...1-11-1] • Right to Information Act, 2005 (Act No. 22 of 2005) [As modified up to 1st February, 2011] 2011 trriOtw,1170 twnit 1Rutimq, ftft tK 3K114" -;q4/q), fkft- 110 002 VD liCktrIT sictarDcf I +Rabic %ram( (11414, freft- 110 054 : 23.00; Mitt 1 r4 (kW A) £ 0.33 7I $ 0.47 -V91 S SI, 2005 3TRAttli itUti'M 22) (2005 -' [1 Tr4t, 2011 Th 1 Right to Information Act, 2005 (Act No. 22 of 2005) [As modified up to 1st February, 2011] iis-riTon-io we Affairs I LifiRAR Acc. ift59/2-7-.q7:Pa6gi Date PREFACE This edition of the Right to Information Act, 2005 is being published in diglot form. The English text and the authoritative Hindi text of the Act have been modified up (lithe 1st day of February, 2011. NEW DELHI; The 1st February, 2011 BHASEN, Secretary to the Government of India. THE RIGHT TO INFORMATION ACT, 2005 ARRANGEMENT OF SECTIONS CHAPTER I PRELIMINARY SECTIONS 1. Short title, extent and commencement. 2. Definitions. CHAPTER II RIGHT TO INFORMATION AND OBLIGATIONS OF PUBLIC AUTHORITIES 3. Right to information. 4. Obligations of public authorities. 5. Designation of Public Information Officers. 6. Request for obtaining information. 7. Disposal of request. 8. Exemption from disclosure of information. 9. Grounds for rejection to access in certain cases. 10. Severability. 11. Third party information. CHAPTER III THE CENTRAL INFORMATION COMMISSION 12. Constitution of Central Information Commission. 13...
Words: 11382 - Pages: 46
...Bangladesh as one of the fundamental rights and right to information is an inalienable part of freedom of thought, conscience and speech; and whereas all powers of the Republic belong to the people, and it is necessary to ensure right to information for the empowerment of the people; and Whereas if the right to information of the people is ensured, the transparency and accountability of all public, autonomous and statutory organizations and of other private institutions constituted or run by government or foreign financing shall increase, corruption of the same shall decrease and good governance of the same shall be established. Right to Information Act In today’s world, freedom of information is the pre-requisite of sustainable development due to its driving power. Free flow of information and its consumption boosts a country’s progress and prosperity. Effectiveness of democracy and security of human rights vastly depends on freedom of expression and information, in other word, freedom of the press. Understanding the essence many countries- from developed to developing- now open the shutters and nod the people’s right to the access of information resources. In recent years, a number of nations enacted the freedom of information law including neighboring India in 2005, Pakistan in 2002, and Nepal in 2007. After the restoration of democracy in 1990, gradually a demand of giving the people the right or access to information emerged and subsequently a massive discussion among...
Words: 3631 - Pages: 15
...Information Technology Acts J Lacy Parson BIS/220 4 Oct 2014 Lisa Paulson Information Technology Acts There were many different acts to choose from. Throughout the years so much as changed in terms of information technology, it seems that every year there are new issues. The most interesting to me were the No Electronic Theft (NET) Act, enacted in 1997 and the Federal Information Security Management Act of 2002. The No Electronic Theft Act protects copyright owners against infringement. According to Indiana University it makes copyrighted material “federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.” (What is the No Electronic Theft Act 2014) This came from the progression that the internet made. The internet made is so easy to share information or download songs. It was a necessary act in my opinion. With blogs being such a big thing it also protected against someone claiming information as their own. The next very interesting act is the Federal Information Management Security Act of 2002. The act states that; “The Department of Homeland Security activities will include (but will not be limited to): overseeing the government-wide and agency-specific implementation of and reporting on cyber security policies and guidance; overseeing...
Words: 481 - Pages: 2
...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology...
Words: 994 - Pages: 4
...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people will...
Words: 467 - Pages: 2
...In the world we live in today, there’s some type of electronic device being used to connect to the Internet. “The world-wide platform enable individuals to connect, compute, communicate, compete, and collaborate everywhere, and anywhere, anytime and all the time, and to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries. Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000 In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009). “The major concern with the implementation of the law is the inability to prevent over filtering for bona fide research” (Menuey, B...
