...Jordis Jones BIS220 April 4, 2013 University of Phoenix COPPA AND CIPA In today’s society, kids surf the internet in different ways for different resources of information. Internet can be beneficial to kids who devote this use for information pertaining school related, job opportunities, friendly entertainment, and etc. On the other hand, the internet is designed to be as risky as gambling in certain situations. Matters such as cyberbullying, pornography, identity theft, sexual predators made parents perceptive about protecting their children safety online. This matter also became a concern for Congress, who enacted laws that shield kids from online harmful content. The laws that I thought was an eye opener for this subject are Children Internet Protection Act 2000 (CIPA) and Children’s Online Privacy Protection Act 1998 (COPPA). On April of 2001, The Children Internet Protection takes the form of requirements for internet safety policies and technology which blocks or filters certain material from being accessed through the Internet (2010). CIPA offers a program that gives schools and libraries the privilege to receive a great deal on internet access if they agree using this act. This act not only provides protection and monitors kids whenever they are away from home but it utilizes the internet reliable information that will benefit kid’s future without harmful content. Also, The Children’s Online Privacy Protection Act, ensure parents that personal information will not...
Words: 259 - Pages: 2
...Christena Isaac BIS220 4/23/2012 Lauri Figueroa Information Technology Acts Technology has made numerous advances since computers have first come out. With technology advances come better systems and more threats. With today’s new technology society has to be careful of the threats that can happen because a person a computer. Advances in information technology have made it a necessity for Congress to create acts that protect people’s privacy and rights. Technology has made it possible for people to steal other’s identity easily, terrorist attacks, and even threats to our children. With the internet, a person can portray themselves as whoever they want and can pose a threat to children even while they are in school. While children are in school, it has become almost a guarantee that they will use computers for various reasons. One act that Congress implemented was the Children’s Internet Protection Act. The Children’s Internet Protection Act was implemented in 2000 by Congress to regulate children’s use on computers at school. Congress needed to set rules and guidelines that schools must follow in order to gain funding for computers. Some rules were, “The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors)” (Childrens internet protection, 2012). This was necessary because people are able to put anything and everything online for others to...
Words: 592 - Pages: 3
...Information Technology Acts Paper BIS220 July 15 Information Technology Acts Paper The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA applies to any web site that is directed to children under 13 that collects personal information from them or to any web site that collects personal information where they know that the information that they are collecting comes from children. Its basic provisions require that a "clear and prominent" link to the privacy policy must exist on the home page and that the privacy policy itself must be "clearly written and understandable." Furthermore, the legislation explicitly states what must be included in the content of the privacy policy -- this includes things such as the contact information for the operators of the page, the kinds of information that will be collected from children, how the information that is collected will be used, and information about what rights parents have to their child's information (Stanford). The Computer Fraud and Abuse Act (CFAA) is the federal government’s principal legal weapon in the battle to protect computer systems and electronically stored information from thieves and vandals. A criminal statute that can be enforced by the U.S. Department of Justice, the CFAA also authorizes private parties to bring a civil damages action against anyone who violates its terms. Two...
Words: 694 - Pages: 3
...Information Technology at a Glance Chasidy K. Cummings BIS220 August 29, 2012 Charles Waller Information Technology at a Glance The electronic fund transfer act was voted in by congress in 1978. The act was signed by the then president Jimmy Carter. The purpose of the act was to establish the rights accorded to consumers and the liabilities they face in conducting electronic transactions ("Electronic fund transfer," 2011). The act also set out to outline the responsibilities of all those who participated in activities involving the transfer of electronic funds. The main function of the electronic fund transfer act is the clarification of the rights and liabilities of consumers. The act was necessitated because the consumer protection legislation of the time was not clear enough. In light of recent technological advancements legislation needed to be modified to include new mediums of transaction, namely electronic fund transfers. Although the act gives consideration to those who participate in the transfer of electronic funds its primary focus remains the protection of individual consumers (Emerson, 2009). The act eliminates the need for most transactions that originate through paper instruments. Examples of such instruments include a check or a draft. The focal point of focus is electronic transactions. Electronic transactions in the act include an electronic terminal, a telephonic device, a computer, or even magnetic tape. Automated teller machines are covered by...
