Protecting Children From Internet Pornographers Act Of 2011
The Protecting Children from Internet Pornographers Act of 2011 () was a United States bill designed with the stated intention of increasing enforcement of laws related to the prosecution of child pornography and child sexual exploitation offenses. Representative Lamar Smith (R-Texas), sponsor of H.R. 1981, stated that, "When investigators develop leads that might result in saving a child or apprehending a pedophile, their efforts should not be frustrated because vital records were destroyed simply because there was no requirement to retain them." Organizations that support the goal of the bill include the National Sheriffs' Association, the National Center for Missing and Exploited Children (NCMEC), the National Center for Victims of Crime, and Eastern North Carolina Stop Human Trafficking Now. H.R. 1981 has been criticized for its scope and privacy implications. Opponents of the bill, which include Electronic Frontier Foundation (EFF), the American Civil Liberties Union, and ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Bill (proposed Law)
A bill is proposed legislation under consideration by a legislature. A bill does not become law until it is passed by the legislature as well as, in most cases, approved by the executive. Once a bill has been enacted into law, it is called an '' act of the legislature'', or a ''statute''. Bills are introduced in the legislature and are discussed, debated and voted upon. Usage The word ''bill'' is primarily used in Anglophone United Kingdom and United States, the parts of a bill are known as ''clauses'', until it has become an act of parliament, from which time the parts of the law are known as ''sections''. In Napoleonic law nations (including France, Belgium, Luxembourg, Spain and Portugal), a proposed law may be known as a "law project" (Fr. ''projet de loi''), which is a government-introduced bill, or a "law proposition" (Fr. ''proposition de loi''), a private member's bill. For example the Dutch parliamentary system does not make this terminological distinction (''we ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Administrative Subpoena
An administrative subpoena under U.S. law is a subpoena issued by a federal agency without prior judicial oversight. Critics say that administrative subpoena authority is a violation of the Fourth Amendment to the United States Constitution, while proponents say that it provides a valuable investigative tool. History Philip Hamburger argues historical antecedents for the modern-day administrative subpoena date back as far as the Star Chamber and the prerogative courts, which issued warrants and subpoenas that were not subject to significant procedural safeguards or the rule of law. Administrative subpoenas have most commonly been issued by the Offices of the Inspector General of various federal agencies. The Drug Enforcement Administration was granted administrative subpoena authority under the Comprehensive Drug Abuse Prevention and Control Act of 1970. In 1996 Congress expanded the authority to issue the subpoenas to the Federal Bureau of Investigation when investigat ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Data Retention
Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different data retention policies weigh legal and privacy concerns against economics and need-to-know concerns to determine the retention time, archival rules, data formats, and the permissible means of storage, access, and encryption. In the field of telecommunications, data retention generally refers to the storage of call detail records (CDRs) of telephony and internet traffic and transaction data ( IPDRs) by governments and commercial organisations. In the case of government data retention, the data that is stored is usually of telephone calls made and received, emails sent and received, and websites visited. Location data is also collected. The primary objective in government data retention is traffic analysis and mass surveillance. By a ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cyber Intelligence Sharing And Protection Act
The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The stated aim of the bill is to help the U.S. government investigate cyber threats and ensure the security of networks against cyberattacks. The legislation was introduced on November 30, 2011, by Representative Michael Rogers ( R- MI) and 111 co-sponsors. It was passed in the House of Representatives on April 26, 2012, but was not passed by the U.S. Senate. President Barack Obama's advisers have argued that the bill lacks confidentiality and civil liberties safeguards, and the White House said he would veto it. In February 2013, the House reintroduced the bill and it passed in the United States House of Representatives on April 18, 2013, but stalled and was not voted upon by the Senate. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Child Pornography Laws In The United States
Child pornography laws in the United States specify that child pornography is illegal under federal law and in all states and is punishable by up to 20 years' imprisonment or a fine of $5000. The Supreme Court of the United States has found child pornography to be outside the protections of the First Amendment to the United States Constitution. Federal sentencing guidelines on child pornography differentiate between production, distribution, and purchasing/receiving, and also include variations in severity based on the age of the child involved in the materials, with significant increases in penalties when the offense involves a prepubescent child or a child under the age of 12. U.S. law distinguishes between pornographic images of an actual minor, realistic images that are not of an actual minor, and non-realistic images such as drawings. The latter two categories are legally protected unless found to be obscene, whereas the first does not require a finding of obscenity. Definit ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Protecting Children From Internet Predators Act
