Technology Acts

In: Business and Management

Submitted By gavingarrett
Words 479
Pages 2
Information Technology Act

There are several advances in information technology that resulted in new ethical issues that brought on the creation of certain acts. The two acts which will be discussed in this paper are the Children’s Internet Protection Act of 2000 (CIPA), and Children’s Online Privacy Protection Act of 1988 (COPPA). Children’s Internet Protection Act is a federal law that was passed by congress that went into effect April 20, 2001 ( para1). The purpose behind the Children’s Internet Protection Act is to help block and filter certain material from being accessed through the internet. ( para1). As the technology advances the local school systems have begun using computers/internet to teach children how to research subjects and to learn the technology of this day and time, which is also covered under this particular act that each school that has computers as a teaching tool is required to have filter system to keep minors from seeing cites that are not appreciate. The main purpose with the Children’s Internet Protection is to prevent children from today’s exposure for example pornographic images that are unsuitable for children.
Modern Technology has become an important tool in our society from online banking to entering an address and receives step by step directions; if it appeals to adults then children interest will be a larger version of appeal. The internet is growing and children are being brought up in different society, learning how to use modern technology at a young age. Technology has become so advance, a computer is no longer needed because internet is available on the go, through smart phones and tablets. Children of all ages participate in the internet, even two and three year old kids most may not know the games they are playing can be an access to sites that we as parents do not want them to see. School age children…...

Similar Documents

Information Technology Acts Paper

...Information Technology Acts Paper Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the individual consumer. The advances have not only made it possible to access information at home but also encourage teenagers and younger children to participate in gathering information via the Internet. Access to the web by children led to the enactment of laws such as the Children Internet Protection Act (CIPA) and the Children’s Online Privacy Protection Act (COPPA). These acts were implemented as a security method to aid in the protection of minors. Some websites containing nudity, online pornography, and other explicit content are banned from exploiting children. Children are viewed as easy victims to trick into providing private information or soliciting monetary compensation for obscene content. Because of this perception, additional laws are necessary to protect children when in comes to information technology. CIPA places restrictions on schools and libraries such as limiting the support of federal funding if certain requirements are not adhered. This act was signed by former President Bill Clinton in December 21, 2000. The......

Words: 576 - Pages: 3

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can......

Words: 1012 - Pages: 5

Information Technologies Act

...In discussing the advances in information technology, that resulted in new ethical issues necessitating in the creation preventive measures, we will look into; The Children’s Online Privacy Act, 2000 as well as the No Electronic Theft (NET) Act, 1997. Both of these acts were created due to unethical actions by a group of people or a person. The Children’s Online Privacy Act or CIPA, was created in 2000 because there was a concern about the material children were being exposed to online. The advancement in information technology made it even easier for children to have access to anything online. In order to combat this, CIPA would offer incentives to participate in a program that would aid in the protection of children by providing discounts to those who agree to participate. In order to participate in this program, a school or library would have to agree to have a town hall meeting to address the proposal of implementing the Internet monitoring and safety program. Once the public is informed, then they must agree to monitor the activities while children are online as well as, but also educate the children on what behavior is inappropriate. Once the school or library agrees to use and implement the safety policies by created CIPA, certain guidelines must be laid out and followed. CIPA will then address potential issues and how they are to be dealt with. They must have procedures to not only monitor inappropriate behavior by minors but also to inform them of what......

Words: 673 - Pages: 3

Information Technology Acts

...Information Technology Acts BIS/220 February 25, 2013 Abstract The basis of this paper is to explain the advances in information technology that ultimately resulted with the creation of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These two acts are beneficial to the privacy of oneself regarding medical files and the protection that the Federal Trade Commission provides to children while they are using the Internet. The paper will go farther into detail about why these acts were created and how they are beneficial to society today and for our future. Information Technology Acts The many advances of information technology have resulted in ethical issues requiring the creation of many important acts. Information technology is a very important branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information. Two acts specifically are the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These acts were carried out for many reasons, including; but not limited to privacy of personal health care information and protecting our children’s identities on the Internet. According to Sage Knowledge (2009), the Health Insurance Portability and Accountability Act of 1996, also known as HIPAA, is a......

