Free Essay

Information Acts

In: Social Issues

Submitted By coreyturner85
Words 415
Pages 2
Information Technology Acts Paper
Corey Turner
Bis/220
3/22/2012
Instructor Stephanie Benoit-Kurtz

The Children’s Internet Protection Act (CIPA) is a federal law enacted by congress to address concerns about of offensive content over the Internet on school and library computers. CIPA imposes requirements on schools and libraries the receive funding for Internet access or internal connections from the E-rate program, a program that makes some types of communications technology affordable for schools and libraries whom are eligible. The CIPA offers the E-rate discounts to schools that certify that they have an Internet safety policy that includes technology protection measures. The protection measures required must block or filter the Internet access to pictures that are obscene, child pornography, or pictures considered harmful to minors. The schools are also required to implement a policy to monitor online activities of minors. Access by minors to inappropriate matter on the internet and the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communications must be adopted and implemented by the schools and libraries subject to CIPA. The Cable Communications Policy Act of 1984 (CCPA) is a public law that protects the personal information of customers of cable service providers. It incorporates provisions of the OECD Privacy Guidelines of 1980, and as such provides a comprehensive privacy statute. The CCPA ensures that the cable companies must provide a written notice of privacy practices to each customer at the time of subscribing for their services and at least once a year thereafter. The privacy notice must specify; the nature of the personal info collected and the purpose for which it is collected, the nature, frequency and purpose of any disclosures that may be made of said information, including the identity of the persons to whom those disclosures may be made, how long the info may be kept by the cable service provider. Where and how long the subscriber may have access to the info about themselves, and the subscribers right to bring legal action if the regulations are not followed. In short the cable companies must receive written or electronic consent from the subscriber before collecting any personal info. After the cable company has no purpose for the personal information collected the information must be destroyed. The law protects the consumers from the cable companies hitting them with hidden fees and selling their information to third party entities.

References
http://www.fcc.gov/guides/childrens-internet-protection-act

Similar Documents

Premium Essay

Information Technology Act

...To Protect our children from inadvertently viewing these material congress passed the Children’s Internet Protection Act (CIPA) in 2000. Children’s Internet Protection Act requires schools and libraries that receive federal funds for their internet connection to employ technology protection to block or filter pictures and material that are deemed...

Words: 665 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts Mayra Gonzalez BIS/220 October 28, 2013 Jadie Giorgis Information Technology Acts While information technology continual to move ahead over the years, ethical concerns turn into an issue. Accordingly, the government executed specific acts to govern these concerns. Even as some of these acts exists, this text centered on two sections specifically: US Patriot Act of 2001, and Fair Credit Reporting Act of 1970. Whereas the Patriot Act was executed to lessen terrorist activities by the use of the internet, the Fair Credit Act was executed to give every American with be on a par with credit opportunities. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also well-known as the Patriot Act of 2001 was enacted in 2001. The Patriot Act was established to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and other purposes” (US). Table 1.1 below provides a synopsis of the sections of the Patriot Act involving financial institutions and their operations. Table 1.1 Sections of the Patriot Act of 2001 Section Purpose | 311 “Special Measures for Jurisdictions, Financial Institutions, or International Transactions of Primary Money Laundering Concern | 312 Special Due Diligence for Correspondent Accounts and Private Banking Accounts | 313 Prohibition on U.S....

Words: 998 - Pages: 4

Premium Essay

Technology Information Act

...Information Technology Act BIS/220 April 23, 2012 Information Technology Act In the world we live in today, there’s some type of electronic device being used to connect to the Internet. “The world-wide platform enable individuals to connect, compute, communicate, compete, and collaborate everywhere, and anywhere, anytime and all the time, and to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance, or even language barriers” (Kelly Rainer Jr. & Cegielski, 2011).We use these devices in our homes, in our businesses, in our schools, on our cell phones, and in the public libraries. Now that our children in most cases have unlimited access to the Internet, there is a great possibility that children are exposed to inappropriate material and on predators. In this paper there will be discussion on what were the advances in information technology that resulted in new ethical issues necessitating the creation of Children Internet Protection Act, 2000 and Children’s Online Privacy Protection Act, 1998. Children Internet Protection Act, 2000 In December 2000, President Clinton signed into law The Children’s Internet Protection Act. Through the use of technology protection on measures, schools and public libraries are required to protect minors from the dangers of the Internet (Menuey, B. P. 2009)....

Words: 710 - Pages: 3

Free Essay

Information Technology Act

...Information Technology Acts Sherwoska Smith BIS/220 July 3, 2013 Information Technology Acts Although some people still take pleasure in writing checks, checks are a thing of former times. Some people also still carry out most of their banking necessities inside a local branch however majority of their needs can be handle online from the convince of their home. The advancements in information technology have been the basis for the creation of the Electronic Funds Transfer Act, 1978 and the No Electronic Theft (NET) Act, 1997. According to "Consumer Affairs Laws And Regulations" (2010), " The Electronic Fund Transfer Act (EFTA) (15 USC 1693 et seq.) of 1978 is intended to protect individual consumers engaging in electronic fund transfers (EFTs). EFT services include transfers through automated teller machines, point-of-sale terminals, automated clearinghouse systems, telephone bill-payment plans in which periodic or recurring transfers are contemplated, and remote banking programs.” (Electronic Funds Transfer Act). According to "University Information Technology Services" (2005-2013), Congress enacted the No Electronic Theft (NET) Act in 1997 to facilitate prosecution of copyright violation on the Internet....

