Free Essay

Bis220 Information Technology Act

In: Business and Management

Submitted By missjh
Words 749
Pages 3
Information Technology Acts Essay
Any Name
BIS/220 #1
March 2, 2011
Your Instructor

Information technology is forever advancing, especially when it involves telecommunications and protecting consumers from unwanted telemarketing calls. In the late 1980s I acquired my first customer service representative position with a major telecommunications company. My job was to contact “cold call” customers to offer products and services on behalf of their Account Representative. There was not a customer database for telemarketing at that time; the information technology tool used consisted of a list of business names and telephone numbers. This information was retrieved and available for anyone who chose to purchase from list service to use with the intent of telemarketing. Although this appeared to be an unethical business practice, it was legal because if the consumers name and numbers were sold to list services. Something had to be done to prevent unsolicited phone calls and to protect consumers from these unethical business practices.
The Telephone Consumer Protection Act (TCPA), 1991 was implemented to regulate unwanted advertising calls and fax telemarketer calls. This was necessary because consumers would receive prerecorded and unidentified calls from companies in which they have had no prior business dealings with all times of the day and evening on both their landline and fax line. According to Senator Fritz Hollings (2009), the bill’s original sponsor, said, “This bill is purely targeted at those calls that are the source of the tremendous amount of consumer complaints at the FCC and at the State commissions around the country—the telemarketing calls placed to the home.” Id. (Emphasis added.) In passing the TCPA, Congress relied on surveys wherein consumers responded that the two most annoying things were (1) “phone calls from people selling things” and (2) “phone calls from computers trying to sell something”. (Telephone Consumer Protection Act of 1991, H.R. Rep. 102-317, November 15, 1991, at p. 11.)
Companies used auto dialers to reach consumers to solicit business. The Federal Communications Communication (FCC) made it so that company’s representatives had to identify themselves, the person or company he or she were calling on behalf of and his or her address. Telemarketers also had restrictions on the time that they could call, which stopped the prime time calls. There are other provisions were implemented under the TCPA 1991; however the calls did not completely cease and additional measures had to be taken to again curve the unethical telemarketing practices. The FCC provides a website with a guide that provides a complete background and many interesting facts regarding the TCPA 1991.
To provide additional protection for the consumer from unethical and fraudulent telemarketing practices, the Do Not Call Act (DNCA) was implemented in June 2003. The purpose was to allow residential consumers to add their numbers to the do not call registry where it would stop most of those unwanted telemarketing calls for a period of five years. The act does not prohibit calls from the following: nonprofit organizations, surveys, and bill collectors. Additionally, consumers can continue to receive calls up to 18 months after conducting business with a company unless they request not to receive calls. Telephone Company’s provided toll free numbers so that consumers could register their numbers on the registry and telemarketers initially had 90 days to cease calling that number; that has since changed. In June 2005, telemarketers have 31 days to comply. In recent years, improvements have been made to the DNCA that requires new telephone numbers to renew their phone numbers once to maintain their number on the list.
In conclusion, while the above mentioned acts are two cohesive tools to prevent unethical telemarketing calls, consumers are able to identify the originating source prior to answering the call. With the implementation of caller-id, consumers can see who is calling and determine if they want to answer the incoming call. I personally have experienced this and have called the company back in efforts to inform them that I have had no business dealings with them, henceforward to remove my number form their list. While the intent of both acts is to protect consumers, businesses should be closely monitored on how they conduct telemarketing and advertising.

