Category: USA Laws

Coronavirus Aid, Relief, and Economic Security Act or the CARES Act- Bill Summary


Coronavirus Aid, Relief, and Economic Security Act or the CARES Act-This bill responds to the COVID-19 (i.e., coronavirus disease 2019) outbreak and its impact on the economy, public health, state and local governments, individuals, and businesses.

Legislative and Legal changes to the US federal bail system


This list cannot detail every event that has altered the manner in which bail has changed. Instead, the focus of this timeline provides evidence that governmental actors must maintain high levels of accountability and transparency through reliance on evidence-based practice. Additionally, this list is meant to emphasize the democratic tradition in which various, committed actors work diligently and continually to enhance the ideals of life, liberty, the pursuit of happiness, and due process that are central to democracy.

History of Pre-trial Services, Sentences Suspension, and Probation in USA


The Probation Act of 1925, signed by President Calvin Coolidge, provided for a probation system in the federal courts (except in the District of Columbia). It gave the courts the power to suspend the imposition or execution of sentence and place defendants on probation for such period and on such terms and conditions as they deemed best. The Act also authorized courts to appoint one or more persons to serve as probation officers without compensation and one salaried probation officer.

Drug Prices: Lowering by Eliminating Kickbacks to Middlemen- US Presidential Executive Order

July 24, 2020-Medicare patients, whose cost sharing is typically based on list prices, pay more than they should for drugs while the middlemen collect large “rebate” checks. These rebates are the functional equivalent of kickbacks, and erode savings that could otherwise go to the Medicare patients taking those drugs. Yet currently, Federal regulations create a safe harbor for such discounts and preclude treating them as kickbacks under the law.

TikTok-President Trump`s Executive Order on banning it and Chinese reaction(Text)

TikTok, a video-sharing mobile application owned by the Chinese company ByteDance Ltd., has reportedly been downloaded over 175 million times in the United States and over one billion times globally. TikTok automatically captures vast swaths of information from its users, including Internet and other network activity information such as location data and browsing and search histories. This data collection threatens to allow the Chinese Communist Party access to Americans’ personal and proprietary information — potentially allowing China to track the locations of Federal employees and contractors, build dossiers of personal information for blackmail, and conduct corporate espionage.

Military Law in the USA

US MILITARY LAW Constitution of the United States: -Article 1, Section 8, Constitution of the United States – 1787: “The Congress shall have Power…To make Rules for the Government and Regulation of […]

Hong Kong is no longer autonomous to get differential treatment-US President’s Executive Order [Text]

the Special Administrative Region of Hong Kong (Hong Kong) is no longer sufficiently autonomous to justify differential treatment in relation to the People’s Republic of China (PRC or China) under the particular United States laws and provisions thereof set out in this order. In late May 2020, the National People’s Congress of China announced its intention to unilaterally and arbitrarily impose national security legislation on Hong Kong.

Tibetan Policy and Support Act of 2019

Notwithstanding that Tibetan Buddhism is practiced in many countries including Bhutan, India, Mongolia, Nepal, the People’s Republic of China, the Russian Federation, and the United States, the Government of the People’s Republic of China has repeatedly insisted on its role in managing the selection of Tibet’s next spiritual leader, the Dalai Lama, through actions such as those described in the “Measures on the Management of the Reincarnation of Living Buddhas” in 2007.

Tibetan Policy Act of 2001


The People’s Republic of China has failed to respond to  efforts by the United States and others to initiate a dialogue  between the Chinese leadership and the Dalai Lama or his  representatives leading to a mutually beneficial negotiated  solution with respect to Tibet.

Meaning for the term “positive law” with respect to the United States Code


Positive law is distinguishable from natural law. The term “natural law”, especially as used generally in legal philosophy, refers to a set of universal principles and rules that properly govern moral human conduct. Unlike a statute, natural law is not created by human beings. Rather, natural law is thought to be the preexisting law of nature, which human beings can discover through their capacity for rational analysis.

Taiwan Travel Act-2018

The United States considers any effort to determine the future of Taiwan by other than peaceful means, including by boycotts or embargoes, a threat to the peace and security of the Western Pacific area and of grave concern to the United States.

Advancing International Religious Freedom- US Presidential Executive Order 2020

Religious communities and organizations, and other institutions of civil society, are vital partners in United States Government efforts to advance religious freedom around the world. It is the policy of the United States to engage robustly and continually with civil society organizations—including those in foreign countries—to inform United States Government policies, programs, and activities related to international religious freedom.

Statutory Rape Issues in USA


Currently, all States have laws that prohibit sexual intercourse with persons under a certain age. Although commonly referred to as “statutory rape” laws, the term is not usually found in criminal statutes. Rape, sexual assault, and unlawful sexual intercourse are some of the more commonly used terms.



The term “cybersecurity purpose” means the purpose of protecting an information system or information that is stored on, processed by, or transiting an information system from a cybersecurity threat or security vulnerability. […]