The ''Protecting Children from Internet Predators Act'' (officially titled Bill C-30, originally titled ''Lawful Access Act'') was a proposed amendment to the Criminal Code introduced by the Conservative government of Stephen Harper on February 14, 2012, during the 41st Canadian Parliament. The bill would have granted authorities new powers to monitor and track the digital activities of Canadians in real-time, required service providers to log information about their customers and turn it over if requested, and made back door entrances mandatory allowing remote access of individuals' electronic information, each without needing a warrant Documents obtained under the ''Access to Information Act'' show that the government desired to use the expanded powers in cases not involving criminality. The bill did not mention children, or internet predators, other than in its title; critics claimed the "feel-good name" was unrelated to the content of the bill, and chosen simply to "sell l ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
John Conyers
John James Conyers Jr. (May 16, 1929October 27, 2019) was an American politician of the Democratic Party who served as a U.S. representative from Michigan from 1965 to 2017. The districts he represented always included part of western Detroit. During his final three terms, his district included many of Detroit's western suburbs, as well as a large portion of the Downriver area. Conyers served more than fifty years in Congress, becoming the sixth-longest serving member of Congress in U.S. history; he was the longest-serving African American member of Congress. Conyers was the Dean of the House of Representatives from 2015 to 2017, by virtue of him being the longest-serving member of Congress at the time. By the end of his last term, he was the last remaining member of Congress who had served since the presidency of Lyndon B. Johnson. After serving in the Korean War, Conyers became active in the civil rights movement. He also served as an aide to Congressman John Dingell ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Zoe Lofgren
Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American lawyer and politician serving as a U.S. representative from California. A member of the Democratic Party, Lofgren is in her 13th term in Congress, having been first elected in 1994. Lofgren has long served on the House Judiciary Committee, and has chaired the House Administration Committee since the beginning of the 116th Congress. Lofgren was the 16th district's first female U.S. representative, before part of the district was redistricted into the 19th congressional district. The district covers much of Santa Clara County, including Gilroy, Morgan Hill, and most of San Jose. Representing a district covering much of Silicon Valley, Lofgren has been noted for her activity in tech-related policy areas such as net neutrality and digital surveillance. Early life, education and career Lofgren was born in San Mateo, California, the daughter of Mary Violet, a school cafeteria employee, and Milton R. Lofgren, a beer ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term " hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subc ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Center For Democracy And Technology
Centre for Democracy & Technology (CDT) is a Washington, D.C.-based 501(c)(3) nonprofit organisation that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing it's potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information. The CDT seeks to mitigate online media censorship, enable individuals to access information freely without retaliation or punishment, and encourages consensus among all parties interested in the future of the Internet. The CDT acts as a non-partisan body, drawing together perspectives from varying backgrounds to emphasize the importance of technology's role in the freedom, expression, security, privacy, and integrity of the individual. It advises government officials, agencies, corporations, and civil society. In addition to its office in Washington, D.C., the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Media Access Control
In IEEE 802 LAN/MAN standards, the medium access control (MAC, also called media access control) sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer. The LLC provides flow control and multiplexing for the logical link (i.e. EtherType, 802.1Q VLAN tag etc), while the MAC provides flow control and multiplexing for the transmission medium. These two sublayers together correspond to layer 2 of the OSI model. For compatibility reasons, LLC is optional for implementations of IEEE 802.3 (the frames are then "raw"), but compulsory for implementations of other IEEE 802 physical layer standards. Within the hierarchy of the OSI model and IEEE 802 standards, the MAC sublayer provides a control abstraction of the physical layer such that the complexities of physical link control are invisible to the LLC and upp ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |