...Information Technology Acts Paper Jessica Jordan BIS/220 Mai Nguyen October 17, 2011 Information technology has greatly advanced through the years. For the most part, these advancements are beneficial to consumers, however, the advancements have also made it necessary for the government to step in to create acts in order to set restrictions and help protect consumers’ rights. Two of the acts implemented are the Children’s Internet Protection Act, 2000 and the Do Not Call Implementation Act, 2003. The Children’s Internet Protection Act, 2000 is a federal law that requires schools and libraries to certify that they have an Internet safety policy that takes measures to block or filter Internet access to pictures that are obscene or child pornographic and, for computers that are accessible to minors, pictures that are harmful to minors. Schools and libraries are also required to implement an Internet safety policy which addresses minors’ access to inappropriate matter, minors’ use of electronic mail and chat rooms, unauthorized access by minors online, disclosure of personal information regarding minors, and minors’ access to harmful materials. Also, schools are required to monitor online activities of minors (Federal Communications Commission Guide, 2011). The advances in information technology that resulted in the Children’s Internet Protection Act, 2000 are the popularity of the Internet and the ease of access to share information through this source. The Internet...
Words: 565 - Pages: 3
...NAME Advances in Information Technology BIS 220 DATE Information technology has made an astounding measure of advancements in the last few decades. Information technology has become a large part of our daily lives from educational uses to entertainment and communication. With the continued advances in technology, new ethical issues arose and created a need for new laws and regulations. The following paper will discuss two separate acts, the Health Insurance Portability and Accountability Act (HIPAA) and the Children’s Internet Protection Act (CIPA). Health information technology (IT) is a frequently used system that has improved the quality of health care while preventing medical errors, decreasing paperwork, and reducing healthcare cost just to name a few important aspects. “It is imperative that the privacy and security of electronic health information be ensured as this information is maintained and transmitted electronically” (U.S. Department of Health and Human Services, 1996). Health IT includes the use of computer software to store important health information for patients and gives the ability to share within a secure system. The importance of protection and laws was necessary with this new form of technology because of the ethical issue of possibly placing personal health information into the wrong hands. HIPAA was enacted in 1996 by Congress to ensure security and privacy of patient’s health information because of the new advances in health information...
Words: 679 - Pages: 3
...Information Technology Acts Eric Mahoney BIS/220 July 14, 2014 Julie Ruse Information Technology Acts As technology has advanced, the need to set rules and regulations have increased to protect consumers from abuse from corporations as they use this new technology. With the speed of new leaps in the technological advances Congress has created laws such as Do Not Call Implementation Act (2003), Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) 2001, Children's Internet Protection Act (2000), No Electronic Theft (NET) Act (1997), Telephone Consumer Protection Act (TCPA) 1991, Video Privacy Protection Act, 1988 and the Computer Fraud and Abuse Act (1986). These are just a few that have come into existence from the information boom. This paper will focus on the Telephone Consumer Protection Act and the Do Not Call Implementation Act. Congress passed the Telephone Consumer Protection Act (TCPA) in 1991 as an answer to the consumer concerns about the rising number of unsolicited telephone marketing calls to their homes. ("Unwanted Telephone Marketing Calls", n.d.) The use of automated and prerecorded messages also helped push the call for federal regulation to be put into place. In response the FCC (Federal Communication Commission) set rules that necessitate that anyone making a solicitation call to your home must make available his or her name, the name of the person or entity on whose behalf...
Words: 438 - Pages: 2
...One of the best careers to get into is information technology (IT). Information technology is the use of telecommunications and computers to retrieve, store, transmit, and manipulate information. “The world of information technology is constantly changing. Whether you’re a developer for a large company or a small company, in a management position, freelancing or anything else, the world of IT is changing all the time” (Complete IT Professional). Because of certain advances in IT, new ethical issues often arise. An ethical issue, according to businessdictionary.com, is “a problem or situation that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical).” Often, it is extremely necessary to protect the people from wrong. In 1978, the Electron Funds Transfer was created. More recently, in 2003, the Do Not Call Implementation Act was created. There were advances in IT that resulted in new ethical issues necessitating the creation of each act. Credit and debit cards have been replacing paper checks at a fast growing rate. This means that the paper evidence that checks offer is descending. ATMs and electronic banking is taking over because it is so convenient. “The explosion of electronic financial transactions created a new need for rules that would give consumers the same level of confidence that they had in the checking system” (investopedia). In the late 70s,...
