Congressional Research Service Reports - 23 Matching Results

Search Results

The National Institute of Standards and Technology: An Overview
This report discusses the National Institute of Standards and Technology (NIST) that has a mandate to increase the competitiveness of U.S. companies. NIST research also provides the measurement, calibration, and quality assurance techniques that underpin U.S. commerce.
Cooperative Research and Development Agreements
A Cooperative Research and Development Agreement (CRADA) is a mechanism established by P.L. 99-602, the Federal Technology Transfer Act, to allow the transfer of technology, knowledge, and expertise from government laboratories to the private sector for further development and commercialization. The government provides support in the way of overhead for research and development performed in the federal laboratory and is prohibited from providing funding directly to the partner in the collaborative effort. Currently, more than 5,000 CRADAs have been signed. As the 105th Congress determines its approach to science and technology policies, the role of CRADAs continues to be debated within the context of federal support for R&D
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Report that provides an overview of the "digital divide", which is a term used to describe a perceived gap between those Americans who use or have access to telecommunications and information technologies and those who do not.
Spyware: Background and Policy Issues for Congress
The term "spyware" is not well defined. Generally, it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit their information to someone else. Most spyware is installed surreptitiously, and most users are therefore unaware that spyware exists on their computers. A central point of the spyware debate in Congress is whether new laws are needed, or if industry self-regulation, coupled with enforcement actions under existing laws, such as the Trade Commission Act, is sufficient.
Third Generation ("3G") Mobile Wireless Technologies and Services
No Description Available.
The National Institute of Standards and Technology: An Overview
No Description Available.
Extending the Internet Tax Moratorium and Related Issues
The Internet Tax Freedom Act, enacted in 1998, placed a 3-year moratorium on the ability of state and local governments 1) to impose new taxes on Internet access or 2) to impose multiple or discriminatory taxes on electronic commerce. It grandfathered existing taxes on Internet access. The original moratorium expired on October 21, 2001. Numerous bills to extend the moratorium were introduced in the first session of the 107th Congress. The Congress approved H.R. 1552 (P.L. 107-75, enacted November 28, 2001) which extended the prior moratorium by 2 years, until November 1, 2003.
Broadband Internet Access and the Digital Divide: Federal Assistance Programs
Some policymakers, believing that disparities in broadband access across American society could have adverse economic and social consequences on those left behind, assert that the federal government should play a more active role to avoid a “digital divide” in broadband access. One approach is for the federal government to provide financial assistance to support broadband deployment in underserved areas. Others, however, believe that federal assistance for broadband deployment is not appropriate. Some opponents question the reality of the “digital divide,” and argue that federal intervention in the broadband marketplace would be premature and, in some cases, counterproductive.
Spyware: Background and Policy Issues for Congress
No Description Available.
Border Searches of Laptop Computers and Other Electronic Storage Devices
This report discusses a developing issue in the law of search and seizure: whether the Fourth Amendment of the U.S. Constitution permits warrantless searches of the content of laptop computers and other electronic storage devices at U.S. borders. The federal courts that have addressed this issue have held that the border search exception to the Fourth Amendment applies to these searches, making warrantless searches permissible.
Smartphone Data Encryption: A Renewed Boundary for Law Enforcement?
This report briefly examines new issues for law enforcement regarding data encryption and smartphones including cyber-criminals and Apple's new privacy policy that removes the back-doors that law enforcement used to be able to use to access user data.
Cybersecurity: Legislation, Hearings, and Executive Branch Documents
This report provides links to cybersecurity-related committee hearings in the 112th, 113th, and 114th Congresses. It also provides a list of executive orders and presidential directives pertaining to information and computer security.
Cyber Intrusion into U.S. Office of Personnel Management: In Brief
This report provides an overview of the current understanding of the recent U.S. Office of Personnel Management (OPM) breaches, which may have compromised personal information of former and current federal employees. It also discusses issues and questions raised about the source of the breaches, possible uses of the information exfiltrated, potential national security ramifications, and implications for the cybersecurity of federal information systems.
Office of Science and Technology Policy (OSTP): History and Overview
This report is about the history, role, and function of the Office of Science and Technology Policy (OSTP) that exists to advise the President on matters related to science, engineering, and technology. It includes charts outlining both historical and current funding for the OSTP and past and present OSTP advisers organized by President.
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
Cybersecurity: Authoritative Reports and Resources
This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation, Executive Orders and Presidential Directives, Data and Statistics, Cybersecurity Glossaries", Reports by Topic, Government Accountability Office (GAO) reports, White House/Office of Management and Budget reports, Military/DOD, Cloud Computing, Critical Infrastructure, National Strategy for Trusted Identities in Cyberspace (NSTIC), Cybercrime/Cyberwar, International, Education/Training/Workforce, and Research and Development (R&D)
R&D Partnerships: Government-Industry Collaboration
Efforts by the 104th Congress to eliminate several government-industry-university research and development partnership programs reflected some opposition to federally funded programs designed to facilitate the commercialization of technology. Within the context of the budget decisions, the 106th Congress is expected to again debate the government's role in promoting collaborative ventures focused on generating new products and processes for the marketplace.
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
This report presents a working definition for the term “cyber terrorism”, plus background information describing how current technology and management processes may leave computers exposed to cyber-attack, and a discussion of possible effects of a cyber-attack. Potential issues for Congress are presented in the second section, including: whether appropriate guidance exists for a DOD information warfare response to a cyber-attack; whether the need to detect possible cyber terrorist activity interferes with individual privacy; whether the roles and responsibilities for protecting against a possible cyber terrorist attack need more clarity for government, industry, and home users; and, whether information sharing on cyber threats and vulnerabilities must be further increased between private industry and the federal government. The final section describes possible policy options for improving protection against threats from possible cyber terrorism.
Information Brokers: Federal and State Laws
No Description Available.
Spyware: Background and Policy Issues for Congress
No Description Available.
U.S. Initiatives to Promote Global Internet Freedom: Issues, Policy, and Technology
This report provides information regarding the role of U.S. and other foreign companies in facilitating Internet censorship by repressive regimes overseas. The report is divided into several sections: Examination of repressive policies in China and Iraq, Relevant U.S. laws, U.S. policies to promote Internet freedom, Private sector initiatives, and Congressional action.
America COMPETES Act: Programs, Funding, and Selected Issues
This report explores and describes in detail the America COMPETES Act (P.K. 110-69), which became law on August 9, 2007. The act responds to concerns that the United States may not be able to compete economically with other nations in the future due to insufficient investment today in science and technology research and science, technology, engineering, and mathematics (STEM) education and workforce development. This report explains the aims and design of the America COMPETES Act, what funding developments the act authorizes, what education activities the act involves, and related legislation and government programs.
America COMPETES Act: Programs, Funding, and Selected Issues
This report provides an overview of the America COMPETES Act provisions, summarizes its legislative origin and the origins of some of the new programs it authorizes, analyzes selected America COMPETES Act programs that are the focus of appropriation discussions, and provides a comparison of the President's budget, congressional appropriations, and America COMPETES Act authorization levels for FY2008.