The Congressional Record is a unique source of public documentation. It started in 1873, documenting nearly all the major and minor policies being discussed and debated.
“REPORTS OF COMMITTEES” mentioning the U.S. Dept of State was published in the Senate section on pages S5902 on Sept. 22, 2011.
The publication is reproduced in full below:
REPORTS OF COMMITTEES
The following reports of committees were submitted:
By Mr. HARKIN, from the Committee on Appropriations, without amendment:
S. 1599. An original bill making appropriations for Departments of Labor, Health and Human Services, and Education, and related agencies for the fiscal year ending September 30, 2012, and for other purposes (Rept. No. 112-84).
By Mr. LEAHY, from the Committee on Appropriations, without amendment:
S. 1601. An original bill making appropriations for the Department of State, foreign operations, and related programs for the fiscal year ending September 30, 2012, and for other purposes (Rept. No. 112-85).
By Mr. INOUYE, from the Committee on Appropriations:
Special Report entitled ``Further Revised Allocation to Subcommittees of Budget Totals for Fiscal Year 2012'' (Rept. No. 112-86).
By Mr. LEAHY, from the Committee on the Judiciary, with an amendment:
H.R. 2480. A bill to amend title 5, United States Code, to authorize appropriations for the Administrative Conference of the United States for fiscal years 2012, 2013, and 2014, and for other purposes.
By Mr. LEAHY, from the Committee on the Judiciary, with an amendment in the nature of a substitute:
S. 1151. A bill to prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal penalties, law enforcement assistance, and other protections against security breaches, fraudulent access, and misuse of personally identifiable information.
S. 1535. A bill to protect consumers by mitigating the vulnerability of personally identifiable information to theft through a security breach, providing notice and remedies to consumers in the wake of such a breach, holding companies accountable for preventable breaches, facilitating the sharing of post-breach technical information between companies, and enhancing criminal and civil penalties and other protections against the unauthorized collection or use of personally identifiable information.
____________________