Words: 734 - Pages: 3

Technology Acts

...Technology Acts BIS/220 Technology Acts The fair credit reporting act, this act was a direct result of falsified information being relayed to credit bureau. In order to create equality among the people it is required to develop standard for all. This act was a direct result of falsified, unauthorized, and misrepresentation of person’s information. The government was obligated to standardize this industry based on the number of people it directly affected. Based on the information found from the government archives at, the facts show that this act was put into place as a direct reflection of falsified information being presented to the credit reporting agencies. In doing so now resulting in jail time is a deterrent for people that are also putting false information on credit aps as well as other credit reporting violations. Such as requiring proof of income, length of residency and work history this allows the credit bureau to have more accurate information and the ability to correctly judge a person’s ability to pay and reliability. Based on the facts and information provided from the government agencies the fair credit reporting act was a direct result of credit reporting fraud as well as false information being provided on credit reports. Do Not Call Implementation Act, 2003, this act was a direct result of unwanted telemarketing calls, this act was implemented do to call lists that fell into the hands of telemarketing companies. This act protects people...

Words: 453 - Pages: 2

Information Technology Act

...Information Technology Acts Sherwoska Smith BIS/220 July 3, 2013 Information Technology Acts Although some people still take pleasure in writing checks, checks are a thing of former times. Some people also still carry out most of their banking necessities inside a local branch however majority of their needs can be handle online from the convince of their home. The advancements in information technology have been the basis for the creation of the Electronic Funds Transfer Act, 1978 and the No Electronic Theft (NET) Act, 1997. According to "Consumer Affairs Laws And Regulations" (2010), " The Electronic Fund Transfer Act (EFTA) (15 USC 1693 et seq.) of 1978 is intended to protect individual consumers engaging in electronic fund transfers (EFTs). EFT services include transfers through automated teller machines, point-of-sale terminals, automated clearinghouse systems, telephone bill-payment plans in which periodic or recurring transfers are contemplated, and remote banking programs.” (Electronic Funds Transfer Act). According to "University Information Technology Services" (2005-2013), Congress enacted the No Electronic Theft (NET) Act in 1997 to facilitate prosecution of copyright violation on the Internet. The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or...

Words: 346 - Pages: 2

Technology Acts

...Technology Acts Dionne Grace BIS/220 October 7, 2013 Bardwell White Technology Acts Ethics in short is moral; it is the principles that dictate a group’s or individual’s behavior. It is not only used in the personal lives of people, but it is also used in the life of business. This paper will give a brief description of advances in information technology as it relates to ethical issues and the development of two acts: Children’s Internet Protection Act- 2000, and No Electronic Theft (NET) Act- 1997. Children’s Internet Protection Act The internet has become a very critical tool for children’s learning and success. It has become a threshold to a variety of expression and skills; however, while positive avenues are available to children via internet so are negative. Children are exposed to inappropriate material and materials that can be potentially harmful: promotion of violence, hate sites, pornography, etc… According to Department of Commerce (2003), “In October 2000, Congress passed the Children’s Internet Protection Act (CIPA), which requires schools and libraries that receive federal funds for discounted telecommunications, internet access, or internal connections services to adopt an internet safety policy and employ technological protections that block or filter certain visual depictions deemed obscene, pornographic, or harmful to minors” (para. 3). This implementation was successful after previous Congressional attempts to protect children...

