Government Information

Earl Gregg Swem Library

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Categories: Homeland Security,Laws/Regulations,Privacy,Property Rights,Telecommunications/Internet,Terrorism

http://www.fas.org/sgp/crs/intel/R43941.pdf

In view of frequent cyberattacks on government and private web sites, experts have urged greater public-private cooperation and sharing of cyber-threat intelligence.  This report examines various legal issues that confront such information  sharing, such as privacy and tort laws and intellectual property concerns.  From the Congressional Research Service, posted by the Federation of American Scientists

 

Presidential Memorandum: Expanding Broadband Deployment and Adoption ….

Categories: Agriculture/Rural Issues,Laws/Regulations,Presidency,Telecommunications/Internet

https://www.whitehouse.gov/the-press-office/2015/03/23/presidential-memorandum-expanding-broadband-deployment-and-adoption-addr

Presidential directive that executive branch agencies identify funds, programs, and regulatory actions that could enhance broadband access to an estimated 50 million Americans who currently lack such access.  From the White House

 

FCC Finds U.S. Broadband Deployment Not Keeping Pace

Categories: Agriculture/Rural Issues,Telecommunications/Internet

https://apps.fcc.gov/edocs_public/attachmatch/DOC-331760A1.pdf

Agency press release about release of 2015 Broadband Progress Report and percentage of Americans, mostly in rural areas, who lack access to newly adopted 25 megabits per second download speed standards.  From the Federal Communications Commission

 

Analytics.USA.gov

Categories: Govt Information,Telecommunications/Internet

https://analytics.usa.gov/

Shows how many people are using which U.S. federal government agency websites at any particular time and what devices, browsers, and operating systems are being used for the connections.  From the Digital Analytics Program and the White House

 

Defensive Best Practices for Destructive Malware

Categories: Consumer Info/Protection,Spying/Intelligence,Telecommunications/Internet

https://www.nsa.gov/ia/_files/factsheets/Defending_Against_Destructive_Malware.pdf

Details several steps that network administrators can take to detect, contain and minimize destructive malware infections.  From the Information Assurance Directorate of the National Security Agency

 

FCC Open Internet Order

Categories: Headlines,Laws/Regulations,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/DOC-332486A1.pdf

Three page agency press release which summarizes the content of the final rules which regulate the Internet like a public utility.   From the Federal Communications Commission

 

In the Matter of Protecting and Promoting the Open Internet

Categories: Headlines,Laws/Regulations,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0312/FCC-15-24A1.pdf

The 400 page text of the controversial regulations relating to broadband Internet service providers, plus supporting and dissenting statements from FCC commissioners and the legal authority behind the rules.  From the Federal Communications Commission

 

The Darknet and Online Anonymity

Categories: Great Britain,Privacy,Science/Technology,Telecommunications/Internet

http://www.parliament.uk/briefing-papers/POST-PN-488.pdf

Technologies that allow Internet users to be anonymous help citizens protect their security but also facilitate organized crime such as the Silk Road drug market.  This report discusses the challenge of preventing such crimes without compromising other uses of anonymity technology.  From the Parliamentary Office of Science and Technology

 

Next Page »