Congressional Research Service Reports - 784 Matching Results

This system will be undergoing maintenance January 24th 9:00-11:00AM CST.

Search Results

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress related to expansion of legitimate and criminal operations across physical borders and through cyberspace as a result of globalization and technological innovation. In particular, it considers how Congress can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime and whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: July 20, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: Globalization and technological innovation have fostered the expansion of both legitimate and criminal operations across physical borders as well as throughout cyberspace. U.S. law enforcement has increasingly relied on intelligence-led policing, enhanced interagency cooperation, and technological implementation to confront 21st century crime. Issues for Congress are how it can leverage its legislative and oversight roles to bolster U.S. law enforcement's abilities to confront modern-day crime. It may also examine whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: February 15, 2012
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

The Interplay of Borders, Turf, Cyberspace, and Jurisdiction: Issues Confronting U.S. Law Enforcement

Description: This report looks at issues for Congress, such as how legislative and oversight roles can bolster U.S. law enforcement's abilities to confront modern-day crime, including operations in cyberspace. It also examines whether federal law enforcement is utilizing existing mechanisms to effectively coordinate investigations and share information.
Date: July 19, 2011
Creator: Finklea, Kristin M.
Partner: UNT Libraries Government Documents Department

“Junk E-mail”: An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail (“Spam”)

Description: This report discusses unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail.” Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic.
Date: November 6, 2001
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

“Junk E-mail”: An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail (“Spam”)

Description: This report discusses unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail.” Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic.
Date: March 1, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. While 33 states have anti-spam laws, there is no federal law. Six bills addressing the spam issue are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), and S. 1231 (Schumer). Spam on wireless devices such as cell phones is discussed in CRS Report RL31636, Wireless Privacy: Availability of Location Information for Telemarketing.
Date: June 18, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included in this report.
Date: June 25, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 34 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
Date: July 24, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. While 36 states have anti-spam laws, there is no federal law specifically concerning spam. Nine “antispam” bills are pending in the 108th Congress: H.R. 1933 (Lofgren), H.R. 2214 (Burr-Tauzin-Sensenbrenner), H.R. 2515 (Wilson-Green), S. 563 (Dayton), S. 877 (Burns-Wyden), S. 1052 (Nelson-FL), S. 1231 (Schumer), S. 1293 (Hatch), and S. 1327 (Corzine). Two (S. 877 and S. 1293) have been reported from committee. Tables providing brief “side-by-side” comparisons of the bills are included at the end of this report.
Date: October 6, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last three Congresses (105th-107th), but no federal law was enacted (27 states have anti-spam laws, however). Two bills have been introduced in the 108th Congress: S. 563 (Dayton) and S. 877 (Burns).
Date: April 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of spam insist it is a legitimate marketing technique and protected by the First Amendment. While 27 states have anti-spam laws, there is no federal law. Four bills are pending in the 108th Congress: H.R. 1933, S. 563, S. 877, and S. 1052. (Spam on wireless devices such as cell phones is discussed in CRS Report RL31636.)
Date: May 15, 2003
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can spam be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Also, some spam involves fraud, or includes adult-oriented material that offends recipients or that parents want to protect their children from seeing. Proponents of UCE insist it is a legitimate marketing technique that is protected by the First Amendment. On December 16, President Bush signed into law S. 877, the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act. The law, P.L. 108-187, went into effect on January 1, 2004.
Date: January 30, 2004
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
Date: May 28, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

"Junk E-mail": An Overview of Issues and Legislation Concerning Unsolicited Commercial Electronic Mail ("Spam")

Description: Unsolicited commercial e-mail (UCE), also called “spam” or “junk e-mail,” aggravates many computer users. Not only can it be a nuisance, but its cost may be passed on to consumers through higher charges from Internet service providers who must upgrade their systems to handle the traffic. Proponents of UCE insist it is a legitimate marketing technique and protected by the First Amendment. Legislation to place limits on UCE was considered by the last two Congresses, but no bill cleared Congress. Several bills have been introduced in the 107th Congress. H.R. 718 was reported from the House Energy and Commerce Committee and the House Judiciary Committee (H. Rept. 107-41, Parts 1 and 2). The two versions are quite different. S. 630 was ordered reported from the Senate Commerce Committee.
Date: October 23, 2002
Creator: Smith, Marcia S.
Partner: UNT Libraries Government Documents Department

Law Enforcement Use of Global Positioning (GPS) Devices to Monitor Motor Vehicles: Fourth Amendment Considerations

Description: This report discusses the basics of Global Positioning System (GPS) technology, society's reliance on it, and some of the related legal and privacy implications. In addition, the report examines legislative and judicial responses on both federal and state levels.
Date: February 28, 2011
Creator: Smith, Alison M.
Partner: UNT Libraries Government Documents Department

Law Enforcement Using and Disclosing Technology Vulnerabilities

Description: This report provides background on law enforcement's use of technology vulnerabilities in criminal investigations. It also provides information on the government's system by which agencies collectively determine whether to maintain or disclose newly discovered vulnerabilities. The report also outlines a range of policy issues that may arise regarding the use and disclosure of vulnerabilities in technology.
Date: April 26, 2017
Creator: Finklea, Kristin
Partner: UNT Libraries Government Documents Department

A Legal Analysis of S. 968, the PROTECT IP Act

Description: This report discusses the legality of S. 968, the Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PROTECT IP Act). It is related to the Combating Online Infringement and Counterfeits Act (COICA), which was approved by the Senate Judiciary Committee, but not enacted by the full Senate before the end of the 111th Congress.
Date: July 7, 2011
Creator: Yeh, Brian T. & Miller, Jonathan
Partner: UNT Libraries Government Documents Department

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis

Description: This report analyzes the incentives for companies to share information about cybersecurity breaches with other companies and the federal government. Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information.
Date: December 11, 2014
Creator: Weiss, N. Eric
Partner: UNT Libraries Government Documents Department