Nowadays, technology is advancing at an exponential rate. Over the last two decades or so, everyone in the world has essentially become connected to one another via computer, the internet, and social media. But as the world becomes more connected, does it also become more vulnerable? Let’s be honest, not everyone in the world has everyone else’s best interest at heart. How many times have you had to turn off the ringer of your phone because of the nonstop assault of telemarketer calls? How many emails have you received saying you’ve won the lottery in London or that the Prince of Nigeria would like to conduct business with you? It is these types of issues that motivated the United States Congress to enact several laws to protect America and its citizens from technological attacks and ...view middle of the document...
This law was enacted due to the thousands of cyber-attacks of several Federal Agencies by both foreign and domestic hackers which stole untold amounts of information and caused approximately 1.9 billion dollars in damages due to the required shutdown of Government Agencies, such as NASA, for weeks at a time in order to fix the holes in the Agencies’ Information Systems. (Rainer Jr. & Cegielski, 2011).
The Do Not Call Act of 2003 (15 U.S.C. § 6101 et. Seq.) was signed into law March 11, 2003 by President George W. Bush on March 11, 2003. The law established the Federal Trade Commission’s Do Not Call Registry in order to facilitate Compliance with the Telephone Consumer Act of 1991 ("Federal Trade Commission", 2008). Basically, telemarketers have 31 days from the date a consumer adds their name to the Registry to cease calling that number. Cell phones are not covered by the Act because FCC regulations prohibit telemarketers from calling cellphones. The law was enacted to protect consumers from the nonstop barrage of telemarketing calls due to automatic calling devices.
Though one could argue the effectiveness of these (or any laws enacted to provide Information Security) they are a step in the right direction as they show that the Government realizes that as technology progress so must our attempts to provide informational security. As technology progresses forward, so must the laws in order to provide some semblance of security.
Rainer Jr., R.K., & Cegielski, C.G. (2011). Introduction to Information Systems (3rd ed.). :
John Wiley & Sons Inc..
FISMA Center. (2010). Retrieved from http://www.fismacenter.com/FISMA%20fact%20and%20fiction%2004.30.09.pdf
Federal Trade Commission. (2008). Retrieved from http://www.ftc.gov/opa/2008/04/dncfyi.shtm