Free Essay

Info Tech Act

In:

Submitted By nikolas1234
Words 754
Pages 4
Information Technology Acts
Technology has affected us in a very positive way and has increase quality of life. However, everything comes with a price and at times disadvantages. A major disadvantage is the loss of privacy in many different levels, from our personal lives to our everyday routines but also in the work environment. As a response to the invasion of privacy, the government has passed several laws to counteract this trend and try to protect us and our privacy in some extend. In this paper we will discuss the Telephone Consumer Protection Act of 1991 and the Health Insurance Portability and Accountability Act of 1996.
Telephone Consumer Protection Act The telephone has brought great benefits and has become a necessity. At the same time, several companies use this as a tool to drive sales and increase profits. Telemarketing is one of the ways companies have taken advantage of this great invention. Who has not been the victim of these intruding and harassing phone calls? This is an issue that has plagued millions of people across the United States since the late eighties.
People felt their privacy was being invaded. Their phones numbers and contact information was being sold and shared amongst many companies while they were being bombarded with phone calls in the privacy of their own homes. There was a sense of loss of personal control and privacy. As a result, the government passed the Telephone Consumer Protection Act (TCPA) of 1991 in response to the increasing amount of commercial solicitation calls consumers were receiving.
The purpose of TCPA is to battle telemarketers and maintains residency’s privacy. The act laid out certain policies companies must follow when marketing through the telephone. Some of the rules consist of providing the solicitor’s name, the name of the entity whose behalf the call is being made, and a telephone number or address where they can be contacted. Another regulation is that the calls can only be made between the hours of 8am to 9pm. Health Insurance Portability and Accountability Act
The digital technology has radically transformed the world, particularly the health care industry. Since healthcare is a very information-rich industry, the electronic health records (EHRs) provide a method which allows faster and accurate flow of information. With EHRs, information is available whenever and wherever is needed. This technology is a wonderful and amazing tool when in the hands of the right people and the purpose is valid and appropriate. The misuse of the electronic health records is an invasion of the patient’s privacy.
Examples of misuse are instances where individuals are using patient medical records in ways that have nothing to do with their health care. A good example would be when a celebrity is submitted into a hospital for an emergency and a nurse who is not providing care for the celebrity “steals” the patient’s information. The nurse accesses her information to find out why the celebrity was submitted to the hospital while at the same time accessing personal medical records etc. Then the nurse sells this information to the media, in order to make a little bit of extra money. This is an inappropriate use of the EHR. The nurse in this scenario uses her position and authority to access personal information about the celebrity for personal gain. This was not one of the intended and original goals of the EHR.
In response to these situations, the government passed the Health Insurance Portability and Accountability Act. The main goal of the HIPAA is to protect the patient’s privacy and information. The act sets regulation on how the patient’s information should be stored, accessed, and provides rules on how the patient’s information can be protected. For example, the nurse can only access information for patients that she provides care for; therefore the act is limiting and restricting the health care workers from accessing random file records. In addition, any documents containing patients’ information must be properly disposed.
Conclusion
The technology has made people’s information easily accessible to everyone, which it is no surprise that companies and many other individuals have monopolized on this benefit for their own personal agenda. Fortunately in the situations described in this paper, the government intervened and passed acts to protect our privacy.

References: 1. Health Information Privacy. (). Retrieved from http://www.hhs.gov/ocr/privacy/ 2. United Sates Department of Labor. (2014). Retrieved from http://www.dol.gov/dol/topic/health-plans/portability.htm 3. Electronic Privacy Information Center. (2014). Retrieved from http://epic.org/privacy/telemarketing/

Similar Documents

Free Essay

Info Tech Acts

...Information Technology Acts Paper BIS220 July 15 Information Technology Acts Paper The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA applies to any web site that is directed to children under 13 that collects personal information from them or to any web site that collects personal information where they know that the information that they are collecting comes from children. Its basic provisions require that a "clear and prominent" link to the privacy policy must exist on the home page and that the privacy policy itself must be "clearly written and understandable." Furthermore, the legislation explicitly states what must be included in the content of the privacy policy -- this includes things such as the contact information for the operators of the page, the kinds of information that will be collected from children, how the information that is collected will be used, and information about what rights parents have to their child's information (Stanford). The Computer Fraud and Abuse Act (CFAA) is the federal government’s principal legal weapon in the battle to protect computer systems and electronically stored information from thieves and vandals. A criminal statute that can be enforced by the U.S. Department of Justice, the CFAA also authorizes private parties to bring a civil damages action against anyone who violates its terms. Two...

