...The Financial Sector and Emerging Technology November 11, 2012 BIS/220 – Clarence Wheeler, Jr. In the 1970’s, technology was beginning to rapidly change the way the financial sector completed transactions and held records. Many records had changed to being stored electronically and the use of debit cards and electronic banking transactions had begun. This created a higher possibility for fraudulent activity. As records were being stored electronically and information being transferred the same way, consumers’ information was at risk. Regulations had to be put in place to control this activity. The Fair Credit Reporting Act (FCRA), was enacted in 1970 to create guidelines for Credit Reporting Agencies (CRA). CRAs had operated in a way that employees had to meet a quota for offering credit and declining credit to consumers. This created some fraudulent activity and unethical changes made to consumers’ credit reports. Consumers, at this time, had no right to view what was on their credit reports. The government realized this was unacceptable and unethical and created the FCRA to protect consumers. (The Fair, 2011) CRAs were also basing credit worthiness on factors that shouldn’t matter for extending credit. They were looking at things such as religion, sexual orientation and gender to make these decisions. The government put a stop to this with the FCRA. It is now illegal to make such decisions based on personal traits such as these. CRAs must use the same...
Words: 654 - Pages: 3
...Information Technology Acts Liriaxis Marie Gonzalez BIS/220 June 25, 2013 Nnamdi Osakwe Information Technology Acts Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a result government passed acts to prevent child abuse on the internet. The two acts being discussed in this paper are the Children’s Internet Protection Act of 2000 and the Children’s Online Protection Act (COPPA) of 1998. Children’s Internet Protection Act, 2000 The Children’s Internet Protection Act (CIPA) is a federal law which was passed by Congress to prevent children from viewing the offensive or harmful content over the Internet ("FCC", 2013). CIPA regulates the schools and all public libraries. It makes it mandatory to filter all its computers to stop children from accessing sites that are not appropriate. ("FCC", 2013). The (CIPA) was passed in December 2000 and its main priority is to protect children’s innocent eyes from child pornography and other dangers of the internet. CIPA does not require a certain kind of filter system, but rather to make sure schools and libraries have some sort of filters to prevent such activities. There are online predators, inappropriate chat rooms, and sexual content that children are at risk for if...
Words: 606 - Pages: 3
...BIS 220 Entire Course FOR MORE CLASSES VISIT www.bis220helps.com BIS 220 Week 1 Individual Assignment Information Technology Acts Paper BIS 220 Week 1 DQ 1 BIS 220 Week 1 DQ 2 BIS 220 Week 2 LT Reflection Summary BIS 220 Week 2 Individual Assignment Information Systems Proposal BIS 220 Week 2 DQ 1 BIS 220 Week 2 DQ 2 BIS 220 Week 3 Individual Assignment Types of Electronic Commerce Activity BIS 220 Week 3 LT Reflection Summary BIS 220 Week 3 Team Assignment Efficiency and Collaboration Proposal BIS 220 Week 3 DQ 1 BIS 220 Week 3 DQ 2 BIS 220 Week 4 Team Assignment Wireless Technologies Proposal BIS 220 Week 4 DQ 1 BIS 220 Week 4 DQ 2 BIS 220 Week 5 LT Reflection Summary BIS 220 Week 5 Individual Assignment Social Media and Networking Presentation ********************************************************** BIS 220 Final Exam Guide FOR MORE CLASSES VISIT www.bis220helps.com 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your...
Words: 693 - Pages: 3
...BIS 220 Entire Course FOR MORE CLASSES VISIT www.bis220helps.com BIS 220 Week 1 Individual Assignment Information Technology Acts Paper BIS 220 Week 1 DQ 1 BIS 220 Week 1 DQ 2 BIS 220 Week 2 LT Reflection Summary BIS 220 Week 2 Individual Assignment Information Systems Proposal BIS 220 Week 2 DQ 1 BIS 220 Week 2 DQ 2 BIS 220 Week 3 Individual Assignment Types of Electronic Commerce Activity BIS 220 Week 3 LT Reflection Summary BIS 220 Week 3 Team Assignment Efficiency and Collaboration Proposal BIS 220 Week 3 DQ 1 BIS 220 Week 3 DQ 2 BIS 220 Week 4 Team Assignment Wireless Technologies Proposal BIS 220 Week 4 DQ 1 BIS 220 Week 4 DQ 2 BIS 220 Week 5 LT Reflection Summary BIS 220 Week 5 Individual Assignment Social Media and Networking Presentation ========================================= BIS 220 Final Exam Guide FOR MORE CLASSES VISIT www.bis220helps.com 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems....