References
Ellis, M. E. (2009), ABC’S of the TPCA, Part I. Retrieved from http://www.ellislawgrp.com/article09part1.html
FCC Unwanted Telephone Marketing. Calls Retrieved from http://www.fcc.gov/guides/unwanted-telephone-marketing-calls
National Do Not Call Registry. Retrieved from http://en.wikipedia.org/wiki/National Do Not Call Registry

Similar Documents

Free Essay

Paper

...Jordis Jones BIS220 April 4, 2013 University of Phoenix COPPA AND CIPA In today’s society, kids surf the internet in different ways for different resources of information. Internet can be beneficial to kids who devote this use for information pertaining school related, job opportunities, friendly entertainment, and etc. On the other hand, the internet is designed to be as risky as gambling in certain situations. Matters such as cyberbullying, pornography, identity theft, sexual predators made parents perceptive about protecting their children safety online. This matter also became a concern for Congress, who enacted laws that shield kids from online harmful content. The laws that I thought was an eye opener for this subject are Children Internet Protection Act 2000 (CIPA) and Children’s Online Privacy Protection Act 1998 (COPPA). On April of 2001, The Children Internet Protection takes the form of requirements for internet safety policies and technology which blocks or filters certain material from being accessed through the Internet (2010). CIPA offers a program that gives schools and libraries the privilege to receive a great deal on internet access if they agree using this act. This act not only provides protection and monitors kids whenever they are away from home but it utilizes the internet reliable information that will benefit kid’s future without harmful content. Also, The Children’s Online Privacy Protection Act, ensure parents that personal information will not...

Words: 259 - Pages: 2

Premium Essay

Information Technology Paper

...Christena Isaac BIS220 4/23/2012 Lauri Figueroa Information Technology Acts Technology has made numerous advances since computers have first come out. With technology advances come better systems and more threats. With today’s new technology society has to be careful of the threats that can happen because a person a computer. Advances in information technology have made it a necessity for Congress to create acts that protect people’s privacy and rights. Technology has made it possible for people to steal other’s identity easily, terrorist attacks, and even threats to our children. With the internet, a person can portray themselves as whoever they want and can pose a threat to children even while they are in school. While children are in school, it has become almost a guarantee that they will use computers for various reasons. One act that Congress implemented was the Children’s Internet Protection Act. The Children’s Internet Protection Act was implemented in 2000 by Congress to regulate children’s use on computers at school. Congress needed to set rules and guidelines that schools must follow in order to gain funding for computers. Some rules were, “The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors)” (Childrens internet protection, 2012). This was necessary because people are able to put anything and everything online for others to...

Words: 592 - Pages: 3

Free Essay

Info Tech Acts

...Information Technology Acts Paper BIS220 July 15 Information Technology Acts Paper The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA applies to any web site that is directed to children under 13 that collects personal information from them or to any web site that collects personal information where they know that the information that they are collecting comes from children. Its basic provisions require that a "clear and prominent" link to the privacy policy must exist on the home page and that the privacy policy itself must be "clearly written and understandable." Furthermore, the legislation explicitly states what must be included in the content of the privacy policy -- this includes things such as the contact information for the operators of the page, the kinds of information that will be collected from children, how the information that is collected will be used, and information about what rights parents have to their child's information (Stanford). The Computer Fraud and Abuse Act (CFAA) is the federal government’s principal legal weapon in the battle to protect computer systems and electronically stored information from thieves and vandals. A criminal statute that can be enforced by the U.S. Department of Justice, the CFAA also authorizes private parties to bring a civil damages action against anyone who violates its terms. Two...

Words: 694 - Pages: 3

Premium Essay

Information Technology at a Glance

...Information Technology at a Glance Chasidy K. Cummings BIS220 August 29, 2012 Charles Waller Information Technology at a Glance The electronic fund transfer act was voted in by congress in 1978. The act was signed by the then president Jimmy Carter. The purpose of the act was to establish the rights accorded to consumers and the liabilities they face in conducting electronic transactions ("Electronic fund transfer," 2011). The act also set out to outline the responsibilities of all those who participated in activities involving the transfer of electronic funds. The main function of the electronic fund transfer act is the clarification of the rights and liabilities of consumers. The act was necessitated because the consumer protection legislation of the time was not clear enough. In light of recent technological advancements legislation needed to be modified to include new mediums of transaction, namely electronic fund transfers. Although the act gives consideration to those who participate in the transfer of electronic funds its primary focus remains the protection of individual consumers (Emerson, 2009). The act eliminates the need for most transactions that originate through paper instruments. Examples of such instruments include a check or a draft. The focal point of focus is electronic transactions. Electronic transactions in the act include an electronic terminal, a telephonic device, a computer, or even magnetic tape. Automated teller machines are covered by...