Words: 694 - Pages: 3

Free Essay

Ipod

...FIRST DAY OF SCHOOL 8 Absentee Day 9 10 11 13 14 15 16 Board Meeting 6:30pm 17 18 19 Icebreaker Events Rally 11:12am-11:36am Dance: 8:30pm-11:30pm 20 21 Minimum Day Private College Back-2-School Workshop Night 2nd Period-Library 6:30pm 28 22 23 Senior Sunrise Breakfast 6:00am 24 31 25 26 27 Senior Gov/Econ Classes in Theater 29 30 SUNDAY 1 MONDAY 2 LABOR DAY School Closed TUESDAY Department Chair Meeting 2:15pm Tech Center 9 Staff Meeting 7am/3:15pm WEDNESDAY 3 Hearing Screening Re-Test 8am-9am Club Rush Day @ Lunchtime 10 Minimum Day Staff Development 11 4 THURSDAY 5 FRIDAY 6 SATURDAY 7 8 Board Meeting 6:30pm 12 CSU Info Workshop 5th Period: Library 13 Coat/Sweater Drive 14 15 16 Senior 17 Scholarship Monologue Night Workshop 7pm 1st-4th Periods OHS Theater Library 18 Senior Parent 19 Freshman Night Ice Cream Sundae 6:30pm-8pm Challenge @ Lunchtime: Renaissance Card Quad Area Distribution @ Brunch Theater Foyer 21 22 23 24 25 Fall Blood Drive Picture Re-Takes Homecoming 7am-3pm 8am-12pm Tye-Dye Day Old Gym 2:15pm UC Info Workshop Outside of K-3 SSC—3:15pm 4th Period: Theater F-11 30 Senior Panoramic Photo 11:30am 26 27 Homecoming Window Painting 9am 20 28 29 SUNDAY MONDAY TUESDAY 1 WEDNESDAY 2 THURSDAY CSU Application Workshop 5th Period-Library FRIDAY 3 HOMECOMING Rally 11:12-11:36am Parade: 2:05-4pm Dance: end of game11:30pm 10 MULAN-Public Show: 7pm OHS Theater SATURDAY 4 Powder Puff Game 7:00 pm Fall Homecoming Week 5 6 7 8 Minimum...

Words: 1267 - Pages: 6

Free Essay

Organizational Theory

...   *Theory:  ideas  about  what  something  is,  how  it  works;  the  key  elements  are  generalizability,   explanation,  prediction!   Large,  successful  orgs  are  still  vulnerable;  orgs  are  only  as  strong  as  their  decision  makers.   •   Current  Challenges   • Challenges  today  are  different  from  the  past,  so  org  theory  is  evolving.   • Top  execs  say  that  coping  with  rapid  change  is  the  most  common  problem  in  orgs.   • Globalization:  world  is  shrinking  with  rapid  advances  in  tech/communications  à  takes  less  time   to  influence  the  world  from  remote  locations.   o Today’s  orgs  must  feel  “at  home”  anywhere  in  the  world.     o Contracting  functions  to  orgs  in  other  countries  or  partnering  with  foreign  orgs  gives...

Words: 2749 - Pages: 11

Premium Essay

Marketing Exam 2 Review

...Chap 6 creating product solutions Video clip Tommy excessive emotive Richard always watching, customer focus Product Strategy * Is a well conceived plan that emphasizes becoming a product expert, selling benefits, and configuring value-added solutions * Helps salespp make the right decision concerning the selection and position of products to meet specific customer needs Selling solutions * Are mutually shared answers to recognized customer problems * More encompassing than specific products * Those that provide measuarable results * Those that require greater effort to define and diagnose the customer’s problems Product strategy should be tailored to the customer’s buying needs * Transactional buyers * Standard or generic * Understand their own product needs * Product can be easily substituted * Consultative * Hidden feature * Differentiated choices * Customizable * Strategic alliance * High cost importance * Limited substitutability Explosion of product strategy * Domestic and global markets overflowing * >30,000 consumer products produced each year * good news: buyer have a choice * bad news: more complicated Product configuration * product selection process * often referred to as “product configuration” * product configuration software * develops customized product solutions quickly and accurately * incorporates customer...

