Premium Essay

Acts Paper

In:

Submitted By yadilopez5
Words 870
Pages 4
Advances in Information Technology
Yadira Lopez
BIS 220
August 9, 2012
Krisda Cripe

Advances in Information Technology Throughout the years technology has advanced in ways that no human being can ever imagine. We have the power to communicate with individuals worldwide in a matter of seconds. We have the ability to see people we have not seen in a long time without leaving the comfort of our home and having to travel thousands of miles. It is nice knowing that some way somehow, we can always stay connected to our loved ones. Many say that the way technology has advanced is to the best benefit for everyone, while others say it is causing more problems in today’s society. Individuals say it is one of the main reasons why children and young adults are being robbed, prostituted, and turned to drugs. Is it possible that technology can play such major roles in dramatic situations like the ones described? If so what is being done to stop such things from happening.
The Children’s Online Privacy Protection Act (“COPPA”) specifically protects the privacy of children under the age of 13 by requesting parental approval for the collection or use of any personal information of the users, which took effect in April 2000 (Multnomah County Library, 23). The reason for passing COPPA was because parents started to notice that marketing techniques were being targeted towards their children and the way they went about collecting the information was through websites that were often used by children. Parents were not given any parental notifications. The Act is directed to major websites and online services that direct their products to children under the age of thirteen. Congress’ reason for passing the Act was to incorporate more parent involvement in their children’s online activities, make certain children’s safety during the time they are participating in online

Similar Documents

Free Essay

It Act Paper

...impending nuclear war between the United States and the Soviet Union. This may sound kind of familiar. It is the plot for the movie War Games starring Matthew Broderick (Lasker & Badham, 1983). While that may be the plot for a movie, the real life existence of malicious hackers was and is a very real threat to the security of the United States. According to "Computer Hope" (2014),” a malicious hacker is usually referred to as a black hat or criminal hacker, which describes any individual who illegally breaks into computer systems to damage or steal information”. Over the last three decades, this threat prompted the creation of many preventive measures by the US Congress. One of which was the Federal Information Security Act of 2002. This act requires that every federal agency must develop, document and implement an agency wide program to insure that information and information systems are not without information security. This blanket of security also extends to United States assets, contractors and other sources ("Nist Detailed Overview", 2014). Over the years, theft and the manipulation of digital data has not been an exclusive problem to the federal government. The entertainment and gaming industry has had their fair share of problems as well. In 1994, David LaMacchia was indicted by a federal grand jury for his role in sharing copyrighted software applications and games over various websites he created, Cynosure and Cynosure II...

Words: 542 - Pages: 3

Premium Essay

Technology Acts Paper

...| Technology Acts Paper | BIS/220 | University of Phoenix | | The Do Not Call Implementation Act provides consumers with the opportunity to decline solicitation calls. This act also advised tax payers of the fees that would be associated with the creation and upkeep of an ongoing list of phone numbers that are not to be called. For this registry, a list of phone numbers that is up to date and current must be kept in a central and general location so that telephone solicitation will not reach the people who are on this list. The Do Not Call Website has a location where you can have your phone number listed on the website they also feature a location to report solicitors who are not following the clear guidelines stipulated by the Do Not Call Implementation Act. During my research I came across a list of exceptions to the Act’s guidelines. For example, consumers who are registered may still be contacted by politicians, and not-for-profit organizations. This same website says that consumers may be contacted by any company that they have conducted business within 31 days unless they specifically asked not to be contacted. For this Implementation act technology and contacts would need to be created to verify that phone numbers on the list were registered to the correct person and were still in service. This technology may have been no more than a simple Microsoft Excel Database that needs to be checked against carrier records. This technology also could be a super...

