Government Information

Earl Gregg Swem Library

Vehicle Cybersecurity

Categories: Consumer Info/Protection,Science/Technology,Telecommunications/Internet,Transportation

http://www.gao.gov/assets/680/676064.pdf

Advanced software  code in vehicles supports safety features but leaves vehicles more vulnerable to cyberattacks.  This report covers key cybersecurity vulnerabilities in modern vehicles, key technologies to mitigate these vulnerabilities, stakeholder views on challenges related to vehicle cybersecurity, and federal efforts to protect vehicle cybersecurity.  From the Government Accountability Office

(consumer info/protection     science/technology     telecommunications/Internet     transportation)

What’s on Television? The Intersection of Communications and Copyright Policies

Categories: Copyright/Patents,Laws/Regulations,Property Rights,Telecommunications/Internet

http://www.fas.org/sgp/crs/misc/R44473.pdf

Reviews the evolution of programming since the 1950s, the regulatory structure that was created to protect property rights and promote competition, and whether that regulatory structure needs major changes in the age of online video distributors.  From the Congressional Research Service, posted by the Federation of American Scientists

 

2015 Country Reports on Human Rights Practices

http://www.state.gov/j/drl/rls/hrrpt/2015/index.htm

The annual report, now in its 40th year, on the status of human rights conditions in 199 countries and territories around the world.  Each country report follows a standard format with sections devoted to civil liberties, political freedoms, corruption in government, human trafficking, and worker rights.  From the State Department

 

The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things

Categories: Laws/Regulations,Science/Technology,Telecommunications/Internet

https://www.ntia.doc.gov/files/ntia/publications/fr_rfc_iot_04062016.pdf

Requests public comment on the potential benefits of the Internet of Things technologies and what role the government should play in promoting such innovations.  Comments received will be used to draft a “green paper” on key issues.  From the National Telecommunications and Information Administration of the Commerce Department

 

FCC Modernizes Lifeline Program for the Digital Age

Categories: Income/Poverty,Telecommunications/Internet,Welfare/Social Services

http://transition.fcc.gov/Daily_Releases/Daily_Business/2016/db0404/DOC-338676A1.pdf

Agency news release about the federal order which expands the Lifeline program, which has helped make telephone service available to the poor since 1985, to broadband Internet service.  Includes links for further information.  From the Federal Communications Commission

 

2017 Defense Posture Statement: Taking the Long View, Investing for the Future

Categories: Defense/Military,Iran,Korea,Russia,Telecommunications/Internet,Terrorism

http://www.defense.gov/Portals/1/Documents/pubs/2017DODPOSTURE_FINAL_MAR17UpdatePage4_WEB.PDF

Devotes sections to countering challenges from terrorism, Russia, North Korea, Iran, and Cyber Warfare. From the Defense Department

 

Chairman Wheeler’s Proposal to Give Broadband Consumers Increased Choice, Transparency and Security with Respect to their Data

Categories: Consumer Info/Protection,Laws/Regulations,Privacy,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2016/db0310/DOC-338159A1.pdf

A proposal that would apply the privacy requirements of the Communications Act to broadband Internet access services. Includes ISP’s duty to keep data secure, data breaches, and consumers’ right to know. From the Federal Communications Commission

 

2015 Data Mining Report to Congress

Categories: Laws/Regulations,Privacy,Science/Technology,Telecommunications/Internet

https://www.dhs.gov/sites/default/files/publications/2015%20Data%20Mining%20Report%20FINAL.pdf

Describes the activities, technology, and methods used by federal security officials, the sources of data used, the results of the activity, legal authorities supporting it, and the impact on citizen privacy. From the Department of Homeland Security

 

Next Page »