Free Essay

Information Technology Acts

In:

Submitted By yellowthang
Words 1402
Pages 6
BIS 220: Introduction to Computer Application and Systems
James Boykin

December 20, 2011

Abstract To ensure the legal security of communications between persons, associations, partnerships and the State, acts of information technology have been created to regulate many industries (Publications du Quebec, 2011). With the rapid change in technology and the misuse of information technology, laws needed to be created to regulate areas of data privacy, information transmitted digitally and to reduce the amount of paperwork. In this paper, the Fair Credit Reporting Act of 1970 and the Do Not Call Implementation Act of 2003 will be highlighted. The ethical issues surrounding the creation of these acts due to the advances in information technology that let to these acts will be highlighted.
Fair Credit Reporting Act, 1970 Due to our ability to house and store and control vast amounts of data with our computers, manipulate large amounts, there lies both social ethical implications with the use of these said computers. It is very easy to experience many right or wrong methods in using computers to access data and what can possibly be done with this information to use to our advantage. Cyber-crimes are committed every ten seconds and in order to combat it and to protect ourselves from it, laws, acts and amendments must be created and regulated by Congress to protect consumer’s rights. We make ourselves vulnerable on a daily basis to identity theft. Our privacy can be invaded very easily and is an extremely fast growing crime that leads to ruined credit, a lot of pain and requires years of hard work to repair it. Because computers are able to store huge amounts of information, the wrong person can gain access and use this information to make fraudulent purchases or gain loans deceptively. Just think about how vulnerable we become when we withdraw money from the ATM, swipe our car at the grocery store, use our card to purchase airline tickets or to reserve a rental car, our information is being stored on someone’s computer or in a database. Think about what information is collected to gain information about you and your life. You are now allowing someone access to your vital information including your social security number, your date of birth, your address and often times, your mother’s maiden name. This is valuable information to a scam artist and with this information; they can create a new life based on your information. In an effort to protect your information and allow a consumer if there has been fraudulent activity using their information, the Fair Credit Reporting Act was created. The Fair Credit Reporting Act (FCRA), Public Law No. 91-508, was enacted in 1970 to promote accuracy, fairness, and the privacy of personal information assembled by Credit Reporting Agencies (CRAs) (Epic.Org, 2011). The act ensures consumers are able to retrieve information that is provided to potential and current lenders, creditors, insurers, etc. that help shape the decision whether or not to provide credit or do business with regarding other services. For example, if a person wanted to apply for a line of credit from a retailer and was advised that they were denied due in part to information provided on their credit report, the consumer would be entitled to see what information was provided to assist in rendering that decision. This gives the consumer the opportunity to dispute any negative or incorrect information listed to clear their name and credit. A great feature about this act is that it prohibits and monitors who can have access to your credit files and if necessary with a written court order or permission of the consumer whose information is being accessed. The lack of credit can greatly impact a household and a consumer’s purchasing power. A poor credit rating can be the difference of the immediate satisfaction of purchasing a high-priced ticket item with the ability to pay it off over a period of time and the difference of having to wait several weeks or months to save the money to make that same purchase. US Credit markets are the most efficient in the world allowing households to smooth their consumption patterns over time, rather than postpone major purchases until incomes and asset holdings build to sufficient levels (Staten, M and Cate, F., 2003). These and many other issues are a result of advances in technology.
Do Not Call Implementation Act of 2003 Another act created due to advances in technology is the Do Not Call Implementation Act of 2003. Due to an increasing number of complaints received by the Federal Communications Commission (FCC) filed by consumers against telemarketers from various companies for unwanted calls, the Do Not Call Implementation Act of 2003 was erected. The Federal Trade Commission, along with the Telephone Consumer Protection Board, established a registry where consumers could be added to reduce or eliminate the number of unwanted telemarketer calls. Consumers are able to freely register their phone number(s). Their phone number will remain on the list until they call to remove it. The increasing number of unwanted calls can be attributed to advancements in technology and creation of the automatic dialer. Years ago, telephone operators and telemarketers would take a list of phone numbers and manually call each person on that list to solicit for various types of services ranging from vacation packages, donations for charitable events and surveys to name a few. As an operator would reach a live person, they would attempt to “sell a service”. While selling this service, the operator would also collect information to validate the customer’s information and to further populate their databases. You can imagine how long this process would take. In the call center, manual dialing can take up too much time. When telemarketers dial numbers manually, they spend a considerable amount of time reviewing paper records or computer terminal screens, selecting the person to be called, finding the phone number, dialing the number, updating the records after each call and if the customer doesn't answer, the agent has to remember this and call the customer later. With manual dialing, agents spend more time attempting to find a prospect than talking (Amodio, 2011). With the use of an automatic dialer or auto-dialer software, the number of phone lines is essentially doubled and increases a telemarketers talk-time because the software/machine is doing all of the manual work for the agent. The software has the ability to bypass busy signals, disconnected phone numbers and answering machines. How does this affect the average consumer? What happens is that the consumer is now exposed to double or triple the number of unwanted calls. This can be very annoying and aggravating when you are trying to enjoy a nicely-prepared dinner with your family or home trying to complete a paper for your BIS 220 class. In either case, it becomes a nuisance and as a consumer, we have a right not to be bothered by this form of inconvenience; hence the creation of the Do Not Call Implementation List.
Conclusion
We can all agree that with each passing day technology has an impact on how we live our lives. In a perfect world, technology advancements would only serve us positively to assist in living our lives better. Similar to BASF Chemical Company’s slogan, "We don't make a lot of the products you buy. We make a lot of the products you buy better”, technology is meant to work for the greater good. However, for each positive technological advancement, there will always be those that find ways to use that same technology negatively to enhance their lives at the expense of others.

