Free Essay

Information Technology Acts Paper

In:

Submitted By carl79usa
Words 1676
Pages 7
|[pic] |Instructor Policies |
| |BCOM 275 |
| |BSAM196W42 |
|Campus/Learning Center: Online |

|Facilitator Information |
| |
|Rod Klein |
|rodneyk02@email.phoenix.edu (University of Phoenix) |
|rdklein1@att.net (Personal) |
|630.914.5221 (CST) |
| |
|Facilitator Availability |
|I'm available most any time. If I'm traveling or in meetings, I'll check in frequently and return calls when I can. I also check in to the forums |
|frequently. |
|Autobiography: I will post my “bio” in the forum. I encourage you to post your “bio” there also so we can all become better acquainted.|
|Late Assignments |
|Assignments are due by midnight Monday MST the last day of a course week. All work to be submitted on time. I may be somewhat flexible if you alert|
|me ahead of time that you will be late for a very good reason. Work submitted late without proper authorization from me receive a 10% deduction for|
|each day they are late. Assignments more than 4 days late will not be accepted. DQ responses are not included in this policy. |
|Technological issues are not considered valid grounds for late assignment submission. In the event of a University of Phoenix server outage, |
|students should submit assignments to the instructor by email to demonstrate that it was completed on time and when systems are restored, submit |
|those assignments However, you must post the assignment in the forum once that becomes available. I will not post the assignment in the course |
|forum for the student. I cannot grade assignments send to me by email. |
|Unless an Incomplete grade has been granted, learner assignments submitted after the last day of class will not be accepted. |
|It is the student’s responsibility to make sure that assignment is correctly posted, thus s/he must verify after posting an assignment that it is |
|posted and that the correct document was attached. The facilitator will not notify the student as to whether or not work was correctly posted. |
|Feedback on assignments and the week |
| |
|I will return graded assignments with my feedback to your Assignments forum within four days of receipt of the assignments. I will also send a |
|weekly summary of your grades within seven days of the end of each week. Please contact me privately in the Individual-write-only forum if you did |
|not receive your individual feedback. |
| |
| |
|Learning Teams |
|University of Phoenix students are expected to work effectively in diverse groups and teams to achieve tasks. They must collaborate and function |
|well in team settings as both leaders and followers. They should respect human diversity and behave in a tolerant manner toward colleagues and |
|peers. If you experience difficulties working with your team, you are expected to resolve them within the team if possible. However, please feel |
|free to contact me for guidance if you have concerns in this area. Because Learning Team projects are outcome-based, all members of your Learning |
|Team will generally earn the same grade for Learning Team projects. However, I reserve the right to report different grades for different Learning |
|Team members if I see a substantial imbalance in individual contribution. Learning Teams should provide a brief summary of any communication held |
|outside the forum. Therefore, if you hold conference calls, work in a real-time chat room, or get together outside the OLS (Online Learning System)|
|environment in another way, please post a log, transcript, or summary in the Learning Team forum. Further, do not use any of these supplementary |
|communication tools unless everyone on your Learning Team agrees to the method and to the schedule. If you have any questions, please contact me. |
|University of Phoenix students are expected to work effectively in diverse groups and teams to achieve tasks. They must collaborate and function |
|well in team settings as both leaders and followers. They should respect human diversity and behave in a tolerant manner toward colleagues and |
|peers. |
| |
|Several of the assignments in this class will be completed in Learning Teams of three to five students. We will set up these teams during our |
|Workshop 1 meeting. If you experience difficulties working with your team, you are expected to resolve them within the team if possible. However, |
|please feel free to contact me for guidance if you have concerns in this area. |
| |
|In order to create structure for your Learning team, you are required to complete a Learning Team Charter. The form for this charter is available |
|in the Learning Team Toolkit (link to the Toolkit is on the left panel of the course materials page). Identify roles, tasks, and deadlines for the |
|learning team project(s). Address behavioral agreements, processes issues and conflict management. Post your learning team charter as an attachment|
|in your Learning Team forum. A Week 2 task. |
| |
|You will also be expected to complete a Peer Evaluation to assess the contributions of each member of your Learning Team (including yourself). The |
|Peer Evaluation Form is available in the Learning Team Toolkit. |
| |
|Because Learning Team projects are outcome-based, all members of your Learning Team will generally earn the same grade for Learning Team projects. |