Words: 291 - Pages: 2
...Information Technology Acts Paper Natasha Bright-Wight BIS/220 April 21, 2014 Marty Mueller Information Technology Acts Paper I chose to research the Children’s Internet Protection Act of 2000 and the Children’s Online Privacy Protection Act of 1998. Both are similar in comparison but still both serve different issues to help with the advances in information technology and ethical issues that arise. With all these changes that are happening there have been necessary Acts that needed to be passed to protect the public. For both of these, companies have used marketing strategies to find out more and more information of people. Also, there has been identity theft that has occurred more because of personal information that has been put on the internet and shared and passed around. Children are having more and more access to the internet, and internet games. Both Acts deal with the same advances in information technology that resulted in ethical issues, making it very necessary to sign these Acts into Law. We have many computer networks, such as the Internet, smart phones and regular cell phones, and search engines, such as Google being used by everyone now, including children. Parents don’t watch their children’s internet activities and phone activities as closely as they should. Organizations have increasing amounts of data that can be stored and much cheaper now. There are more and more employees and people who have access to people’s personal information in the work place...
Words: 899 - Pages: 4
...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...
Words: 1432 - Pages: 6
...Terrorism Strikes Janay Garcia BIS/220 1 April 2014 C. Chevannes When Terrorism Strikes Abuse of national security and terrorism are two of the most important issues our country is fighting to this day. Two acts have been implemented to help control these issues; although they were implemented 15 years apart they go hand in hand in protecting our country. The Computer Fraud and Abuse Act (CFAA) was created in 1986 and states that anyone who obtains information without authorization is punishable under the Act. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) was established in 2001 after the terrorist attack on September 11, 2001. This Act allowed law enforcement to use tools that were already available to detect and prevent terrorism. What were the advances in technology that necessitated the creation of these acts? There are seven crimes listed under the CFAA: obtaining national security information, trespassing in a government computer, damaging a computer or information, compromising confidentiality, trafficking in passwords, threatening to damage a computer, and accessing to defraud and obtain value. Essentially, this act protects against hacking. The evolution of information technology (IT) though, has increased the vulnerability of our society. Robert Morris was the first person to be indicted under the CFAA in 1990. Morris was a graduate student at Cornell when he released a worm,...
Words: 519 - Pages: 3
...Information Technology Acts Patricia Bryant BIS/220 July 30, 2012 Marilyn Taylor Information Technology Acts Information technology is rapidly changing and in constant need of new acts to protect people and information that gets put into computers. In early years it was giving the letters or parcels to a trusted person to be passed on to the recipient. As times have changes and new technology has emerged more drastic privacy protection measures have been put in place. Two that I see as important are the Children’s Internet Protection Act (CIPA) 2002 and the Family Educational Rights and Privacy Act (FERPA), 1974 The Children’s Internet Protection Act (CIPA) was enacted back in 2002 by Congress with the intensions of keeping obscenities and inappropriate pictures from being viewed or read on any school computers or in libraries. The need for this act resulted due to minors having access and exposing other children to possible harmful situations, materials and keeping minors from disclosing personal information. Schools not only have to safe guard what minors can have access to in schools and in libraries, but they also have to protect the student school record. The Family Educational and Privacy Act (FERPA) was added into federal law in 1974 for the protection of each students record. The law states the rights of access to the record is with the minors parents until the age eighteen. There are three rights granted by the FERPA and they are; the right to inspect and review/right...