Words: 346 - Pages: 2

Premium Essay

Information and Technology Acts

...Two acts have been implemented to help control these issues; although they were implemented 15 years apart they go hand in hand in protecting our country. The Computer Fraud and Abuse Act (CFAA) was created in 1986 and states that anyone who obtains information without authorization is punishable under the Act. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) was established in 2001 after the terrorist attack on September 11, 2001. This Act allowed law enforcement to use tools that were already available to detect and prevent terrorism. What were the advances in technology that necessitated the creation of these acts? There are seven crimes listed under the CFAA: obtaining national security information, trespassing in a government computer, damaging a computer or information, compromising confidentiality, trafficking in passwords, threatening to damage a computer, and accessing to defraud and obtain value. Essentially, this act protects against hacking. The evolution of information technology (IT) though, has increased the vulnerability of our society. Robert Morris was the first person to be indicted under the CFAA in 1990. Morris was a graduate student at Cornell when he released a worm, a self-replicating program able to propagate itself across a network, into the internet on November 2, 1988. “The worm infiltrated systems through holes in send mail and finger daemon, among other things....

Words: 519 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts BIS/220 February 25, 2013 Abstract The basis of this paper is to explain the advances in information technology that ultimately resulted with the creation of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These two acts are beneficial to the privacy of oneself regarding medical files and the protection that the Federal Trade Commission provides to children while they are using the Internet. The paper will go farther into detail about why these acts were created and how they are beneficial to society today and for our future. Information Technology Acts The many advances of information technology have resulted in ethical issues requiring the creation of many important acts. Information technology is a very important branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information. Two acts specifically are the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These acts were carried out for many reasons, including; but not limited to privacy of personal health care information and protecting our children’s identities on the Internet....

Words: 734 - Pages: 3

Free Essay

Information Acts Paper

...Information Technology Acts Paper Natasha Bright-Wight BIS/220 April 21, 2014 Marty Mueller Information Technology Acts Paper I chose to research the Children’s Internet Protection Act of 2000 and the Children’s Online Privacy Protection Act of 1998. Both are similar in comparison but still both serve different issues to help with the advances in information technology and ethical issues that arise. With all these changes that are happening there have been necessary Acts that needed to be passed to protect the public. For both of these, companies have used marketing strategies to find out more and more information of people. Also, there has been identity theft that has occurred more because of personal information that has been put on the internet and shared and passed around. Children are having more and more access to the internet, and internet games. Both Acts deal with the same advances in information technology that resulted in ethical issues, making it very necessary to sign these Acts into Law. We have many computer networks, such as the Internet, smart phones and regular cell phones, and search engines, such as Google being used by everyone now, including children. Parents don’t watch their children’s internet activities and phone activities as closely as they should. Organizations have increasing amounts of data that can be stored and much cheaper now....

Words: 899 - Pages: 4

Premium Essay

Information Technologies Act

...Personal information of minors must be protected, there must be restricted access to potentially harmful material and all the above guidelines must be in place before they can begin receiving any kind of discount. The No Electronic Theft Act or NET...

Words: 673 - Pages: 3

Free Essay

Information Techonogy Acts

...Information Technology Acts As Information Technology advances on a daily basis major ethical issues arise along with it. Information technology improves ways of communication in both business settings, and personal life settings. Information technology advances are resulting to major ethical issues which include: easy access to sensitive information, and privacy (Vandenbosch, 2004). The Telephone Consumer Protection Act of 1991 and the Do Not Call Implementation Act of 2003 are acts that were created as direct results of information technology advancements. I believe the advancement of communicational devices has created new ethical issues for the society which necessitated the creation of both the Telephone Consumer Protection Act of 1991, and the Do Not Call Implementation Act of 2003. Both acts prohibit blocked unsolicited advertising via communicational devices. Getting a phone call at odd hours from a telemarketer can be very annoying; this is one of the ethical issues that came up. It is unethical to call someone to try and sell something they are not interested in, and to make matters worse you get the phone call around 6.00 AM in the morning or at 10.00 PM. Despite wanting to advertise or sell to consumers; this is not ethical. Consumers are protected from receiving unwanted phone calls from telemarketers....

Words: 407 - Pages: 2

Free Essay

Information Technology Acts

...In this paper we will examine two laws specifically what they entail, the ethical dilemmas involved in the creation of these acts, and the necessitating of the information technologies provision. These laws are the Child Internet Protection Act, 2000 and the Computer Fraud Abuse Act, 1986. The Child Internet Protection Act (CIPA), 2000 was implemented by Congress December 20, 2000, and was found constitutional by the Supreme Court June 23, 2003 (Wikipedia, 2014). CIPA law aims to...