|However, I reserve the right to report different grades for different Learning Team members if I see a substantial imbalance in individual |
|contribution. |
| |
|Most teams conduct all their business through the OLS forums. However, you may find that your team wants to do some work off-line. That might be by|
|telephone, online collaboration tool or by a chat room. Please feel free to do so. |
| |
|It is expected that you will actively participate with your learning team and contribute to the team discussions by a) contributing original work |
|that is accepted and used by the team with proof of originality b) participating in the project from assignment organizing through meaningful final|
|review of the team project for submission, and c) ensuring to your team that your contributions are your original work and properly quoted, cited, |
|and referenced. |
|Classroom Management Policies |
| |
|Expectations |
|CLASS DISCUSSIONS: Please remember to be positive in your approach to others. Remember, the objective here is to be collaborative, NOT combative. |
|You are not in competition with each other for grades. The purpose of this course is to develop your skills in collaboration and teamwork as we |
|learn the material in this course. |
|REFLECTIONS & CRITICAL THINKING: One of the pillars of learning at University of Phoenix is to develop critical thinking skills. Your comments and |
|all assignments should show reflective thought and critical thinking skills rather than rhetorical or superficial thoughts. |
|APA WRITING GUIDE: Both University of Phoenix and I assume that students will perform professionally in preparing work required for this class. All|
|documents are to be spell-checked and grammar-checked, and follow general APA requirements (i.e. numbering, paragraphs, bibliography, citing |
|references, etc.). You should have a copy of the APA Quick Reference Card. If not, download the reference card as a PDF document from your student |
|Web site. In addition, familiarize yourself with the automatic correcting tools and writing handouts at the Center for Writing Excellence (CWE). A |
|link to the CWE is in the upper, left-hand corner of your course materials page for this course. For assistance in formatting your sources on the |
|References page, you should use the CWE Reference and Citation Generator, which are explained in a Composition Guide posted for the course. |
|CERTIFICATE OF ORIGINALITY AND DEMONSTRATED USE OF WRITEPOINT: For each submitted individual and Learning Team assignment, it must be accompanied |
|by a Certificate of Originality and demonstrated use of WritePoint, a CWE service. Demonstrated use of WritePoint is accomplished by submitting the|
|services CWE Word document to the Assignment folder along with the paper being posted for grading. A total of 5% of the grading weight of all |
|assignments is earned by submitting these two documents. |
|Attendance and Participation |
|Attendance requirements are available online in the Student Catalog. To view the catalog, select the Publications link from you ecampus web page. |
|General policies for the University of Phoenix Online courses are available in your main classroom newsgroup posted by Ex-Admin under the thread |
|Policies for Online Courses. |
|Participation is different from attendance. Class participation is essential to the effectiveness of this course. This course thus requires |
|regular class attendance, and advanced reading of the assigned rEsource materials. Our readings are designed to supplement class lectures, |
|discussions, and other learning activities as opposed to being the sole basis for our class activity. |
|Participation is very important. You will be expected to post 8 substantive messages generally averaging 75 words in length in the Main forum of |
|the OLS classroom in order to receive full participation grade credit. Participation consists of notes you send above and beyond graded |
|assignments. This would consist of new ideas, your perspectives, your own work experiences, and pointed follow-up questions. You'll find it's much|
|easier to keep up with an online class, if you are logging in and participating regularly. Discussion Question and replies to messages from your |
|classmates and me count towards the participation count. In fact, all posts to the Main forum count towards participation. You should post all DQ |
|related emails by Sunday of a class week. Do not continue to post to a DQ for a particular week, after the end of a class week. |
|Please note that both quantity and quality are important considerations when it comes to participation. A message which says simply, "I agree," |
|for example, would not constitute participation since it does not add anything of substance to the discussion. |
|In summary, while logging on does constitute "attendance" on the file server for financial aid and billing purposes, it does not constitute |
|participation. You are "participating" only if I can see your notes in the main newsgroup. Participation counts only in the Main newsgroup where we|
|hold our classroom discussions. Attendance counts in any newsgroup – Main, Learning Team, and Chat Room. |
|Grading Scale |
| |
|Grade |
|A |
|A- |
|B+ |
|B |
|B- |
|C+ |
|C |
|C- |
|D+ |
|D |
|D- |
|F |
| |
|Percentage |
|95+ |
|90-94 |
|87-89 |
|84-86 |
|80-83 |
|77-79 |
|74-76 |
|70-73 |
|67-69 |
|64-66 |
|60-63 |
|