Words: 1222 - Pages: 5
...Week 3 Reflection Team B BIS/220 Novemember 21, 2013 Douglas Martin Week 3 Reflection BIS/220 Introduction to Computer Applications Systems is a course that describes how database are used in the work environment, explains the benefits of collaborating tools to the work environment, and compare types of electronic commerce. A database collects records or stores information that is stored in a computer in a logical manner so that the information can be stored, managed, or retrieved. Databases are useful for large amounts of data and producing reports and documents for school or a workplace environment. There are a number of ways that the database can contribute to the success of the company. Whereas, managers are able to make accurate decisions based upon the information that is stored within the database. The information allows the organization of the company to reduce costs, increase profits, and analyze data to make future predictions on the interests. In class, we went over (DBMS) Database management Systems it provides users with accessing all the data. Which, companies that use DBMS systems as its single pointed of management for all of its data resources as part of a database environment. Which DBMS leads to three types of problems they are Data redundancy, data isolation, and data inconsistency. Data reduncy is the same data that is stored in many places, data isolation is applications cannot access data associated with other applications, and data inconsistency...
Words: 656 - Pages: 3
...Sample Business Information Systems Business Plan Your Name(s) Go Here University of Phoenix BIS 220 June 15, 2014 Table of Contents 1.0 Executive Summary 4 1.1 Mission Statement 4 1.2 The Market 4 1.3 The Offering 5 1.4 Competition 5 1.5 Business Information Systems Resource Requirements 5 1.6 Business Information Systems Key Issues 5 2.0 The Business Information Systems Enterprise 5 2.2 Organization 5 3.0 Business Information Systems Selection 5 3.1 (What are the BIS you selected for your business? Why did you select these BIS systems? (Please provide 5 BIS systems. I.e. Point of Sales, Online ordering, Enterprise Resource Planning (ERP) etc…)) 6 4.0 Networking Technology Selection 6 4.1 (What is/are the networking technology system? Why did you select this/these networking technology systems? (Please provide at least 1 Networking Technology. I.e. Website Hosting (who will host your site), Internet Service Provider (identify bandwidth speed), Wireless capabilities, etc…)) 6 5.0 Business Information Systems and Networking Security Risk and Mitigation 6 5.1 (What are the security risks for the BIS selection?) 7 5.2 (What are the security risks for the Networking Technology selection?) 7 6.0 Business Cost Analysis (OPTIONAL) (BONUS POINTS) 7 6.1 (How much does it cost for the BIS and Networking Technologies you selected for your business?) 7 6.2 (How would you go about in obtaining funding for your business?) 7 6.3 (Provide a One-Year, Two-Year, and...
Words: 832 - Pages: 4
...BIS 220: Introduction to Computer Application and Systems James Boykin December 20, 2011 Abstract To ensure the legal security of communications between persons, associations, partnerships and the State, acts of information technology have been created to regulate many industries (Publications du Quebec, 2011). With the rapid change in technology and the misuse of information technology, laws needed to be created to regulate areas of data privacy, information transmitted digitally and to reduce the amount of paperwork. In this paper, the Fair Credit Reporting Act of 1970 and the Do Not Call Implementation Act of 2003 will be highlighted. The ethical issues surrounding the creation of these acts due to the advances in information technology that let to these acts will be highlighted. Fair Credit Reporting Act, 1970 Due to our ability to house and store and control vast amounts of data with our computers, manipulate large amounts, there lies both social ethical implications with the use of these said computers. It is very easy to experience many right or wrong methods in using computers to access data and what can possibly be done with this information to use to our advantage. Cyber-crimes are committed every ten seconds and in order to combat it and to protect ourselves from it, laws, acts and amendments must be created and regulated by Congress to protect consumer’s rights. We make ourselves vulnerable on a daily basis to identity theft. Our...