References
Publications du Québec. (2011, Dec 12). An Act to establish a Legal framework for information technology, RSQ, c C-1.1. Retrieved from http://canlii.ca/t/l1bw

Epic.Org. (2011, Dec. 10). The Fair Credit Reporting Act (FCRA) and the Privacy of Your Credit Report. Retrieved from

http://epic.org/privacy/fcra/

Staten, M., Cate, F. (2003, May 13). The Impact of National Credit Reporting Under the Fair Credit Reporting Act: The Risk of New Restrictions and State Regulation. Retrieved from http://www.ftc.gov/bcp/workshops/infoflows/statements/cate02.pdf

Amodio, M. (2011, May 2). Auto Dialer VS Manual Dialing: The Great Debate. Retrieved from http://www.tmcnet.com/channels/auto-dialer/articles/170179-auto-dialer-vs-manual-dialing-great-debate.htm

Similar Documents

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 BSAH16ZDG6 Facilitator: Dr. Charles A. von Urff Week 1 Individual Assessment Due March 11, 2013 Submitted March 11, 2013 Executive Summary In today’s age and society, information technology is a growing necessity in the functioning of retrieving information from the internet. Thus access to the internet is available to everyone no matter the age. In order to protect all ages of internet users, the United States Congress has passed several Acts to protect users. With the advances in information technology the ethical issues of privacy and appropriate content in regards to children have lead to the United States Congress passing the Children’s Internet Protection Act of 2000 (CIPA) and Children’s Online Privacy Protection Act of 1998 (COPPA). Each Act has its own ethical issues as to it’s creation with the importance of children’s safety as the main concern. Introduction With the advancement of information technology in which all ages of users are being accommodated, everyone in today’s society has access to utilize all forms of information technology. The usage of information technology can include but is not limited to listening to music, watching movies/videos, playing games, communicating via email, social networks, or chat rooms, and getting help with school assignments. The researching of information via information technology...