Similar Documents

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper MPS BIS/220 July 21, 2014 JM Information Technology Acts Paper With the advancement of technology, like practically everything which exists, comes the pros and the cons, the advantages and disadvantages, the benefits and the liabilities. The Internet or the World Wide Web is no different. It has exposed individuals to a literal wealth of information. It has opened borders, exposed cultures and vastly improved knowledge and productivity. In essence, the Internet has made the world a "smaller" place in that, a person can hold a face-to-face conversation with another person on the other side of the world without ever boarding a plane and information can be sent hundreds of thousands of miles in seconds. But this information highway is not only used to share useful and appropriate information but also harmful and offensive messages, leaving the most vulnerable users, children, at risk. In an effort to protect American children using the vast and almost uncensored internet, in 2000, two Acts took effect, the Children's Internet Protection Act, 1998 and Children's Online Privacy Protection Act, 2000. Due to the advancement in information technology and rising ethical issues, these Acts were necessary in order to hold internet vendors and website operators accountable for the proper handling of children where their personal information and the nature of the information they are exposed to are applicable. The first Act, The Children's Internet...

Words: 610 - Pages: 3

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper University of Phoenix Information Technology Acts Paper To start, I will begin with introducing my first Act that I am covering, The "Controlling the Assault of Non-Solicited Pornography and Marketing Act Of 2003" Otherwise known as the (CAN-SPAM Act) of 2003. The CAN-SPAM Act defines a "commercial electronic mail message" ("CEMM") as any electronic mail message, the primary purpose of which is commercial advertisement or the promotion of a commercial product or service (including content on an Internet web site operated for a commercial purpose). To put it all in a nutshell the best I can; Emails and the internet are now becoming more and more popular now it’s 2003. Advancement in Computer systems and electronic mail messages led to a big increase in business’s in America sending misleading or deceptive emails to try to sell a product or service. To summarize it in a few sentences, businesses were flat out lying via subject headings, addresses, having multiple email accounts, etc. etc. Also, Sending a CEMM that includes sexually oriented material without adequate warnings in the subject heading and an opt out message prior to displaying any additional information in the message is prohibited. With Microsoft, Apple, and others producing advancement in computers, phones, and technology, the internet was becoming a portal for pornography companies and others to sell their product or service. The American public got tired of it and told...

Words: 683 - Pages: 3

Free Essay

Information Technology Acts  Paper

...BIS/220 Version 1 April 9, 2010 Information Technology Acts  Paper Many laws have been implemented by Congress to protect the integrity of United States citizens.  With this fast technology  growth. Several of these laws are not even ten years old,   especially some Information Technology Acts.  As the nation grows, our laws grow just as fast.  Information Technology is the “acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of telecommunications and computing”.  Includes various areas incluing, computer software and hardware, programming langueages and processes. After doing extensive research in a lot of the Technology Acts, the following acts are going to be discussed within this paper;  Computer Fraud and Abuse Act,   (CFAA) 1986    and Children’s Protection Act, 2000 (CIPA).  CFAA was introduced to reduce cracking of computer systems and to address Federal computer related offenses.  This act, which is codified as 18 U.S.C   § 1030 covers most federal computer related offenses.  California was the first state to legislate a reporting requirement for computer hackers.  The CFAA mainly deals with people who have exceeded the scope of authorized access and computer hackers.  Computer Fraud and Abuse Act. The CFAA knows that a cyber-attack can damage a business as well as incur substantial costs responding to unauthorized use or computer hacking. It would not surprise me...