Words: 673 - Pages: 3

Free Essay

Information Technology Act Paper

...Information Technology Act Paper Dannie Roettger BIS220 February 14, 2013 Paul Kirchner Information Technology Act Paper In the ever changing fast paced world of information technology where information is bought, sold and traded for financial gain. Our governments have had to invent laws to ensure that our personal information is safe and not being used improperly. Two of the laws or acts we will explore in this paper are the Telephone Consumer Protection Act and the Fair Credit Reporting Act of 1970. We will look why these laws were enacted and the benefits that have come from these acts. The first act we are going to look at is the telephone consumer protection act. The Telephone Consumer Protection Act or the TCPA was passed on December 20, 1991 and went in to affect just one year later ("Telephone Consumer Protection Act (tcpa)", 2012). This act was put in place to stop the harassing telemarketers and regulate the selling of personal information. The TCPA was passed to regulate telemarketers and to add some ethical guidelines to their operating practices. Some of the benefits that came from the TCPA was telemarketers could only call residents between the hours of 8 AM and 9 PM. Another regulation that came from the telephone consumer protection act was the No Call List ("Telephone Consumer Protection Act (tcpa)", 2012). If a person requested to be on the no call list the telemarketer must place that consumer on the no call list and not call the consumer again....

Words: 638 - Pages: 3

Premium Essay

Changes in Technology

...Changes in Technology Daniel Todd BIS220 February 19, 2014 Bertram Ian Lee Changes in Technology In this time of vast improvements in information technology issues have presented themselves that many times need to be taken care of on a legislative level. This legislation is often done to protect consumers or those that could be unknowingly harmed by the abuse of new technologies. The Children’s Internet Protection Act of 1999 and the No Electronic Theft Act of 1997 are two forms of legislation that have been enacted in the last 20 years that are aimed to protect individuals from potential abuse on the internet. The Children’s Internet Protection Act of 1999 (CIPA) was developed in response to concerns about children accessing harmful or obscene internet content such as pornography and other obscene content. (Federal Communications Commission, n.d.) In the mid and late 1990’s the adoption of the internet was moving along an alarming pace. Many children, however, still relied on their school for access to the internet as. As allowed by the Schools and Libraries Program, certain education and library establishments are permitted to get internet access and very discounted rates in order to make it affordable for these establishments. This program, usually known as “E-Rate”, helps many low budget rural and urban community schools afford internet access for their students. (U.S. Department of Education, 2013) What CIPA did was require these schools and libraries to...

Words: 667 - Pages: 3

Free Essay

Term Paper

...Information Technology Acts Paper Children’s Internet Protection Act (CIPA) Children’s Online Privacy Protection Act (COPPA) Reche Quiapos INTRODUCTION TO COMPUTER APPLICATION AND SYSTEMS/BIS220 October 28, 2012 Nabih Zourob Information Technology Acts Paper Being a Parent that comes from a family-oriented environment, the topic of this paper opens up doors for me on how my children are protected when using the internet. At this modern era, at my children’s age, they were exposed to the Internet growing up. The best way for me to see how they are protected from the World Wide Web is knowing that I can keep them safe from all the acts that our law has passed. Since, I cannot be with them every minute of the day while they are on the computer, I have signed up into this website called “Google Safe Eyes” where it keeps you posted when your children are trying to view inappropriate websites. It alerts to your phone and email, the time and website that they’re trying to access online. A growing Internet sectors plays a big part on children. The Interactive nature of the Internet enables marketers to gather personal information from children through registration information on chatrooms, and other discussion boards available for children. These businesses of marketers will then sold to a third party after they gather all personal information for commercial purposes. This action opened-up doors for abusers and pedophiles that are dangerous for children...

Words: 1069 - Pages: 5