Words: 754 - Pages: 4

Information Technology Acts

...Information Technology Acts Mayra Gonzalez BIS/220 October 28, 2013 Jadie Giorgis Information Technology Acts While information technology continual to move ahead over the years, ethical concerns turn into an issue. Accordingly, the government executed specific acts to govern these concerns. Even as some of these acts exists, this text centered on two sections specifically: US Patriot Act of 2001, and Fair Credit Reporting Act of 1970. Whereas the Patriot Act was executed to lessen terrorist activities by the use of the internet, the Fair Credit Act was executed to give every American with be on a par with credit opportunities. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also well-known as the Patriot Act of 2001 was enacted in 2001. The Patriot Act was established to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and other purposes” (US). Table 1.1 below provides a synopsis of the sections of the Patriot Act involving financial institutions and their operations. Table 1.1 Sections of the Patriot Act of 2001 Section Purpose | 311 “Special Measures for Jurisdictions, Financial Institutions, or International Transactions of Primary Money Laundering Concern | 312 Special Due Diligence for Correspondent Accounts and Private Banking Accounts | 313 Prohibition on U.S. Correspondent Accounts with Foreign......

Words: 998 - Pages: 4

Information Technology Acts Paper

...Information Technology Acts Paper University of Phoenix Information Technology Acts Paper To start, I will begin with introducing my first Act that I am covering, The "Controlling the Assault of Non-Solicited Pornography and Marketing Act Of 2003" Otherwise known as the (CAN-SPAM Act) of 2003. The CAN-SPAM Act defines a "commercial electronic mail message" ("CEMM") as any electronic mail message, the primary purpose of which is commercial advertisement or the promotion of a commercial product or service (including content on an Internet web site operated for a commercial purpose). To put it all in a nutshell the best I can; Emails and the internet are now becoming more and more popular now it’s 2003. Advancement in Computer systems and electronic mail messages led to a big increase in business’s in America sending misleading or deceptive emails to try to sell a product or service. To summarize it in a few sentences, businesses were flat out lying via subject headings, addresses, having multiple email accounts, etc. etc. Also, Sending a CEMM that includes sexually oriented material without adequate warnings in the subject heading and an opt out message prior to displaying any additional information in the message is prohibited. With Microsoft, Apple, and others producing advancement in computers, phones, and technology, the internet was becoming a portal for pornography companies and others to sell their product or service. The American public got tired of it and told...

Words: 683 - Pages: 3

Information and Technology Acts

...Terrorism Strikes Janay Garcia BIS/220 1 April 2014 C. Chevannes When Terrorism Strikes Abuse of national security and terrorism are two of the most important issues our country is fighting to this day. Two acts have been implemented to help control these issues; although they were implemented 15 years apart they go hand in hand in protecting our country. The Computer Fraud and Abuse Act (CFAA) was created in 1986 and states that anyone who obtains information without authorization is punishable under the Act. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) was established in 2001 after the terrorist attack on September 11, 2001. This Act allowed law enforcement to use tools that were already available to detect and prevent terrorism. What were the advances in technology that necessitated the creation of these acts? There are seven crimes listed under the CFAA: obtaining national security information, trespassing in a government computer, damaging a computer or information, compromising confidentiality, trafficking in passwords, threatening to damage a computer, and accessing to defraud and obtain value. Essentially, this act protects against hacking. The evolution of information technology (IT) though, has increased the vulnerability of our society. Robert Morris was the first person to be indicted under the CFAA in 1990. Morris was a graduate student at Cornell when he released a......

Words: 519 - Pages: 3

Information Technology Acts

...Information Technology Acts Eric Mahoney BIS/220 July 14, 2014 Julie Ruse Information Technology Acts As technology has advanced, the need to set rules and regulations have increased to protect consumers from abuse from corporations as they use this new technology. With the speed of new leaps in the technological advances Congress has created laws such as Do Not Call Implementation Act (2003), Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) 2001, Children's Internet Protection Act (2000), No Electronic Theft (NET) Act (1997), Telephone Consumer Protection Act (TCPA) 1991, Video Privacy Protection Act, 1988 and the Computer Fraud and Abuse Act (1986). These are just a few that have come into existence from the information boom. This paper will focus on the Telephone Consumer Protection Act and the Do Not Call Implementation Act. Congress passed the Telephone Consumer Protection Act (TCPA) in 1991 as an answer to the consumer concerns about the rising number of unsolicited telephone marketing calls to their homes. ("Unwanted Telephone Marketing Calls", n.d.) The use of automated and prerecorded messages also helped push the call for federal regulation to be put into place. In response the FCC (Federal Communication Commission) set rules that necessitate that anyone making a solicitation call to your home must make available his or her name, the name of the person or entity on whose......