Words: 1402 - Pages: 6
...Head: INFORMATION TECHNOLOGY ACTS 1 Information Technology Acts BIS / 220 April 1, 2013 INFORMATION TECHNOLOGY ACT 2 The Patriot Act was passed in 2001 after the 9/11 attacks. The Patriot Act was passed to give law enforcement the ability to intercept emails, phone calls, money wire transfers or anything that can be tied to terrorism funding. By this time the internet was available to everyone and was an easy way for people to keep in touch when in different countries. Because of the internet everything became faster. But because of the internet and changing technologies some systems have vulnerabilities, thus making it easier for people to hack or to do other malicious things. After 9/11 people wanted to feel safe and wanted to know the government did not stop the attacks or why did the government not know. The solution to that was passing the Patriot Act. This gave law enforcement the ability to do surveillance, roving wire taps, and getting assistance from financial institutions on their customers. It gave financial institutions a guide to follow when new customers were applying for accounts. This would deter from money laundering or any type of fraud or terrorism financial support. The Federal Information Security Management Act or FISMA was created to protect government information from...
Words: 308 - Pages: 2
...Running Head: INFORMATION TECHNOLOGY ACTS Information Technology Acts BIS/220 The Telephone Consumer Protection Act (TCPA) and Do Not Call Implementation Act are two necessary laws that help protect the consumers. These were put in place to prevent harassment to the consumer. The technology in telecommunication has improved in so many ways that rules were a must in the growing out of control Telemarketing industry. The rules were basic and simple in a couple ways, and with the rule made this industry more ethical and tolerable by the consumers. The TCPA made the rules of calls are only aloud between the hours of 8:00 am to 9:00pm local times. Another is there is not mechanical voices allowed. The Do Not Call Implementation Act goes hand in hand with TCPA. The List was signed in by President Bush on Sept 2003. This would allow the consumer the ability to get on the do not call list for 5 years. Then in 2007 it was changed that once on the list you did not come off. Before the rules came into effect the telecommunication industry was able to do whatever it wanted and with no cost to consumer wellbeing. They would call at any hour of the day even sometimes from different time zones. Making them the most despised industry in the word. But the corporate world and owners did not care because this was a Billion dollar industry. With that type of money the better the technology became and the more money they made. But thanks...
Words: 319 - Pages: 2
...Information Technology Acts Sherwoska Smith BIS/220 July 3, 2013 Information Technology Acts Although some people still take pleasure in writing checks, checks are a thing of former times. Some people also still carry out most of their banking necessities inside a local branch however majority of their needs can be handle online from the convince of their home. The advancements in information technology have been the basis for the creation of the Electronic Funds Transfer Act, 1978 and the No Electronic Theft (NET) Act, 1997. According to "Consumer Affairs Laws And Regulations" (2010), " The Electronic Fund Transfer Act (EFTA) (15 USC 1693 et seq.) of 1978 is intended to protect individual consumers engaging in electronic fund transfers (EFTs). EFT services include transfers through automated teller machines, point-of-sale terminals, automated clearinghouse systems, telephone bill-payment plans in which periodic or recurring transfers are contemplated, and remote banking programs.” (Electronic Funds Transfer Act). According to "University Information Technology Services" (2005-2013), Congress enacted the No Electronic Theft (NET) Act in 1997 to facilitate prosecution of copyright violation on the Internet. The NET Act makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or...
Words: 346 - Pages: 2
...Information Technology Acts BIS/220 Rassoul Allizadeh Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? The necessities for creating the fair credit reporting act of 1970, was to control the redistribution of one’s consumer information. As information technology grows, the necessities of many others things grow as well. As we progress over the years more and more people seem to fall under the cracks of identity theft. Not only are people smarter, but can get away with things too. There are specific reasons to why we adhere to rules and acts that protect us individuals and rights. On the other hand, some of the reasons why it was a necessity to create the act was due to the fact that many people were being incorrectly reported to the credit reporting agencies. Another major reason was due to consumers applying for certain advantages and got denied, consumers did not know why or what was in their file that concluded rejection. The fair credit reporting act of 1970 allowed the consumer to request and or allow the bank or credit agency to give the consumer a copy of their credit report. With that said, if the consumer did find any incorrect information in the report, then the consumer had the opportunity to dispute any incorrect information recorded. Following, is the creation of Health Insurance Portability and accountability Act (1996). This act was created to protect...