Words: 1432 - Pages: 6

Free Essay

Information Technology Acts

...Information Technology Acts It is inevitable that humanity would find ways to evolve communication with the creation of new technological. This certainty for improvement comes from many human aspects; economical, social, political, environmental, and scientifically. Information technology is a great innovation in our modern time and evolving for the future. Nevertheless, new information technological advancement calls for the creation of new acts. The Do Not Call Implementation Act of 2003 was created to enforced telemarketers to comply with the rules “Do-Not-Call”. This action was taken due to the high volume disturbance calls generated by telemarketers during evening hours when families are home from work and school. According to Banger, Evansburg, Watson, Welch (2003) the volume of disturbances calls was so high that the vast majority of the United State of America population took action. The public addressed the Federal Communication Commission, the Telecommunication Protection Act, and Federal Trade Commission stating their right to peace had been unethically violated by the telemarketers. (Banger et al. 2003) On February 12, 2003, the House of Representative overwhelmingly approved by a vote of 418-7 the "Do-Not-Call" Implementation Act (H.R. 395), authorizing the Federal Trade Commission's (FTC's) proposed national do-not-call registry. [Sec 15 Intell. Prop. & Tech. L. J., No. 3 (Mar. 2003).]...

Words: 662 - Pages: 3

Free Essay

Information Technology Acts

...Information Technologies Acts Information Technologies Acts The two acts that have been chosen for this paper are the Do Not Call Act of 2003 and the Children’s Internet Protection Act of 2000. I chose these because these are two of the biggest issues plaguing society today. It is always an ongoing battle to find and implement ways to protect children from the ever expanding corruptness that this world is throwing at us daily. It is also a never ending battle to keep us safe from harassment. The Children’s Internet Protection Act was passed to help keep children’s use of the internet in libraries and school safe and free of information and images children should not be exposed to. As Information Technology continues to grow and comes up with new ways to get the information out and people are intelligent enough to link undesirable information such as pornographic materials, sexually explicit materials, Etc. We as a society needed to find ways to keep our children from getting corrupted by such vulgarity. Thus the Children’s Internet Protection Act was born. It helps to ensure that our children are not exposed to information and materials not appropriate for them. It requires libraries and schools to implement filters to block inappropriate material from being viewed by children. The Do Not Call Act of 2003 was implemented to provide a regulation from harassment by telemarketers if their phone number is on a do not call list....

Words: 556 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts University of Phoenix Gustavo Perez Bis 220 April 14 2014 Jorge L. Berrios Trinidad Information Technology Acts Stop Online Piracy Act (SOPA) After the creation of Napster, the music p2p sharing system that is computer to computer. We started to see a rise or increase in what is now known by online piracy. Then people shared their music without knowing the legal consequences which incurred. Thanks to the creation of the MP3 music format, made ​​it extremely easy to share on the internet entire music collection. Because of this group Metallica rock music and the record companies filed lawsuits against the Napster service. Then emerged others based on napster to share not only music systems, but also computer programs, movies, etc. In 2011 the House of Representatives of the Congress of the United States, proposed the Stop Piracy Act or SOPA, which pretended to attack online piracy by extending existing laws against trafficking of copyrighted content and counterfeit goods through the internet. The penalty for a person to forward copyright material ten (10) or more times in a period of six (6) months would expose a sentence of up to 5 years in jail. One of the ethical issues, was referring to the freedom of people in the internet....

Words: 641 - Pages: 3

Free Essay

Information Technology Acts

...Information Technology Acts Eric Mahoney BIS/220 July 14, 2014 Julie Ruse Information Technology Acts As technology has advanced, the need to set rules and regulations have increased to protect consumers from abuse from corporations as they use this new technology. With the speed of new leaps in the technological advances Congress has created laws such as Do Not Call Implementation Act (2003), Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act) 2001, Children's Internet Protection Act (2000), No Electronic Theft (NET) Act (1997), Telephone Consumer Protection Act (TCPA) 1991, Video Privacy Protection Act, 1988 and the Computer Fraud and Abuse Act (1986). These are just a few that have come into existence from the information boom. This paper will focus on the Telephone Consumer Protection Act and the Do Not Call Implementation Act. Congress passed the Telephone Consumer Protection Act (TCPA) in 1991 as an answer to the consumer concerns about the rising number of unsolicited telephone marketing calls to their homes. ("Unwanted Telephone Marketing Calls", n.d.) The use of automated and prerecorded messages also helped push the call for federal regulation to be put into place....

Words: 438 - Pages: 2

Premium Essay

Information Technology Acts

...What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006 The “Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism” Act, more commonly referred to as the “Patriot Act”, was signed into law on October 26th, 2001 following the events of September 11th of that same year. At that time, existing laws regarding electronic information needed to be updated to provide federal law enforcement with greater access to investigate electronic platforms such as email, voicemail, other electronic information and personal property without the owner’s knowledge or consent. The act was implemented to capture the terrorists responsible for the attacks during 2001 but as it pertains to information technology; it removed many barriers for law enforcement agencies to gather intelligence from domestic sources to fight terrorism. Money laundering for example is hidden in a process of several electronic transactions which ultimately funds terrorist activities....

Words: 320 - Pages: 2