Words: 2845 - Pages: 12

Premium Essay

Science

...tailored to your program, from critical-thinking methods to modern theories of effective leadership. And, you'll earn the same diploma as main-campus students. No ACT, SAT, GRE or GMAT required. With 24/7 access to the online classroom, you’ll study at your convenience as you work toward earning one of the following respected degrees: AA in Business Admin AA in Healthcare Management AA in Marketing BA Business Admin/Accounting BA Business Admin/Computer Information Systems BA Business Admin/Healthcare Management BA Business Admin/Management BA Business Admin/Marketing MBA MBA/Accounting MBA/Accounting & Finance MBA/Finance MBA/Healthcare Management MBA/Information Technology Management MBA/International Business MBA/Internet Marketing MBA/Management MBA/Marketing MBA/Project Management MS/Supply Chain Management Attend a U.S. News & World Report-Ranked University 100% Online. Whether you’re just starting out or looking to get ahead in your business administration career, earning a degree from Florida Tech can help. Regionally accredited and ranked a Tier 1 Best National University by U.S. News & World Report, Florida Tech has been preparing students for success for over 50 years, helping them to achieve more both personally and professionally. Yes! I'd like a free financial aid guide and more information! *Indicates required field. *Type of Program Interested in:Select UNDERGRADUATE DEGREESAssociate...

Words: 553 - Pages: 3

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Free Essay

Information System Ethics Notes

...rights and obligations. * Internet and digital firm techs make it easier to assemble, integrate and distribute info, unleashing new concerns about appropriate use of customer info, protection of personal privacy and protection of intellectual property * Other issues: establishing accountability, setting standards to safeguard system quality, and preserving values and institutions * 5 moral dimensions of the info age * Info rights and obligations individuals/firms possess in respect to themselves * Privacy – Claim of individuals to be left alone, free from surveillance/interference from other individuals, organizations, or the state; claim to be able to control info about yourself * Privacy in public spaces * Data storage & exchange * Laws & expectations in US Vs. EU & Australia * Protecting traditional intellectual property rights in digital society * Who is held accountable and liable for harm done to info and property rights * System quality: standards of data and system quality to protect individual rights * Quality of life: preservation of values in an info and knowledge based society * 4 technological trends of concern * Computing power doubles every 18 months Increased reliance on, and vulnerability to, computer sys * Data storage costs rapidly declining Multiplying database on individuals * Data analysis advances Greater ability to find detailed personal info on individuals * Networking advanced and the Internet...

Words: 983 - Pages: 4

Premium Essay

The FBI Should NOT Have Access To People's Phones

...constitutional rights taken away. Well just recently there was a mass shooting in California and the FBI tried to look inside the phone of the murderer to gain some info but needed the help of tech giant Apple but Apple would not help the FBI. The FBI should not have access to people’s phones because this violates the constitution and the basic rights of the people and opens the door for the rest of the world to act us such. The FBI can not have this power as what would stop foreign countries from using it and most importantly goes against one the most important things in the United States, The Constitution. For example ‘If the court case had gone forward and the FBI had won, it would have set a new standard for...

Words: 451 - Pages: 2

Premium Essay

Business Man

...Chapter 12 Global Products Outline * The pros and cons of global product standardization * Localization vs Adaptation * Global product lines * Developing global new products Do Not Read (Unless Noted) Page 401 list 1-5 Page 401-403 Ford’s Global Car Drive, all Page 407 para 3 and 6 Page 408-409 Pitfalls of Global Standardization, all Page 410 Getting the Picture Page 411 para 3 Page 413 Sales Forecast, all Page 416-425, all Introduction * Market coordination * Product standardization * Marketing Mix uniformity Global products/brands have coordination between markets, standardization of products and uniformity of marketing, across all markets. Regional products and brands are unique to a particular trading region. Note: * The difference between Global and Regional products is of degree not kind/type. That is, the issues are the same (kind/type), but the number of countries (degree) to which the marketing analysis applies is different. * Regional products can be thought of as latent global products. Localization vs Adaptation Localization: * Changes that are required for the product to function in a new market. Without localization the product cannot compete because it will not be able to function properly. It will be rejected immediately. NOTE: A standardized product still needs to be localized to function properly. Adaption: * Changes that are required to match customers’ preferences...