Words: 383 - Pages: 2
...Advances in Information Technology BIS/220 Advances in Information Technology Thru out the history of man we have implemented the use of tools in our day to day lives. Many scholars believe that man’s ability to use a tool is the turning point in our evolution In today’s world the use of transfering of information by advanced technology continues to propel the human race further into a cybertronic future. This is a long way from drawing on the walls of caves. One example of advanced communication technology is the Electronic Funds Transfer Act, also known as the EFT Act or Regulation E, is a section of 1978 United States legislation aimed at clarifying the rights and liabilities of those involved in the transfer of electronic funds, including consumers. Congress passed this act with the main purpose of clarifying rights and liabilities that were determined to be unclear under the consumer protection legislation. Inside the Electronic Funds Transfer Act, transactions that originated with a check, a draft, or any other type of paper instrument are not considered. Instead, the focus is on transactions that originate through a telephonic device, an electronic terminal, or a computer or magnetic tape just like a ATM transaction, a point-of-sale transfer, a telephone wire, a direct deposit or electronic withdrawal. The type of transaction considered is one that authorizes, initiates, or directs a financial institution to credit or debit a particular account. Eventhough...
Words: 352 - Pages: 2
...Information Technology Acts Terry Sullivan BIS/220 March 7, 2014 Dr. Bruce D. Swanson Technology is constantly changing, and expanding, becoming more improved, and even more dangerous in some ways. Many people are gaining access to other people's personal information, from financial, to credit, and even information about their everyday lives. With such things being more accessible it makes it necessary to make certain changes, and to create certain laws protecting people from unlawfully obtaining and using other people's information, thus the reason the Fair Credit Reporting Act, and the Family Educational Rights and Privacy Acts were created. The Fair Credit Reporting Act (FCRA) (15 U.S.C. § 1681 et seq.) regulates the use of consumer’s credit information. Every person has the right to know what is on their credit report. People can be denied services, and even jobs because of what may be on their credit report; if someone denies you for anything based on what is in your credit report they are required to give you the information to where they gained access to that credit information about you for which that decision was based. The Fair Credit Reporting Act requires banks to maintain certain records in order to verify that credit reports are reliable. The Fair Credit Reporting Act was created because during this time consumer's information was being fraudulently used, and reported to credit reporting agencies. The Fair Credit Reporting Act was created to monitor the...
Words: 371 - Pages: 2
...Information Technology Acts BIS/220 August 5, 2013 Information Technology Acts Before I began working in the banking industry a few years ago I never realized to this how many people still continue to write checks as a means of payment. While many people have steered away from using checks there are so people that just prefer to still use them. Almost all banking needs can be done without even needing to step foot inside a banking center. With the implementations of ATM’s and mobile banking you can do almost any transaction from the comforts of your own home. These advances in information technology have cause regulations such as the Electronic Funds Transfer Act, 1078 to be implemented to keep the customers money safe while offering convenience. With so much added convenience for the customers, financial institutions and other sales driven businesses required that the Do Not Call Implementation Act, 2003 be brought into play. Electronic Funds Transfer (EFT), 1978 The Electronic Funds Transfer (EFT) was passed in 1978 as a result of all of the growth and development of electronic ATM machines and electronic banking. President Jimmy Carter signed the act in order to establish the rights and liabilities of consumers as well as the responsibilities of all participants involved in the electronic funds transfer activities. (Wikipedia, 2013) The Electronic Funds Transfer Act, is a federal law that protects consumers involved in the transfer of funds through electronic...
Words: 318 - Pages: 2
...Information Technology Acts Paper BIS/220 01-26-2012 Information Technology Acts Paper Advancements in information technology are made daily. Theses advancements have brought new ethical issues to the surface. Complexities that could not be imaged 30 years prior are making the public take a look back at privacy and how fast it is disappearing. The processing of data via the computer (Encarta, 2003), better known as information technology, brings with it the ability to gather and distribution of large amounts of data inexpensively. The majority of the data available on-line is the comprised of bits and pieces of everyone’s lives. The public has taken a closer look at the options they have to govern that data and protect their privacy. Two laws put into place to protect the public’s privacy were the Do Not Call Implementation Act of 2003 and the Childrens Internet Protection Act of 1998 (COPPA). Do Not Call Implementation Act of 2003 Some of the major advancements in information technology are the World Wide Web, electronic mail, mobile phones, and multiple communication device options. The combination of these advancements made individuals personal contact information very accessible. This gave telemarketers many different ways to contact possible customers. Many organizations used this opportunity to bombard, anyone unlucky enough to unknowingly provide their data, with multiple sale attempts. The Do Not Call Implementation Act of 2003 was in response to the unethical...
Words: 450 - Pages: 2