Words: 994 - Pages: 4

Premium Essay

Information Technology Acts

...advances in information technology that has resulted in new ethical issues arising that has necessitated the creation of various congressional acts. We will review two of these congressional acts, which are the Health Insurance Portability and Accountability Act (HIPAA) and the Children’s Online Privacy Protection Act (COPPA). In both of these congressional acts, we will look at its purpose, the ethical issue/reason requiring the congressional act along with potential implications if the act did not exist. First, we will discuss the Health Insurance Portability and Accountability Act (HIPAA). Over the years as information technology became more advanced and widely used in the health and medical field, control measures needed to be established in order to provide additional protection to the rights of patients. On the same note, the medical field needed to be able to quickly share information through information technology in order to provide timely patient care as well. As a result of the need for patient rights while providing and protecting our society through information technology, the Health Insurance Portability and Accountability Act was established in 1996. The Health Insurance Portability and Accountability Act require medical offices specifically doctors to ensure the protection and privacy of their patients medical information by using a nation-wide standard format when conducting transactions through the use of information systems. In addition, patient information may be...

Words: 729 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts Chad T Lane BUS/220 30 June 2014 Mrs Colette Gardner Information technology is a dynamic and rapidly changing industry. Up until roughly two hundred years ago, all communication required walking, horseback, or some other form of manual labor. The telegraph was the first step down the path of information technology when Claude Chappe first invented it in 1794 (Bellis, ). The telegraph was the gateway to a plethora of other forms of communication that lead to social media, email, blogging, text messaging, etc. The internet is probably the biggest and most powerful breakthrough in information technology. With that, comes a lot of potential for people to do things they should not, say things they would not say in person, and target an audience that might have gone otherwise unreached. The Children’s Internet Protection Act of 2000 was passed in order to prevent children from exposure to pornographic material and things that are not age appropriate for young children in situations where schools or libraries receive internet at a discounted rate  (FCC,). Prior to the internet, someone wishing to purchase pornography or R-rated movies would be required to prove legal age to do so because these transactions largely took place in person. The internet has no hard and fast way of verifying age so keeping children away from things they should not see, requires use of filters and other resources to block certain material and websites. Many people will...

Words: 467 - Pages: 2

Free Essay

Information Technology Acts

...Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available. Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data information across the various environments for the users utilizing the systems (Wikipedia, 2014). From professional, academic and personal situations these systems are more than ever present in the daily routine. The increased demand and use of these systems does make daily tasks easier and quicker to complete, but even the most beneficial tools can come with a cost. The information systems we utilize improve efficiency and effectiveness, but open doors for dangerous, illegal, and unethical actions. In order to control or limit these technological woes, various laws and procedures have been put in place to protect the users and societies that wish to implement these systems features into their lives. In this paper we will examine two laws specifically what they entail, the ethical dilemmas...

Words: 1432 - Pages: 6

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list. As technology has expanded, it has become increasingly...

Words: 556 - Pages: 3

Premium Essay

Information Technology Act

...limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries.       Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000       In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009). “The major concern with the implementation of the law is the inability to prevent over filtering for bona fide research” (Menuey, B. P. 2009). It is the school and libraries responsibility to place content filters on their systems in order to keep children from searching inappropriate sites that may be harmful for children (Kessler 2001). “With the miniaturization and spread of surveillance technologies lead many people...

Words: 291 - Pages: 2

Free Essay

Information Technology Acts

...Information Technology Acts Patricia Bryant BIS/220 July 30, 2012 Marilyn Taylor Information Technology Acts Information technology is rapidly changing and in constant need of new acts to protect people and information that gets put into computers. In early years it was giving the letters or parcels to a trusted person to be passed on to the recipient. As times have changes and new technology has emerged more drastic privacy protection measures have been put in place. Two that I see as important are the Children’s Internet Protection Act (CIPA) 2002 and the Family Educational Rights and Privacy Act (FERPA), 1974 The Children’s Internet Protection Act (CIPA) was enacted back in 2002 by Congress with the intensions of keeping obscenities and inappropriate pictures from being viewed or read on any school computers or in libraries. The need for this act resulted due to minors having access and exposing other children to possible harmful situations, materials and keeping minors from disclosing personal information. Schools not only have to safe guard what minors can have access to in schools and in libraries, but they also have to protect the student school record. The Family Educational and Privacy Act (FERPA) was added into federal law in 1974 for the protection of each students record. The law states the rights of access to the record is with the minors parents until the age eighteen. There are three rights granted by the FERPA and they are; the right to inspect and review/right...