Words: 561 - Pages: 3
...Advances in Information Technology Yadira Lopez BIS 220 August 9, 2012 Krisda Cripe Advances in Information Technology Throughout the years technology has advanced in ways that no human being can ever imagine. We have the power to communicate with individuals worldwide in a matter of seconds. We have the ability to see people we have not seen in a long time without leaving the comfort of our home and having to travel thousands of miles. It is nice knowing that some way somehow, we can always stay connected to our loved ones. Many say that the way technology has advanced is to the best benefit for everyone, while others say it is causing more problems in today’s society. Individuals say it is one of the main reasons why children and young adults are being robbed, prostituted, and turned to drugs. Is it possible that technology can play such major roles in dramatic situations like the ones described? If so what is being done to stop such things from happening. The Children’s Online Privacy Protection Act (“COPPA”) specifically protects the privacy of children under the age of 13 by requesting parental approval for the collection or use of any personal information of the users, which took effect in April 2000 (Multnomah County Library, 23). The reason for passing COPPA was because parents started to notice that marketing techniques were being targeted towards their children and the way they went about collecting the information was through websites that were often used...
Words: 870 - Pages: 4
...Telephone Consumer Protection Act (TCPA), 1991 Juel A. Todman BIS/220 Introduction to Computer Application and Systems June 16, 2014 Dr. David Wagner Telephone Consumer Protection Act (TCPA), 1991 Advances in Information Technology have made access to sensitive information with great concern. Privacy has to be paramount as the internet broadens its horizon strategically. Various acts had to be implemented to protect the privacy of individuals. The act that I am going to talk about is the Telephone Consumer Act of 1991, (TPCA). The Telephone Consumer Protection Act of 1991 was passed and enacted by Congress, in response to consumer concerns about the growing number of unsolicited telephone calls by telemarketers and the increasing use of automated and prerecorded messages. In response, the Federal Communications Commission (FCC) adopted rules that require anyone making telephone solicitation calls to your home must provide their names, and the name of the person or company on whose behalf the call was being made. The rules also prohibited telephone solicitation calls to your home before 8 am or after 9 pm, and required telemarketers to comply with any do-not-call request you make directly to the caller during the solicitation call. The implementation of the National Do-Not-Call Registry informed Telemarketers that they had up to 31 days from the day you registered your telephone number to remove it from their call lists. In June 2003, the FCC supplemented...
Words: 508 - Pages: 3
...use of information technology for personal and business environment has created an innovative effect on people lives. This change has been an important factor for success through everyday life function. The fast growing pace of information technology brought along many ethical issues, like privacy, property, and accuracy, as people began to share their personal data over networks. These major issues brought new laws to defend consumers, for example The Telephone Consumer Protection Act (TCPA) of 1991, and the Do Not Call Implementation Act of 2003 form after Information Technology began to grow so fast creating ethical issues over customers information shared on networks. The new laws Telephone Consumer Protection Act 1991 and Do Not Call Implementation Act 2003 were necessary as information technology progress creating ethical issues over the years. References: Introduction to Information Systems: Enabling and Transforming Business, 3rd Edition R. Kelly Rainer, Casey G. Cegielski ©2011 Advances in information technology (IT) are meant to improve various aspects of life. Unfortunately, IT advances are resulting in a growing amount of ethical issues. The major ethical issues associated with IT advancements are privacy, property, accuracy, and ease of access to sensitive information. Privacy can easily be breached when information is stored in databases and shared over networks. Ethical issues due to advances in IT call for the creation of new acts to protect consumers...