Words: 656 - Pages: 3

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper George Tomadakis BIS/220 January 16, 2012 Marry Robbins Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This was a very sound control. Then the Internet came in the 1990’s, children had unsupervised access. The porn industry went crazy; they would do anything to get anyone to their sites. Children were being exposed to it and it was deemed harmful. Congress tried to pass laws to stop it, but every direction they went was determined to be unconstitutional. Finally technology prevailed, to an extent. Maybe Congress could not pass a law that would penalize the distributor; they could pass a law that would affect the end user that received federal money. On December 15, 2000 Congress added the Children’s Internet Protection Act and President Bill Clinton signed it into law on December 21, 2000. The Act places restrictions on entities receiving Federal funding. They must use policies and technology that blocks or filters certain material from being accessed using the internet. ("American Library Association", 1997-2012). The Internet with all of its wonders was not only being used to show are children imagery and information, the technology was...

Words: 471 - Pages: 2

Free Essay

Information Technology Act Paper

...Information Technology Act Paper Dannie Roettger BIS220 February 14, 2013 Paul Kirchner Information Technology Act Paper In the ever changing fast paced world of information technology where information is bought, sold and traded for financial gain. Our governments have had to invent laws to ensure that our personal information is safe and not being used improperly. Two of the laws or acts we will explore in this paper are the Telephone Consumer Protection Act and the Fair Credit Reporting Act of 1970. We will look why these laws were enacted and the benefits that have come from these acts. The first act we are going to look at is the telephone consumer protection act. The Telephone Consumer Protection Act or the TCPA was passed on December 20, 1991 and went in to affect just one year later ("Telephone Consumer Protection Act (tcpa)", 2012). This act was put in place to stop the harassing telemarketers and regulate the selling of personal information. The TCPA was passed to regulate telemarketers and to add some ethical guidelines to their operating practices. Some of the benefits that came from the TCPA was telemarketers could only call residents between the hours of 8 AM and 9 PM. Another regulation that came from the telephone consumer protection act was the No Call List ("Telephone Consumer Protection Act (tcpa)", 2012). If a person requested to be on the no call list the telemarketer must place that consumer on the no call list and not call the consumer again....

Words: 638 - Pages: 3

Free Essay

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can demonstrate...

Words: 1012 - Pages: 5

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper The two acts I have selected to write about are the Do Not Call Act of 2003 and the Child’s Internet Protection Act. This paper will provide an understanding why the law required these acts to be established and why each of them played an important role in improving information technology. The first act to be discussed is the Child’s Internet Protection Act and the second act is Do Not Call Act of 2003. Child’s Internet Protection Act The Child’s Internet Protection Act also known as CIPA was established in 2000 by congress to directly address the concerns of children being able to access obscene and harmful sites through the internet. The CIPA imposes specific set of requirements on libraries and schools that receive discounted rate for internet access. In 2001 the FCC issues guidelines and updates to the rules in 2011. CIPA states that any school or library may not qualify for the discounts offered from the E-rate program unless the school or library has a an internet safety policy that covers technology protection measures that blocks obscene, harmful to minors, and child pornography ("Children’s Internet Protection Act", n.d.). The internet is not monitored and because of this children require supervision when access the websites. Schools that are subjected to CIPA rules must meet two additional requirements: 1. Internet safety polices will include monitoring online use of minors 2. Must provide education to minors on appropriate...