Words: 455 - Pages: 2

Free Essay

Information Technology Act

...Information Technology Acts Sherwoska Smith BIS/220 July 3, 2013 Information Technology Acts Although some people still take pleasure in writing checks, checks are a thing of former times. Some people also still carry out most of their banking necessities inside a local branch however majority of their needs can be handle online from the convince of their home. The advancements in information technology have been the basis for the creation of the Electronic Funds Transfer Act, 1978 and the No Electronic Theft (NET) Act, 1997. According to "Consumer Affairs Laws And Regulations" (2010), " The Electronic Fund Transfer Act (EFTA) (15 USC 1693 et seq.) of 1978 is intended to protect individual consumers engaging in electronic fund transfers (EFTs). EFT services include transfers through automated teller machines, point-of-sale terminals, automated clearinghouse systems, telephone bill-payment plans in which periodic or recurring transfers are contemplated, and remote banking programs.” (Electronic Funds Transfer Act). According to "University Information Technology Services" (2005-2013), Congress enacted the No Electronic Theft (NET) Act in 1997 to facilitate prosecution of copyright violation on the Internet. The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or...

Words: 346 - Pages: 2

Premium Essay

Technology Information Act

...Information Technology Act BIS/220 April 23, 2012 Information Technology Act In the world we live in today, there’s some type of electronic device being used to connect to the Internet. “The world-wide platform enable individuals to connect, compute, communicate, compete, and collaborate everywhere, and anywhere, anytime and all the time, and to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries. Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000 In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009). “The major concern with the implementation...

Words: 710 - Pages: 3

Premium Essay

Information Technology Act

...Information technology as we know of today has came a very long way this past couple of decades. Internet has placed our world at our fingertip. If a person need to find information regarding a subject, if they need to learn about different country and their culture they can go online and research the information without leaving the comfort of their home. With all these advancement internet also has its downside. Anyone with the access to internet can post any information online, not only can they post wrong information, they can also post things that are not suitable for certain audience. Also, through internet commercial companies can collect personal and valuable information from children. With all the new ethical issues that resulted from the advancement of the information technology their had to be certain rules implemented to keep the children safe. Children have access to internet at home, school and library. Internet has become a major tool for todays education. Children are encouraged to use internet to do research and find information for their projects. While they have free access to online information it is also important to monitor the use of internet by young children. When children access the internet it can put them in contact with information that are not suitable for them. While some children might come across inappropriate material inadvertently their are also children who might seek out inappropriate material voluntarily. There are sites that promote...

Words: 665 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts Mayra Gonzalez BIS/220 October 28, 2013 Jadie Giorgis Information Technology Acts While information technology continual to move ahead over the years, ethical concerns turn into an issue. Accordingly, the government executed specific acts to govern these concerns. Even as some of these acts exists, this text centered on two sections specifically: US Patriot Act of 2001, and Fair Credit Reporting Act of 1970. Whereas the Patriot Act was executed to lessen terrorist activities by the use of the internet, the Fair Credit Act was executed to give every American with be on a par with credit opportunities. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also well-known as the Patriot Act of 2001 was enacted in 2001. The Patriot Act was established to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and other purposes” (US). Table 1.1 below provides a synopsis of the sections of the Patriot Act involving financial institutions and their operations. Table 1.1 Sections of the Patriot Act of 2001 Section Purpose | 311 “Special Measures for Jurisdictions, Financial Institutions, or International Transactions of Primary Money Laundering Concern | 312 Special Due Diligence for Correspondent Accounts and Private Banking Accounts | 313 Prohibition on U.S. Correspondent Accounts with Foreign Shell...