Words: 937 - Pages: 4

Free Essay

Information Technology

...Chapter One: Information Systems in Global Business Today -Information system: A set of interrelated components that collect, retrieve, process, store, and distribute info to support decision making and control in an organization –Six building blocks of computers: input, output, memory, arithmetic/logic unit, control unit and files. Control unit and arithmetic/logical unit together known as CPU (central processing unit). –Arithmetic/Logic Unit: carries out mathematical operations and logical comparisons, consist of very large scale integrated circuits, can perform billion operations per second, numbers taking from memories as input and results stored in memory as output. -Control Unit: controls the other five compo of the comp system, enables the comp to take advantage of speed and capacity of its other compo, list of operations called a program, these operations read from memory, interpreted and carried out one at a time (stored program concept). –Cache memory: high speed, high cost storage, used as intermediary between control unit and main memory, compensates for speed mismatches built into the comp system. –Multiple processor configurations: a comp system usually contains more than one processor, dual processor contain two physical separate processors as two separate chips, dual core contain two complete processors manufactured as a single chip, dual processor are better and faster. –Input: devices allow users to enter data into the comp for processing, common devices: keyboard...

Words: 3433 - Pages: 14

Free Essay

The Government and the Cloud

...------------------------------------------------- The Government and “The Cloud” DéAna Colón Project-Based Information Systems, 90.480.032, TP5 Table of Contents Table of Contents 2 Introduction 3 US Privacy Rights 3 Loss of Companies’ Products/Services 4 Government’s Cloud-Data Security 6 Negative Impact on International Relations 7 Loopholes 8 Conclusion 9 Sources 10 Figure 1: Cisco's Projected Revenue Chart 5 Figure 2: Key Stakeholders and Responsibilities for FedRAMP 7 Introduction With the technological advances made, cloud-based data storage has become a staple in businesses worldwide. Storing data using a web-based content management system offers a limitless amount of off-site storage, allowing companies to save larger amounts of data longer. The United States government currently has the unwarranted authority to read emails or access cloud-based data that has been stored for six months or more. Both positive and negative aspects are realized with this controversy. On a positive perspective, many feel the government accessing the data could be beneficial. Probing may help the government prevent terrorism in the United States. It may also provide the information needed to better forecast the country’s economic future. A disparaging concern is that companies feel the government is violating privacy rights. In addition, possible data leaks may result in a company’s loss of product or services. Ultimately, it must be decided whether the...

Words: 2612 - Pages: 11

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Bis/220 3/9/2013 Paul Porch Information Technology Acts Paper The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) was created in response to the terrorist attacks of September 11, 2001. This act once passed became a law almost immediately, less than two months after the attacks. This Act has been modified thru the years implementing better rules to help protect our country. In 2006 the Act was modified once again, this time including a some modifications with technology. “The Act brought the law up to date with current technology, so we no longer have to fight a digital-age battle with antique weapons-legal authorities leftover from the era of rotary telephones. When investigating the murder of Wall Street Journal reporter Daniel Pearl, for example, law enforcement used one of the Act's new authorities to use high-tech means to identify and locate some of the killers.”  ("Justice Information Sharing Department Of Justice").  This Act also extends to law enforcement and foreign intelligence purposes. The purpose of the Act was to enable the government to investigate any potential terrorist more efficiently and effectively. “It expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, to combat money laundering.”  (“The PATRIOT Act Revisited ,” 2004). As with anything the government...