Words: 614 - Pages: 3

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper Justine Huffman BIS/220 July 28, 2014 Vivien Lewis Information Technology Acts Paper With the advances in information technology (IT) today, individual’s personal and business lives are improving in a numerous amount of ways. Regrettably, with new technology advances, comes a growing amount of ethical issues such as an invasion of property, privacy and easy access to sensitive information. With personal information being stored in databases and shared over the web privacy can be breached with just a couple clicks of a button. Ethical issues that have formed from the advancements in IT call for new acts to be put in place to protect the privacy of today’s consumers. The Children’s Internet Protection Act of 2000 and the Do Not Call Implementation Act of 2003 are examples of Acts that are being created because of the ethical issue being formed from the advancements in IT. The Children’s Internet Protection Act was sign in to law on December 21, 2000 by President Bill Clinton. This act was designed for public libraries and public schools to apply filters and monitoring to block visual depictions of obscenity, child pornography and material harmful to minors (Canon, 2001). Before schools or libraries adopt the act the must hold at least one public hearing or meeting to address the proposal. Schools and libraries must meet two certification requirements: 1) the Internet safety policy must monitor the online activities of minors and 2)...

Words: 733 - Pages: 3

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Joseph Morales University of Phoenix BIS 220 Gregory Peterson March 11, 2014 Information Technology Acts Paper With the advent of technology and many uses of it, come new ethical problems. Technology has helped out in many ways such as making business and personal communication efficient and effective. It has also changed how companies run the business and how consumers purchase goods. Technology has also made it much easier to do research and review things that are of interest or needed for many things. The internet is an example and one of the most widely used for all of these technological purposes. Telecommunications such as phones is another technology and has been around for some time now but has been exploited for unethical uses. Unethical uses of telecommunications and the internet is also a reason why some of these acts such as the Do Not Call Implementation Act, 2003 and the Children’s Internet Protection Act has been put in place. To bombard people with phone calls to solicit business is believed to be unethical. This is a reason why the Do Not Call Implementation Act, 2003 was put into place. By inputting any personal information on the internet such as when applying for a new credit card for example, that opens the flood gates to solicitors accessing that information and potentially inundating one with phone calls. This act made it illegal for telemarketers to contact registered phone numbers, the law did not extent to...

Words: 517 - Pages: 3

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Bis/220 3/9/2013 Paul Porch Information Technology Acts Paper The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) was created in response to the terrorist attacks of September 11, 2001. This act once passed became a law almost immediately, less than two months after the attacks. This Act has been modified thru the years implementing better rules to help protect our country. In 2006 the Act was modified once again, this time including a some modifications with technology. “The Act brought the law up to date with current technology, so we no longer have to fight a digital-age battle with antique weapons-legal authorities leftover from the era of rotary telephones. When investigating the murder of Wall Street Journal reporter Daniel Pearl, for example, law enforcement used one of the Act's new authorities to use high-tech means to identify and locate some of the killers.”  ("Justice Information Sharing Department Of Justice").  This Act also extends to law enforcement and foreign intelligence purposes. The purpose of the Act was to enable the government to investigate any potential terrorist more efficiently and effectively. “It expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, to combat money laundering.”  (“The PATRIOT Act Revisited ,” 2004). As with anything the government...

Words: 590 - Pages: 3

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the individual consumer. The advances have not only made it possible to access information at home but also encourage teenagers and younger children to participate in gathering information via the Internet. Access to the web by children led to the enactment of laws such as the Children Internet Protection Act (CIPA) and the Children’s Online Privacy Protection Act (COPPA). These acts were implemented as a security method to aid in the protection of minors. Some websites containing nudity, online pornography, and other explicit content are banned from exploiting children. Children are viewed as easy victims to trick into providing private information or soliciting monetary compensation for obscene content. Because of this perception, additional laws are necessary to protect children when in comes to information technology. CIPA places restrictions on schools and libraries such as limiting the support of federal funding if certain requirements are not adhered. This act was signed by former President Bill Clinton in December 21, 2000. The design...