Words: 543 - Pages: 3

Free Essay

It Acts Paper

...Information Technology Acts Paper BIS/220 October 31, 2012 Aaron R. Cuevas Information Technology Acts Paper The Children’s Internet Protection Act of 2000 was to address issues raised about a minor’s access to harmful or explicit content over the Internet. This mandated that schools and libraries impose restrictions over specific subject matter. Schools that have subjected to these guidelines also must include consistent monitoring of all online activities conducted by minors. However, administering guidelines and restrictions was not enough. In 2011 the FCC issued further guidance by implanting further updates. There must also be an explanation, or rather education, provided to the minors about why such rules are in place, what appropriate online behavior is, and cyber-threat awareness and response. “Students will always have some sort of adversarial relationship with anyone that puts up a fence between what they want and what they should have access to, but with input on why sites are blocked and giving them a say in the process will help” (Anderson 2010). The advances made in the Internet being distributed throughout schools as a tool for education greatly expanded teachers, or instructors, resources. The Internet became an infinite domain of tools that could be used in the classroom setting. And it is more cost efficient than supplying the information through physical hardcopies. However, the word ‘infinite’ is what needed to be regarded as a blessing and a curse...

Words: 812 - Pages: 4

Free Essay

Information Acts Paper

...Information Technology Acts Paper Natasha Bright-Wight BIS/220 April 21, 2014 Marty Mueller Information Technology Acts Paper I chose to research the Children’s Internet Protection Act of 2000 and the Children’s Online Privacy Protection Act of 1998. Both are similar in comparison but still both serve different issues to help with the advances in information technology and ethical issues that arise. With all these changes that are happening there have been necessary Acts that needed to be passed to protect the public. For both of these, companies have used marketing strategies to find out more and more information of people. Also, there has been identity theft that has occurred more because of personal information that has been put on the internet and shared and passed around. Children are having more and more access to the internet, and internet games. Both Acts deal with the same advances in information technology that resulted in ethical issues, making it very necessary to sign these Acts into Law. We have many computer networks, such as the Internet, smart phones and regular cell phones, and search engines, such as Google being used by everyone now, including children. Parents don’t watch their children’s internet activities and phone activities as closely as they should. Organizations have increasing amounts of data that can be stored and much cheaper now. There are more and more employees and people who have access to people’s personal information in the work place...

Words: 899 - Pages: 4

Free Essay

Information Technology Acts Paper

...Information Technology Acts Paper George Tomadakis BIS/220 January 16, 2012 Marry Robbins Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This was a very sound control. Then the Internet came in the 1990’s, children had unsupervised access. The porn industry went crazy; they would do anything to get anyone to their sites. Children were being exposed to it and it was deemed harmful. Congress tried to pass laws to stop it, but every direction they went was determined to be unconstitutional. Finally technology prevailed, to an extent. Maybe Congress could not pass a law that would penalize the distributor; they could pass a law that would affect the end user that received federal money. On December 15, 2000 Congress added the Children’s Internet Protection Act and President Bill Clinton signed it into law on December 21, 2000. The Act places restrictions on entities receiving Federal funding. They must use policies and technology that blocks or filters certain material from being accessed using the internet. ("American Library Association", 1997-2012). The Internet with all of its wonders was not only being used to show are children imagery and information, the technology was...

Words: 471 - Pages: 2

Free Essay

Technology Acts Paper

...Information Technology Acts Paper Jamie Smith BIS / 220 April 14, 2014 John Maloney Information Technology Acts Paper Since the dawn of computer based technology, ever evolving laws, legislation, and acts are created for the protection of the public as more and more security risks are identified. As technology grows, so do the potential abuses of the availability of data, personal information, has required law makers to address the issues and enact penalties that are associated with those abuses. Among many of the legislative acts passed due to the advancement of technology, the two acts that will be described help protect the consumer, the creditors, the government, and the public in general. The Telephone Consumer Protection Act, (TCPA), 1991 was created due to the advancement of telephone technology and the data available made cause for concern for the interests of the public. Another concern for abuse necessitating the need for legislation was the Fair Credit Reporting Act (FCRA), 1970. The FCRA was put in place to protect the accuracy and fairness of creditor reporting to the major credit bureaus. Information technology advances and the uses and abuses of them, necessitated the TCPA, 1991 and FCRA, 1978 acts as well as the amendments since inception due to further technological advances. The Telephone Consumer Protection Act of 1991 was enacted to require the Federal Communications Commission...