Words: 423 - Pages: 2
...Information Technology Act There are several advances in information technology that resulted in new ethical issues that brought on the creation of certain acts. The two acts which will be discussed in this paper are the Children’s Internet Protection Act of 2000 (CIPA), and Children’s Online Privacy Protection Act of 1988 (COPPA). Children’s Internet Protection Act is a federal law that was passed by congress that went into effect April 20, 2001 (ala.org. para1). The purpose behind the Children’s Internet Protection Act is to help block and filter certain material from being accessed through the internet. (ala.org para1). As the technology advances the local school systems have begun using computers/internet to teach children how to research subjects and to learn the technology of this day and time, which is also covered under this particular act that each school that has computers as a teaching tool is required to have filter system to keep minors from seeing cites that are not appreciate. The main purpose with the Children’s Internet Protection is to prevent children from today’s exposure for example pornographic images that are unsuitable for children. Modern Technology has become an important tool in our society from online banking to entering an address and receives step by step directions; if it appeals to adults then children interest will be a larger version of appeal. The internet is growing and children are being brought up in different society, learning how...
Words: 479 - Pages: 2
...organizational unit. The paper will include the factors that have changed the primary role from that of an operation to that of a strategic partner. The paper will talk about technology and its affect in the HRM field and how a company’s culture has been influenced by HRIS. Human Resource Management has been recognized by different names in the past, it used to be recognized as a separate and important function. Some of the different names this position has been called has been personal relations then employee relations and then to human resources. Along the way employment laws have changed the scope of the Human Resource functions. National Cash Register developed a department that would handle employee complaints, wage management and other employee related functions. That took place in the year of 1902. In 1935 the Wagner's Act (aka National Labor Relations Act) was enacted. It seemed organizations changed their focus from efficiency of the workers to the efficiency through employees gaining satisfaction from their jobs. Sometime between 1960 and 1970 the Human Resource Management transformation was taking place, this was because several acts had passed in Congress like the Equal Pay Act of 1963, the Civil Rights Act of 1964, the Employee Retirement Income Security Act of 1974 (ERISA), and the Occupational Safety and Health Act of 1970. At this time employers were worried about plausible lawsuits so...
Words: 756 - Pages: 4
...Assignment 4 Student Name: LaCarol Barnes Assignment Topic: ONC Goals and Objectives Introduction The Office of the National Coordinator for Health Information Technology, coined the ONC, is a part of the U.S. Department of Health and Human Services. The office was created in 2004 via an Executive Order and reinforced by the implementation of the HITECH Act of 2009 (Health and Human Services). The purpose of the ONC is to assist the nation in the implementation, exchange, and progressing information technology in healthcare (Health and Human Services). In 2011, the ONC released its first Federal Health IT Strategic Plan. This plan required changes secondary o the implementation of the Affordable...
Words: 1311 - Pages: 6
...between sellers and buyers, the pursuit or maintenance of monopoly power, and mergers. The four major pieces of legislation collectively known as the Antitrust Laws are; the Sherman Antitrust Act, the Clayton Antitrust Act, the Federal Trade Commission Act and the Celler-Kefauver Act of 1950. The Sherman Antitrust Act has two categories that are targeted; ○ to restrain or prevent trade among states or foreign nations ○ prohibit against monopolies. ○ Only the United States Department of Justice has the power to prosecute individuals who are suspected of violating this act, (unless the individual state has the power granted by its own antitrust legislation.) The Federal Trade Commission Act ○ created the Federal Trade Commission ○ gave the Commission the power to enforce United States Antitrust legislation. The Clayton Antitrust Act ○ passed to prohibit mergers and acquisitions when those would substantially lessen competition. ○ enabled state attorney generals the ability to prosecute and enforce federal antitrust laws. ○ outlawed price discrimination, regulated stock acquisitions, and tying contracts ○ The Robinson - Pitman Act amended the Clayton Antitrust Act by banning discriminatory business practices. Celler-Kefauver Act 1950 ○ passed to regulate the acquisition of firms that were not in direct competition ○ limited mergers that would result in less competition in a market (Research Paper by Eveningepiphany...