Words: 576 - Pages: 3

Free Essay

Information Technology Acts Paper

...ASHLEI MCQUEEN Information Technology Acts Paper BIS/220 PROFESSOR ZAMIR DEEN July 21, 2014 Information Technology Acts Paper The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 was enacted into law in January 2004 (Kigerl, 2009). This law was created from the enormous bulk spam in emails that hit airwaves I the 2000 's. everyone now has a computer of some sort Weathersby desktop laptop or tablet well and the new millennium decade everyone had a desktop home computer. What kept reoccurring was some of these balk messages would contain pornographic material and unwanted irritating and embarrassing material into people's inboxes of their email. This created a really bad phenomenon of people not liking to use email because I cannot tell what real email was and what was junk and there was nothing to break down each email or monitor what you were really writing to people because of all the horrendous spam. This is when can spam Law was created it big knowledge the ethical issues and recognized the marketing downfall people would face if they cannot protect email users from unwanted messages . As far as it manages an informational technology based on the ethical issues above they have had many advancements. For one the email service allows people to write a message to anyone on the continent with the click of a button. However many features have made ethical problems and prevailed through and made spam one of the most unwanted things...

Words: 956 - Pages: 4

Free Essay

Information Technology Acts Paper

...advances in information technology resulted in new ethical issues that needed to addressed and necessitating the creation of The United States Computer Fraud and Abuse Act of 1986 and the Children’s Internet Protection Act of 2000 are to be addressed in this paper. The advancement in information technology such as the world wide web, search engines, YouTube, and virtual databases have made it easily accessible to obtain personal information, but also grant anyone access to age-inappropriate sites. The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes. Technology advancements made it necessary to protect everyone’s privacy since it had become much easier to store and access an individual’s personal data within a corporation’s database. According to our text: “privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself...

Words: 418 - Pages: 2

Free Essay

Information Technology Act Paper

...Nowadays, technology is advancing at an exponential rate. Over the last two decades or so, everyone in the world has essentially become connected to one another via computer, the internet, and social media. But as the world becomes more connected, does it also become more vulnerable? Let’s be honest, not everyone in the world has everyone else’s best interest at heart. How many times have you had to turn off the ringer of your phone because of the nonstop assault of telemarketer calls? How many emails have you received saying you’ve won the lottery in London or that the Prince of Nigeria would like to conduct business with you? It is these types of issues that motivated the United States Congress to enact several laws to protect America and its citizens from technological attacks and exploitation. In this paper, I will describe two such acts and discuss the advances in technology that resulted in new ethical issues making each such act necessary. In 2002, the United States Government enacted the Federal Information Security Management Act (44 U.S.C. § 3541, et seq.), or FISMA. FISMA recognizes the significance of information security to the economic and national security interests of the United States and mandates that each federal agency develops documents, and implements an agency wide program to provide information security for that agency ("FISMA Center", 2010). This law was enacted due to the thousands of cyber-attacks of several Federal Agencies by both foreign and domestic...

Words: 516 - Pages: 3

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper Jessica Jordan BIS/220 Mai Nguyen October 17, 2011 Information technology has greatly advanced through the years. For the most part, these advancements are beneficial to consumers, however, the advancements have also made it necessary for the government to step in to create acts in order to set restrictions and help protect consumers’ rights. Two of the acts implemented are the Children’s Internet Protection Act, 2000 and the Do Not Call Implementation Act, 2003. The Children’s Internet Protection Act, 2000 is a federal law that requires schools and libraries to certify that they have an Internet safety policy that takes measures to block or filter Internet access to pictures that are obscene or child pornographic and, for computers that are accessible to minors, pictures that are harmful to minors. Schools and libraries are also required to implement an Internet safety policy which addresses minors’ access to inappropriate matter, minors’ use of electronic mail and chat rooms, unauthorized access by minors online, disclosure of personal information regarding minors, and minors’ access to harmful materials. Also, schools are required to monitor online activities of minors (Federal Communications Commission Guide, 2011). The advances in information technology that resulted in the Children’s Internet Protection Act, 2000 are the popularity of the Internet and the ease of access to share information through this source. The Internet...

Words: 565 - Pages: 3