Words: 724 - Pages: 3

Premium Essay

Tech Acts Paper

...Information Technology Acts Paper Amanda R. Thomas BIS 220 June 16,2014 Information Technology Acts Paper There are so many advances in technology now a days and it is only going to keep growing. The result of having so many advances is that things get overlooked and it causes ethical issues such as privacy, property and ease of access to personal and private information. The Fair Credit Reporting act of 1970 as well as The Telephone Consumer Protection Act of 1991 are good examples of why we need to constantly build onto the acts and not just leave them where they are or were. The Fair Credit Reporting Act of 1970 controls the amount of personal information someone can get from you. It was targeted toward banks and consumer reporting agencies, and businesses that gave them the information. Now that companies and industries have grown and technology has become so much easier to use and information is so much easier to get a hold of. Now a day's people can Google so much of your information that it makes it easier to find out personal information you may not want someone knowing. Identity theft is one of the biggest ones that come to mind. The second you send a text messages and it crosses paths with something else, log onto Face book and fill in the personal information section you are putting your information in a public place that poachers can take it and use your information. There has been a lot of this over the last few years and it is becoming more and more difficult...

Words: 751 - Pages: 4

Free Essay

Technology Acts Paper

...Technology Acts Paper Sandy Delarosa BIS/220 July 8, 2013 Professor Tim Technology Acts Paper I am a father of two beautiful boys, who I am devoted to keeping safe from anything that could possibly harm them. Internet usage is part of everyday life for them. therefore, for my paper on technology acts I chose; The Children's Internet Protection Act 2000 (CIPA) and The Children's Online Privacy Protection Act of 1998 (COPPA). On December 21, 2000 the children internet protection act was signed into law, three years later on June 23, 2003 the United States Supreme Court found this act to be constitutional. The act requires libraries and schools grades from kindergarten to 12th to put measures in place that will protect children from any harmful internet content they may come across while online. The children’s online privacy protection act details the rules and regulations that a website operator must follow, things that have to be included in their privacy policy and instructions on when and how to confirm age and consent from adult or guardian of the child. The advances in technology which have resulted in new ethical issues that prompted the creation of these acts are the growing number of ways predators can pray upon our children online. The internet has open many proverbial doors which allow people of all ages to anything without leaving the comfort of home. One can use the internet do a research paper, order pizza, buy clothing or to communicate with other...

Words: 421 - Pages: 2

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Bis/220 3/9/2013 Paul Porch Information Technology Acts Paper The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) was created in response to the terrorist attacks of September 11, 2001. This act once passed became a law almost immediately, less than two months after the attacks. This Act has been modified thru the years implementing better rules to help protect our country. In 2006 the Act was modified once again, this time including a some modifications with technology. “The Act brought the law up to date with current technology, so we no longer have to fight a digital-age battle with antique weapons-legal authorities leftover from the era of rotary telephones. When investigating the murder of Wall Street Journal reporter Daniel Pearl, for example, law enforcement used one of the Act's new authorities to use high-tech means to identify and locate some of the killers.”  ("Justice Information Sharing Department Of Justice").  This Act also extends to law enforcement and foreign intelligence purposes. The purpose of the Act was to enable the government to investigate any potential terrorist more efficiently and effectively. “It expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, to combat money laundering.”  (“The PATRIOT Act Revisited ,” 2004). As with anything the government...

Words: 590 - Pages: 3

Premium Essay

Random Act Of Kindness Paper

...Bringing happiness and hope to someone’s day are an honor; this can be accomplished by giving or helping others without thought of self-benefit (Olpin & Hesson, 2016). This Random Act of Kindness (RAK) can be achieved by performing a selfless act to either help or positively affect the emotional state of another person (Passmore & Oades, 2015). The Random Act of Kindness that I performed was at a Dunkin Donuts; I asked the gentleman behind me if he was having a cup of coffee today. He responded. “yes.” I placed my order; the told the cashier that I was going to purchase the gentleman’s coffee. Both the clerk and the gentleman looked at me with a strange glance. I assured the gentleman that this was not a television prank and he started to laugh....