Words: 1136 - Pages: 5
...Information Technology Act Paper Shirley Richardson BIS/220 July 7, 2013 David Martin Children’s Internet Protection Act, 2000 As the internet grows and become a vast part of how the world communicates. The world is bombarded with the existence of the dangers and threats, especially involving the younger generation. Because of the vast danger and threats, a great need for filtering software has become the center of attraction, world-wide concerning the debate about children, sex, and the internet. In December 2000, Congress passed the Children’s Internet Protection Act (CIPA), which is a law that places a demand on every school, library, museum, and all public related facilities to ensure there are some form of filtering application in place so, that they can continue receiving Federal funding for computers and internet accessibility. Entangled within the vast talked about dilemma of the internet and its dangers, as it pertains to children’s sexuality, internet filtering software takes up a wide spread of issues resulting in anxiety and fear. The matter that pose a major issue to parents are what the children are being exposed too, such as pornography, sexual images, sexual experience and sexual information, all of these things and more are discovered. The only way to protect the children from these obscenities and the dangers that the children are faced with, will be to educate our children, the responsibility does not fall on the distributors alone but the parents...
Words: 985 - Pages: 4
...and also by assessing the standards of living in our economic system. (Kelly/McGowan, 2012) The Role of Business The actions of businesses or organizations can positively influence our economy or can cause devastating effects. The direct result from businesses that practice greed and unethical choices contributed to the U.S. economic collapse in the fall of 2008 (Permanent Subcommittee on Investigations , 2011). In the wake of this economic crisis many business and organizations were forced to rethink their strategies and invest in technological advances as a way to improve standards of living and continue to earn a profit. Businesses must not only continue to focus on keeping the current customers but must also contribute in areas of advances in technology in order to be competitive in today’s global environment. Social media is a valuable and growing tool for consumer communications. The advancements in medical technologies are helping to contribute to new ideas and innovations which have short term and long term impacts for the economy. Environmental...
Words: 1281 - Pages: 6
...be used as grading elements. Also, at present, WritePoint cannot detect quotations or block-quotes, so comments in those areas should be ignored. Please see the other helpful writing resources in the Tutorials and Guides section of the Center for Writing Excellence. Thank you for using WritePoint. Information Technology Acts Joey Griffith BIS/220 August 28, 2012 Dr. Kathryn Moland University of Phoenix Information Technology Acts The Do Not Call Implementation act of 2003 is a registry list that will not allow telemarketers to call and harass everyone daily (Do-Not-Call Implementation Act Law & Legal Definition, 2001-2012). The Financial Services Modernization Act of 1999 is a law that works to partially to deregulate the financial industry. Both of these acts were put into place to help the...
Words: 1012 - Pages: 5
...THE ACT OF NECESSITY 1 The Act of Necessity Jen T. Stunt University Of Arizona THE ACT OF NECESSITY 2 Every day technology advances leaps, and bounds causing new ethical issues. These issues necessitate the creation of new laws by Congress to keep the public safe from their personal private information being used against them unlawfully. In this Information Technology Acts Paper I will discuss two separate acts that were put in place due to such ethical issues arising. The first act is called the Video Privacy Protection Act of 1988. The second act is called The Children’s Internet Protection Act, which was enacted in 2000. The Video Privacy Protection Act of 1988 (VPPA) was passed when the Supreme Court nominee Robert Bork’s video rental records were posted for public viewing during his campaign. Robert Bork was nominated by President Ronald Reagan to serve as Supreme Court Justice. While debates ran hot over the nomination and Bork’s beliefs became a popular topic, someone leaked his video rental records to the public. There wasn’t anything practically ‘juicy’ about what he had viewed, but some tried to use it against him. This sparked the need for a law to protect him, and others from being a victim of invasion of privacy. We all have different likes when it comes to entertainment...
Words: 1584 - Pages: 7