FCC Record, Volume 33, No. 14, Pages 8542 to 9405, September 3 - September 28, 2018 (open access)

FCC Record, Volume 33, No. 14, Pages 8542 to 9405, September 3 - September 28, 2018

Biweekly, comprehensive compilation of decisions, reports, public notices, and other documents of the U.S. Federal Communications Commission.
Date: September 2018
Creator: United States. Federal Communications Commission.
System: The UNT Digital Library
Texas Historical Commission Requests for Legislative Appropriations: Fiscal Years 2022 and 2023 (open access)

Texas Historical Commission Requests for Legislative Appropriations: Fiscal Years 2022 and 2023

Report submitted by the Texas Historical Commission to the Texas 87th regular legislature requesting appropriations to fund programming and activities. It includes an overview of the institution's goals, summaries of appropriations requests for fiscal years 2022 and 2023, and supporting documentation.
Date: September 18, 2018
Creator: Texas Historical Commission
System: The Portal to Texas History
National Cyber Strategy of the United States of America (open access)

National Cyber Strategy of the United States of America

With the release of this National Cyber Strategy, the United States now has its first fully articulated cyber strategy in 15 years. This strategy explains how the US will: Defend the homeland by protecting networks, systems, functions, and data; Promote American prosperity by nurturing a secure, thriving digital economy and fostering strong domestic innovation; Preserve peace and security by strengthening the ability of the United States — in concert with allies and partners — to deter and, if necessary, punish those who use cyber tools for malicious purposes; and Expand American influence abroad to extend the key tenets of an open, interoperable, reliable, and secure Internet. The new U.S. cyber strategy seeks to allay some of those concerns by promoting responsible behavior in cyberspace, urging nations to adhere to a set of norms, both through international law and voluntary standards. It also calls for specific measures to harden U.S. government networks from attacks, like the June 2015 intrusion into the U.S. Office of Personnel Management (OPM), which compromised the records of about 4.2 million current and former government employees. And the strategy calls for the U.S. to continue to name and shame bad cyber actors, calling them out publicly for …
Date: September 2018
Creator: United States. White House Office.
System: The UNT Digital Library