Words: 455 - Pages: 2
...Information Technology Acts Eric Mahoney BIS/220 July 14, 2014 Julie Ruse Information Technology Acts As technology has advanced, the need to set rules and regulations have increased to protect consumers from abuse from corporations as they use this new technology. With the speed of new leaps in the technological advances Congress has created laws such as Do Not Call Implementation Act (2003), Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) 2001, Children's Internet Protection Act (2000), No Electronic Theft (NET) Act (1997), Telephone Consumer Protection Act (TCPA) 1991, Video Privacy Protection Act, 1988 and the Computer Fraud and Abuse Act (1986). These are just a few that have come into existence from the information boom. This paper will focus on the Telephone Consumer Protection Act and the Do Not Call Implementation Act. Congress passed the Telephone Consumer Protection Act (TCPA) in 1991 as an answer to the consumer concerns about the rising number of unsolicited telephone marketing calls to their homes. ("Unwanted Telephone Marketing Calls", n.d.) The use of automated and prerecorded messages also helped push the call for federal regulation to be put into place. In response the FCC (Federal Communication Commission) set rules that necessitate that anyone making a solicitation call to your home must make available his or her name, the name of the person or entity on whose behalf...
Words: 438 - Pages: 2
...What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006 The “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism” Act, more commonly referred to as the “Patriot Act”, was signed into law on October 26th, 2001 following the events of September 11th of that same year. At that time, existing laws regarding electronic information needed to be updated to provide federal law enforcement with greater access to investigate electronic platforms such as email, voicemail, other electronic information and personal property without the owner’s knowledge or consent. The act was implemented to capture the terrorists responsible for the attacks during 2001 but as it pertains to information technology; it removed many barriers for law enforcement agencies to gather intelligence from domestic sources to fight terrorism. Money laundering for example is hidden in a process of several electronic transactions which ultimately funds terrorist activities. The criminals take cash earned from illegal exploits and then deposit this cash into a banking institution from where it is then transferred to other accounts or credit cards, money orders, travelers cheques among other things so that it appears to be legitimate funds used...
Words: 320 - Pages: 2
...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become increasingly...
Words: 556 - Pages: 3
...Information Technology Acts Mayra Gonzalez BIS/220 October 28, 2013 Jadie Giorgis Information Technology Acts While information technology continual to move ahead over the years, ethical concerns turn into an issue. Accordingly, the government executed specific acts to govern these concerns. Even as some of these acts exists, this text centered on two sections specifically: US Patriot Act of 2001, and Fair Credit Reporting Act of 1970. Whereas the Patriot Act was executed to lessen terrorist activities by the use of the internet, the Fair Credit Act was executed to give every American with be on a par with credit opportunities. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also well-known as the Patriot Act of 2001 was enacted in 2001. The Patriot Act was established to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and other purposes” (US). Table 1.1 below provides a synopsis of the sections of the Patriot Act involving financial institutions and their operations. Table 1.1 Sections of the Patriot Act of 2001 Section Purpose | 311 “Special Measures for Jurisdictions, Financial Institutions, or International Transactions of Primary Money Laundering Concern | 312 Special Due Diligence for Correspondent Accounts and Private Banking Accounts | 313 Prohibition on U.S. Correspondent Accounts with Foreign Shell...
Words: 998 - Pages: 4
...Information Technology Act Greg Bennett BIS/220 January 15, 2013 Nikia Johnson Information Technology Act Information technology continues to forge ahead and has done so from day one. Technology, moving forward, and becoming more advanced and sophisticated, adds growing concern over the ethical integrity of that technology. In correlation with those concerns, the United States government implemented various acts to aid control in these concerns and combat unethical behavior. Given the number of implemented acts, this paper focuses on two specific sections: the Fair Credit Reporting Act of 1970, and the U.S. Patriot Act of 2001. The implementation of the Fair Credit Reporting Act of 1970 enabled each American to be on an even plane with credit opportunities. The government executed the U.S. Patriot Act in 2001, in part because of the atrocity of 9/11, to lessen terrorist activities by the use of the Internet and cyberspace. Fair Credit Reporting Act of 1970 The Fair Credit Reporting Act (FCRA) ordained to “protect consumers from the disclosure of inaccurate and arbitrary personal information held by consumer reporting agencies” (Consumer Privacy Guide (2001). The Fair Credit Reporting Act (1970). 2001). At the time when this act was established, American citizens were not viewed equally by credit facilities when attempting to purchase homes or vehicles. This act was a means of governing and guaranteeing equal opportunity and consideration for these...
Words: 1036 - Pages: 5