Words: 590 - Pages: 3

Free Essay

Terrorism

...Terrorism Terrorism: A general definition Terrorism is the deliberate and organized use of violence against the state. The single important objective behind the act of terrorism is to create fear and spread insecurity among citizens of the state. By striking the unarmed and hapless citizens, terrorists aim to disrupt governance. Such attacks show the government in poor light. i.e. as one that cannot guarantee security of life and property, one of the most basic function of the state. In Angels & Demons, Dan Brown writes: “terrorism is not an expression of rage. Terrorism is the political weapon. Remove a government’s façade of infallibility, and you remove its people’s faith”. Types of Terrorism There are three types of terrorism. They are (a) State Sponsored Terrorism. (b) State Terrorism. (c) Organizational Terrorism. (a) State Sponsored Terrorism is always directed against another state, often by proxy, with the aim to destabilize it. A good example to drive home this idea is Pakistan sponsored terrorism against India. (b) State Terrorism is directed against a State’s own citizen. The reason could be numerous, chief among is the tussle between majority and minority group (both demographic and religious). A case in point is the 1994 Rawanda Genocide where majority ethnic Hutu tribe militia butchered nearly 8 lakhs Tutsis in 100 days of carnage. (c) Organizational Terrorism is used by groups to realize divergent aims including political, social, and economic...

Words: 570 - Pages: 3

Premium Essay

Star

...COSTS Mineral: 50 Gas: 25 Food: 1 TECH TREE Built From: Barracks Pre-Requisite: Academy WEAPONS Weapon System: none Attack Type: n/a Damage Class: n/a Splash Damage: n/a Damage: n/a Bonus: n/a SPELLS/SPECIAL ABILITIES Heal (Spell) Casting Cost: 1 mana point for every 2 hp healed Range: 2 Description: The Medic starts with this spell and may cast it on any organic ground units to heal damage. Restoration (Spell) Casting Cost: 50 Range: 6 Matrix Description: The Medic may cast this spell on any unit to remove harmful spell effects (does not affect Stasis Field, but does include Lockdown) Optic Flare (Spell) Casting Cost: 75 Range: 8 Matrix Description: Targeted spell. The unit hit will have his sight range reduced to 1 matrix permanently (unless restored by Medic). The unit affected should have ‘Blinded’ displayed in info box. Also removes detection ability if the unit had any. NEW UPGRADES Restoration (Spell) Researched at: Academy Research Cost: 100m, 100g Optic Flare (Spell) Researched at: Academy Research Cost: 100m, 100g Caduceus Reactor (+50 Mana Capacity) Researched at: Academy Research Cost: 150m, 150g UNIT NAME: VALKYRIE FRIGATE RACE: Terran RANK: Lt. Commander VITAL STATISTICS Hit Points: 200 Armor Class: Heavy Armor: 2 COSTS Mineral: 250 Gas: 125 Food: 3 TECH TREE Built From: Starport Pre-Requisite: Armory...

Words: 1132 - Pages: 5

Premium Essay

Six Sigma, Iso and Baldirdge

...Pittsburgh Headquarters 105 Bradford Road Suite 400 Wexford, PA 15090 724.934.9000 724.935.6825 Fax info@SRIRegistrar.com www.SRIRegistrar.com Six Sigma, ISO 9001 and Baldrige Many organizations ask “How Do these programs, processes and standards support each other?” These initiatives are not mutually exclusive, in fact, understanding and applying all, some or part can greatly improve your business performance. The following is an overview of how they work together. What is Six Sigma? Six Sigma is a statistically-based process that strengthens organizational capacity for ongoing process improvement. “Six Sigma” or “six standards of deviation” aims to reduce defects to a rate of 3.4 defects per million defect opportunities by identifying and eliminating causes of variation in business processes. In defining defects or errors, Six Sigma focuses on developing a clear understanding of customer requirements and is therefore very customer focused. The DMAIC Methodology. The Six Sigma process is based on a concept called DMAIC: • Define – clearly identify the problem, the requirements of the project and objectives of the project • Measure – to fully understand the current performance • Analyze – the measurements collected to determine and validate the root cause(s) • Improve – developing ideas to remove the root causes of variation and implement the solutions • Control – to establish standard measures to maintain performance and to correct problems as needed Motorola invented this...

Words: 1535 - Pages: 7