{ "id": "RL31289", "type": "CRS Report", "typeId": "REPORTS", "number": "RL31289", "active": false, "source": "EveryCRSReport.com", "versions": [ { "source": "EveryCRSReport.com", "id": 305581, "date": "2002-03-04", "retrieved": "2016-05-24T20:14:23.643941", "title": "The Internet and the USA PATRIOT Act: Potential Implications for Electronic Privacy, Security, Commerce, and Government", "summary": "The September 11, 2001 terrorist attacks prompted congressional action on many fronts,\nincluding\npassage of the United and Strengthening America by Providing Appropriate Tools Required to\nIntercept and Obstruct Terrorism (USA PATRIOT) Act, P.L. 107-56 . The Act is broadly scoped,\nand some of its provisions may affect Internet usage, computer security, and critical infrastructure\nprotection.\n In the area of computer security, the Act creates a definition of \"computer trespasser\" and\nmakes such activities a terrorist act in certain circumstances. The Act enables law enforcement\nofficials to intercept the communications of computer trespassers and improves their ability to track\ncomputer trespasser activities. It also codifies some elements of U.S. critical infrastructure policy\narticulated by both the Clinton and George W. Bush Administrations to ensure that any disruptions\nto the nation's critical infrastructures are minimally detrimental.\n \n Although the Act does not explicitly address electronic commerce (e-commerce), many of the\nlaw's provisions may impact it. In particular, Title III responds to concerns that more can be done\nto prevent, detect, and prosecute international money laundering and the financing of terrorism. \nOver time, these provisions may affect e-commerce broadly, and electronic fund transfers\nspecifically.\n Electronic government (e-government) could be affected by the Act in both positive and\nnegative ways. The intense focus on improving data collection and information sharing practices\nand systems may contribute to the establishment of government-wide technical standards and best\npractices that could facilitate the implementation of new and existing e-government initiatives. It\ncould also promote the utilization of secure Web portals to help ensure the data integrity of\ntransactions between the government and citizens and business. However, concern about potential\nabuses of data collection provisions could dampen citizen enthusiasm for carrying out electronic\ntransactions with the government. \n The Act provides law enforcement officials with greater authority to monitor Internet activity\nsuch as electronic mail (e-mail) and Web site visits. While law enforcement officials laud their new\nauthorities as enabling them to better track terrorist and other criminal activity, privacy rights\nadvocates worry that, in an attempt to track down and punish the terrorists who threaten American\ndemocracy, one of the fundamental tenets of that democracy--privacy--may itself be threatened. \n Because of the controversial aspects of some provisions in the Act, particularly regarding\nprivacy, Congress and other groups are expected to monitor closely how the Act is implemented.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL31289", "sha1": "5f79b9847f9a96c537ecd96beb9376a7f797b6e6", "filename": "files/20020304_RL31289_5f79b9847f9a96c537ecd96beb9376a7f797b6e6.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL31289", "sha1": "a3c429d90f7c512fb48564b23fdee14ddc3589e0", "filename": "files/20020304_RL31289_a3c429d90f7c512fb48564b23fdee14ddc3589e0.pdf", "images": null } ], "topics": [] } ], "topics": [ "Intelligence and National Security", "Internet and Telecommunications Policy", "Science and Technology Policy" ] }