Words: 273 - Pages: 2

Premium Essay

Boston Tea Act Research Paper

...Nobody would have imagined the British would pass four laws that could enrage the colonists so much. Because the colonists despise these acts, they named them the Intolerable Acts. These acts limit the freedom of colonists. The act was created as a result of the night of the Boston Tea Party. Colonists dumped hundreds of chests of tea into the Boston Harbor. The Tea Act is unlawful, and it should not have been passed as a law by the British. The Intolerable Acts The first act passed on June 1, 1774 was called “The Boston Port Act”. This law closed the Boston Harbor to all trade. Boston’s economy is devastated. Everyone in the city has been punished. Secondly, the “Massachusetts Government Act”, passed later this summer, prevented citizens...

Words: 361 - Pages: 2

Free Essay

Technology Acts Paper

...What were advances in information technology that resulted in ethical issues with the creation of HIPAA and CIPA What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? HIPPA, Health Insurance Portability and Accountability, was passed by Congress in 1996. According to Cornerstone On Demand, 2012 “HIPAA regulates the interchange of private patient data to help prevent unlawful disclosure or release of their medical information.” Consequently Congress recognized that advancement in technology could subsequently release health information that should remain confidential to the patients. In turn, Congress assimilated two additional laws to strengthen HIPAA; HITECH and ACA. With advancement in technology, HIPAA forced physicians to consider more cautiously how confidential information may be transmitted to others. Basically HIPAA enforced a patients privacy right as well established a sense of security for patient data. Children’s Internet Protection Act, CIPA was passed by Congress in 2003. According to Wikipedia, 3/12 “CIPA requires K-12 schools as well as libraries use internet filters and implement other measures to protect children from harmful or obscene content CIPA enforces certain requirements on schools and/or libraries that receive discounts for internet access or internal connections.” Unfortunately with the advancement in technology, children at a younger age understand the use of a computer...

Words: 386 - Pages: 2

Premium Essay

Patriot Act Research Paper

...It is argued that the government’s unlawful actions are justified by the Patriot Act, but they are not. Title II of the act is Enhanced Surveillance Procedures. It grants increased surveillance powers to select government agencies. Section 201 of Title II is titled Authority to intercept wire, oral, and electronic communications relating to terrorism. This is the section allows government to tap into personal information. However the phrase “relating to terrorism” declares only suspected terrorists can be monitored. Section 213 states that warrants must be issued in order to intercept non-terrorist forms of communication. When Snowden was asked about search warrants he said “the reality is that Americans' communications are collected and viewed...

Words: 273 - Pages: 2

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper MPS BIS/220 July 21, 2014 JM Information Technology Acts Paper With the advancement of technology, like practically everything which exists, comes the pros and the cons, the advantages and disadvantages, the benefits and the liabilities. The Internet or the World Wide Web is no different. It has exposed individuals to a literal wealth of information. It has opened borders, exposed cultures and vastly improved knowledge and productivity. In essence, the Internet has made the world a "smaller" place in that, a person can hold a face-to-face conversation with another person on the other side of the world without ever boarding a plane and information can be sent hundreds of thousands of miles in seconds. But this information highway is not only used to share useful and appropriate information but also harmful and offensive messages, leaving the most vulnerable users, children, at risk. In an effort to protect American children using the vast and almost uncensored internet, in 2000, two Acts took effect, the Children's Internet Protection Act, 1998 and Children's Online Privacy Protection Act, 2000. Due to the advancement in information technology and rising ethical issues, these Acts were necessary in order to hold internet vendors and website operators accountable for the proper handling of children where their personal information and the nature of the information they are exposed to are applicable. The first Act, The Children's Internet...

Words: 610 - Pages: 3

Premium Essay

Patriot Act Research Paper

...New York. A seriously stunned country shocked by the level of brutality quickly assembled behind President Bush to pass legislation, known as the USA PATRIOT ACT, to tackle internal and external threats to this nation. Because this new legislation was passed into law with extreme haste, it was controversial immediately. Even though this legislation was passed...

Words: 1763 - Pages: 8