For example, were the minimum wage increased to $6.15 per hour, as pending proposals would do, the value of the computer services exemption threshold would be 4.5 times the federal minimum wage. Ultimately, neither bill was enacted, but the issue has re-emerged as H.R. 1545 (Andrews) and H.R. 546 (Quinn).
Date: February 7, 2005
Creator: Whittaker, William G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Internet Taxation: Issues and Legislation

Description: The Internet Tax Freedom Act (ITFA) placed a three-year moratorium on the ability of state and local governments to (1) impose new taxes on Internet access or (2) impose any multiple or discriminatory taxes on electronic commerce. The act grandfathered the state and local access taxes that were “... generally imposed and actually enforced prior to October 1, 1998 ....” This report discusses issues of state and local taxation of Internet transactions because commerce conducted by parties in different states over the Internet.
Date: February 3, 2005
Creator: Maguire, Steven & Noto, Nonna A.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access and the Digital Divide: Federal Assistance Programs

Description: This report provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Date: February 2, 2005
Creator: Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

State Sales Taxation of Internet Transactions

Description: This report examines state taxation of Internet transactions as well as efforts to achieve uniform state sales and use tax treatment.
Date: January 11, 2005
Creator: Luckey, John R.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Cooperative R&D: Federal Efforts to Promote Industrial Competitiveness

Description: In response to the foreign challenge in the global marketplace, the United States Congress has explored ways to stimulate technological advancement in the private sector. The government has supported various efforts to promote cooperative research and development activities among industry, universities, and the federal R&D establishment designed to increase the competitiveness of American industry and to encourage the generation of new products, processes, and services. Among the issues before Congress are whether joint ventures contribute to industrial competitiveness and what role, if any, the government has in facilitating such arrangements.
Date: January 10, 2005
Creator: Schacht, Wendy H.
Item Type: Report
Partner: UNT Libraries Government Documents Department

Data Mining: An Overview

Description: Data mining is emerging as one of the key features of many homeland security initiatives. Often used as a means for detecting fraud, assessing risk, and product retailing, data mining involves the use of data analysis tools to discover previously unknown, valid patterns and relationships in large data sets. This report discusses the data mining uses (i.e. Terrorism Information Awareness (TIA) Program) and issues (i.e. data quality, interoperability, privacy), as well as the limitations of data mining.
Date: December 16, 2004
Creator: Seifert, Jeffrey W
Item Type: Report
Partner: UNT Libraries Government Documents Department

Broadband Internet Access: Background and Issues

Description: From a public policy perspective, the goals are to ensure that broadband deployment is timely, that industry competes fairly, and that service is provided to all sectors and geographical locations of American society. The federal government -- through Congress and the Federal Communications Commission (FCC) -- is seeking to ensure fair competition among the players so that broadband will be available and affordable in a timely manner to all Americans who want it. While the FCC's position is not to intervene at this time, some assert that legislation is necessary to ensure fair competition and timely broadband deployment. One proposal would ease certain legal restrictions and requirements, imposed by the Telecommunications Act of 1996, on incumbent telephone companies who provide high speed data (broadband) access. Another proposal would compel cable companies to provide "open access" to competing Internet service providers.
Date: October 27, 2004
Creator: Gilroy, Angele A. & Kruger, Lennard G.
Item Type: Report
Partner: UNT Libraries Government Documents Department

"Spam": An Overview of Issues Concerning Commercial Electronic Mail

Description: Spam, also called unsolicited commercial email (UCE) or “junk email,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment, and that some consumers want to receive such solicitations. This report discusses this issue in detail, as well as related legislation.
Date: September 16, 2004
Creator: Smith, Marcia S.
Item Type: Report
Partner: UNT Libraries Government Documents Department