Words: 673 - Pages: 3
...Information Technology Act Paper Dannie Roettger BIS220 February 14, 2013 Paul Kirchner Information Technology Act Paper In the ever changing fast paced world of information technology where information is bought, sold and traded for financial gain. Our governments have had to invent laws to ensure that our personal information is safe and not being used improperly. Two of the laws or acts we will explore in this paper are the Telephone Consumer Protection Act and the Fair Credit Reporting Act of 1970. We will look why these laws were enacted and the benefits that have come from these acts. The first act we are going to look at is the telephone consumer protection act. The Telephone Consumer Protection Act or the TCPA was passed on December 20, 1991 and went in to affect just one year later ("Telephone Consumer Protection Act (tcpa)", 2012). This act was put in place to stop the harassing telemarketers and regulate the selling of personal information. The TCPA was passed to regulate telemarketers and to add some ethical guidelines to their operating practices. Some of the benefits that came from the TCPA was telemarketers could only call residents between the hours of 8 AM and 9 PM. Another regulation that came from the telephone consumer protection act was the No Call List ("Telephone Consumer Protection Act (tcpa)", 2012). If a person requested to be on the no call list the telemarketer must place that consumer on the no call list and not call the consumer again....
Words: 638 - Pages: 3
...Changes in Technology Daniel Todd BIS220 February 19, 2014 Bertram Ian Lee Changes in Technology In this time of vast improvements in information technology issues have presented themselves that many times need to be taken care of on a legislative level. This legislation is often done to protect consumers or those that could be unknowingly harmed by the abuse of new technologies. The Children’s Internet Protection Act of 1999 and the No Electronic Theft Act of 1997 are two forms of legislation that have been enacted in the last 20 years that are aimed to protect individuals from potential abuse on the internet. The Children’s Internet Protection Act of 1999 (CIPA) was developed in response to concerns about children accessing harmful or obscene internet content such as pornography and other obscene content. (Federal Communications Commission, n.d.) In the mid and late 1990’s the adoption of the internet was moving along an alarming pace. Many children, however, still relied on their school for access to the internet as. As allowed by the Schools and Libraries Program, certain education and library establishments are permitted to get internet access and very discounted rates in order to make it affordable for these establishments. This program, usually known as “E-Rate”, helps many low budget rural and urban community schools afford internet access for their students. (U.S. Department of Education, 2013) What CIPA did was require these schools and libraries to...
Words: 667 - Pages: 3
...Information Technology Acts Paper Children’s Internet Protection Act (CIPA) Children’s Online Privacy Protection Act (COPPA) Reche Quiapos INTRODUCTION TO COMPUTER APPLICATION AND SYSTEMS/BIS220 October 28, 2012 Nabih Zourob Information Technology Acts Paper Being a Parent that comes from a family-oriented environment, the topic of this paper opens up doors for me on how my children are protected when using the internet. At this modern era, at my children’s age, they were exposed to the Internet growing up. The best way for me to see how they are protected from the World Wide Web is knowing that I can keep them safe from all the acts that our law has passed. Since, I cannot be with them every minute of the day while they are on the computer, I have signed up into this website called “Google Safe Eyes” where it keeps you posted when your children are trying to view inappropriate websites. It alerts to your phone and email, the time and website that they’re trying to access online. A growing Internet sectors plays a big part on children. The Interactive nature of the Internet enables marketers to gather personal information from children through registration information on chatrooms, and other discussion boards available for children. These businesses of marketers will then sold to a third party after they gather all personal information for commercial purposes. This action opened-up doors for abusers and pedophiles that are dangerous for children...
Words: 1069 - Pages: 5