Words: 438 - Pages: 2

Information Technology Acts Paper

...Information Technology Acts Paper MPS BIS/220 July 21, 2014 JM Information Technology Acts Paper With the advancement of technology, like practically everything which exists, comes the pros and the cons, the advantages and disadvantages, the benefits and the liabilities. The Internet or the World Wide Web is no different. It has exposed individuals to a literal wealth of information. It has opened borders, exposed cultures and vastly improved knowledge and productivity. In essence, the Internet has made the world a "smaller" place in that, a person can hold a face-to-face conversation with another person on the other side of the world without ever boarding a plane and information can be sent hundreds of thousands of miles in seconds. But this information highway is not only used to share useful and appropriate information but also harmful and offensive messages, leaving the most vulnerable users, children, at risk. In an effort to protect American children using the vast and almost uncensored internet, in 2000, two Acts took effect, the Children's Internet Protection Act, 1998 and Children's Online Privacy Protection Act, 2000. Due to the advancement in information technology and rising ethical issues, these Acts were necessary in order to hold internet vendors and website operators accountable for the proper handling of children where their personal information and the nature of the information they are exposed to are applicable. The first Act, The Children's......

Words: 610 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper George Tomadakis BIS/220 January 16, 2012 Marry Robbins Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This was a very sound control. Then the Internet came in the 1990’s, children had unsupervised access. The porn industry went crazy; they would do anything to get anyone to their sites. Children were being exposed to it and it was deemed harmful. Congress tried to pass laws to stop it, but every direction they went was determined to be unconstitutional. Finally technology prevailed, to an extent. Maybe Congress could not pass a law that would penalize the distributor; they could pass a law that would affect the end user that received federal money. On December 15, 2000 Congress added the Children’s Internet Protection Act and President Bill Clinton signed it into law on December 21, 2000. The Act places restrictions on entities receiving Federal funding. They must use policies and technology that blocks or filters certain material from being accessed using the internet. ("American Library Association", 1997-2012). The Internet with all of its wonders was not only being used to show are children imagery and information, the technology......

Words: 471 - Pages: 2

Technology Information Act

...Information Technology Act BIS/220 April 23, 2012 Information Technology Act In the world we live in today, there’s some type of electronic device being used to connect to the Internet. “The world-wide platform enable individuals to connect, compute, communicate, compete, and collaborate everywhere, and anywhere, anytime and all the time, and to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries. Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000 In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009). “The major concern with the......

Words: 710 - Pages: 3

Information Technology Act

...Information technology as we know of today has came a very long way this past couple of decades. Internet has placed our world at our fingertip. If a person need to find information regarding a subject, if they need to learn about different country and their culture they can go online and research the information without leaving the comfort of their home. With all these advancement internet also has its downside. Anyone with the access to internet can post any information online, not only can they post wrong information, they can also post things that are not suitable for certain audience. Also, through internet commercial companies can collect personal and valuable information from children. With all the new ethical issues that resulted from the advancement of the information technology their had to be certain rules implemented to keep the children safe. Children have access to internet at home, school and library. Internet has become a major tool for todays education. Children are encouraged to use internet to do research and find information for their projects. While they have free access to online information it is also important to monitor the use of internet by young children. When children access the internet it can put them in contact with information that are not suitable for them. While some children might come across inappropriate material inadvertently their are also children who might seek out inappropriate material voluntarily. There are sites that promote...

Words: 665 - Pages: 3