Words: 998 - Pages: 4

Premium Essay

Information and Technology Acts

...Terrorism Strikes Janay Garcia BIS/220 1 April 2014 C. Chevannes When Terrorism Strikes Abuse of national security and terrorism are two of the most important issues our country is fighting to this day. Two acts have been implemented to help control these issues; although they were implemented 15 years apart they go hand in hand in protecting our country. The Computer Fraud and Abuse Act (CFAA) was created in 1986 and states that anyone who obtains information without authorization is punishable under the Act. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) was established in 2001 after the terrorist attack on September 11, 2001. This Act allowed law enforcement to use tools that were already available to detect and prevent terrorism. What were the advances in technology that necessitated the creation of these acts? There are seven crimes listed under the CFAA: obtaining national security information, trespassing in a government computer, damaging a computer or information, compromising confidentiality, trafficking in passwords, threatening to damage a computer, and accessing to defraud and obtain value. Essentially, this act protects against hacking. The evolution of information technology (IT) though, has increased the vulnerability of our society. Robert Morris was the first person to be indicted under the CFAA in 1990. Morris was a graduate student at Cornell when he released a worm, a self-replicating...

Words: 519 - Pages: 3

Premium Essay

Information Technologies Act

...In discussing the advances in information technology, that resulted in new ethical issues necessitating in the creation preventive measures, we will look into; The Children’s Online Privacy Act, 2000 as well as the No Electronic Theft (NET) Act, 1997. Both of these acts were created due to unethical actions by a group of people or a person. The Children’s Online Privacy Act or CIPA, was created in 2000 because there was a concern about the material children were being exposed to online. The advancement in information technology made it even easier for children to have access to anything online. In order to combat this, CIPA would offer incentives to participate in a program that would aid in the protection of children by providing discounts to those who agree to participate. In order to participate in this program, a school or library would have to agree to have a town hall meeting to address the proposal of implementing the Internet monitoring and safety program. Once the public is informed, then they must agree to monitor the activities while children are online as well as, but also educate the children on what behavior is inappropriate. Once the school or library agrees to use and implement the safety policies by created CIPA, certain guidelines must be laid out and followed. CIPA will then address potential issues and how they are to be dealt with. They must have procedures to not only monitor inappropriate behavior by minors but also to inform them of what behavior...

Words: 673 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts Paper BIS/220 01-26-2012 Information Technology Acts Paper Advancements in information technology are made daily. Theses advancements have brought new ethical issues to the surface. Complexities that could not be imaged 30 years prior are making the public take a look back at privacy and how fast it is disappearing. The processing of data via the computer (Encarta, 2003), better known as information technology, brings with it the ability to gather and distribution of large amounts of data inexpensively. The majority of the data available on-line is the comprised of bits and pieces of everyone’s lives. The public has taken a closer look at the options they have to govern that data and protect their privacy. Two laws put into place to protect the public’s privacy were the Do Not Call Implementation Act of 2003 and the Childrens Internet Protection Act of 1998 (COPPA). Do Not Call Implementation Act of 2003 Some of the major advancements in information technology are the World Wide Web, electronic mail, mobile phones, and multiple communication device options. The combination of these advancements made individuals personal contact information very accessible. This gave telemarketers many different ways to contact possible customers. Many organizations used this opportunity to bombard, anyone unlucky enough to unknowingly provide their data, with multiple sale attempts. The Do Not Call Implementation Act of 2003 was in response to the unethical...

Words: 450 - Pages: 2

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 February 25, 2013 Abstract The basis of this paper is to explain the advances in information technology that ultimately resulted with the creation of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These two acts are beneficial to the privacy of oneself regarding medical files and the protection that the Federal Trade Commission provides to children while they are using the Internet. The paper will go farther into detail about why these acts were created and how they are beneficial to society today and for our future. Information Technology Acts The many advances of information technology have resulted in ethical issues requiring the creation of many important acts. Information technology is a very important branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information. Two acts specifically are the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These acts were carried out for many reasons, including; but not limited to privacy of personal health care information and protecting our children’s identities on the Internet. According to Sage Knowledge (2009), the Health Insurance Portability and Accountability Act of 1996, also known as HIPAA, is a federal...

Words: 734 - Pages: 3