Information Technology Act Paper

535 words - 3 pages

Nowadays, technology is advancing at an exponential rate. Over the last two decades or so, everyone in the world has essentially become connected to one another via computer, the internet, and social media. But as the world becomes more connected, does it also become more vulnerable? Let’s be honest, not everyone in the world has everyone else’s best interest at heart. How many times have you had to turn off the ringer of your phone because of the nonstop assault of telemarketer calls? How many emails have you received saying you’ve won the lottery in London or that the Prince of Nigeria would like to conduct business with you? It is these types of issues that motivated the United States Congress to enact several laws to protect America and its citizens from technological attacks and ...view middle of the document...

This law was enacted due to the thousands of cyber-attacks of several Federal Agencies by both foreign and domestic hackers which stole untold amounts of information and caused approximately 1.9 billion dollars in damages due to the required shutdown of Government Agencies, such as NASA, for weeks at a time in order to fix the holes in the Agencies’ Information Systems. (Rainer Jr. & Cegielski, 2011).
The Do Not Call Act of 2003 (15 U.S.C. § 6101 et. Seq.) was signed into law March 11, 2003 by President George W. Bush on March 11, 2003. The law established the Federal Trade Commission’s Do Not Call Registry in order to facilitate Compliance with the Telephone Consumer Act of 1991 ("Federal Trade Commission", 2008). Basically, telemarketers have 31 days from the date a consumer adds their name to the Registry to cease calling that number. Cell phones are not covered by the Act because FCC regulations prohibit telemarketers from calling cellphones. The law was enacted to protect consumers from the nonstop barrage of telemarketing calls due to automatic calling devices.
Though one could argue the effectiveness of these (or any laws enacted to provide Information Security) they are a step in the right direction as they show that the Government realizes that as technology progress so must our attempts to provide informational security. As technology progresses forward, so must the laws in order to provide some semblance of security.

References:
Rainer Jr., R.K., & Cegielski, C.G. (2011). Introduction to Information Systems (3rd ed.). :
John Wiley & Sons Inc..
FISMA Center. (2010). Retrieved from http://www.fismacenter.com/FISMA%20fact%20and%20fiction%2004.30.09.pdf
Federal Trade Commission. (2008). Retrieved from http://www.ftc.gov/opa/2008/04/dncfyi.shtm

Other Papers Like Information Technology Act Paper

Information Technology Acts Essay

734 words - 3 pages Information Technology Acts BIS/220 February 25, 2013 Abstract The basis of this paper is to explain the advances in information technology that ultimately resulted with the creation of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These two acts are beneficial to the privacy of oneself regarding medical files and the protection

Acts Paper

898 words - 4 pages , including individual’s children. Thankfully we have Acts that prohibit such actions from occurring. References Multnomah County Library. (23, December 2009).Children's internet protection act; questions and answers. Retrieved from http://www.multcolib.org/news/cipa.html Epic.org. (20, April 2010). Children's online privacy protection act (coppa). Retrieved from http://epic.org/privacy/kids/ Information Technology Acts Paper Grading

Bshs 375 Syllabus

2194 words - 9 pages | | |BSHS/375 Version 1 | | |Information Management Systems & | | |Technology in Human Services

Evolution of Health Care Information Systems Paper

1180 words - 5 pages EVOLUTION OF HEALTH CARE INFORMATION SYSTEMS PAPER EVOLUTION OF HEALTH CARE INFORMATION SYSTEMS PAPER 2 THE PATIENT RELATIONSHIPS WITH HEALTH CARE TECHNOLOGY My grandfather would often share stories of the neighborhood Doctor coming to visit the family home and providing medical care or just stopping in to say hello. They were extremely thorough, knew the entire family's history and actually became a part of the family. Over the years

Tech Acts Paper

774 words - 4 pages Information Technology Acts Paper Amanda R. Thomas BIS 220 June 16,2014 Information Technology Acts Paper There are so many advances in technology now a days and it is only going to keep growing. The result of having so many advances is that things get overlooked and it causes ethical issues such as privacy, property and ease of access to personal and private information. The Fair Credit Reporting act of 1970 as well as The Telephone

Teaching Styles and Technology

1347 words - 6 pages styles used with or without technology affect students today? I believe yes, because technology is already making students lazy with just simply listening to music, doing research and other assignments done on the computer, and incorporating computers in the classroom setting will just hinder the students in the long run when it comes to knowing the information on paper. Think quest, an organization that studies the educational system of

Global Heat Transfer Paper Industry Size, Share, Market Trends, Growth, Report 2015: Researchbeam

518 words - 3 pages 2.2.1 Heat Transfer Paper China Market Development History 2.2.2 Heat Transfer Paper Product and Technology Developments 2.2.3 Heat Transfer Paper Competitive Landscape Analysis 2.2.4 Heat Transfer Paper China Key Regions Development Status For More Information Kindly Contact: Call Us : Direct: +1 (617) 674–4143 Toll Free: +1 (855) 711–1555 Or Mail Us : sales@researchbeam.com Visit Our Blog : http://rbeam.blogspot.com

Changing Paper Documentation to Electronic in Healthcare

1303 words - 6 pages -institutional goal to achieve the change. References AHIMA (2010). Managing the Transition from Paper to EHRs. Retrieved from http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_048418.hcsp?dDocName=bok1_048418 AWARE, W. T. A., DOCUMENTATION, T. P. S., & LOGICAL, C. (2005). Information technology–Security techniques–Information security management systems–Requirements Drazin, R., & Van De Ven, A. H. (1985). Alternative Forms of Fit in Contingency Theory. Administrative Science Quarterly, 30(4). . Yu, P. (2006). Electronic versus paper-based nursing documentation systems: the caregivers weigh in. Faculty of Informatics-Papers, 659.

Unit 10

452 words - 2 pages Ayoub Elmahi NT1110 Research Paper IDentity Theft Ms. Janine Aleong Thursdays 9AM Research Project: IDentity Theft History Much before the internet technology had gained popularity, identity theft was common in form of dumpster diving and going through your trash in case you have thrown away any personal identifying information such as bills or documents. But before that, identity theft was known as a white collar crime and it was pretty

Technology

488 words - 2 pages Technology Advances Jessica Calvin BIS 220 October 2, 2012 Julius Council Technology Advances New technology advances, come ethical issues. In this paper, the information will cover the Children’s Internet Protection Act of 2000, Children’s Online Privacy Act of 1998, and what caused the act to be put in place. Children’s Internet Protection Act of 2000 When speaking of children, it is never taken lightly. Such innocent, young, and at

Administrative Ethic Paper

870 words - 4 pages restrictions imposed by state laws and the federal Health Insurance Portability and Accountability Act of 1996 (HIPPA) and was recently amended under the Health Information Technology for Economic and Clinical Health Act.(politifact, 2011). Physicians have always had a duty to keep their patients confidence. This means that a physician or any administrative person may not disclose any medical information revealed by a patient or discovered by a

Related Essays

Information Technology Act Paper

1030 words - 5 pages Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money

Communication/Information Technology Paper

1024 words - 5 pages Communication/Information Technology Paper In many of the organizations today, one may observe a great deal of communication sources that a company may use for communicating. For example, in most health care facilities a physician may use a pager as a source for communication whenever he or she is needed or the administrative staff would rely on emails when communicating throughout the company. In researching voice recognition, this paper will

Bis/220 Information Technology Acts Paper

673 words - 3 pages stored electronically and information being transferred the same way, consumers’ information was at risk. Regulations had to be put in place to control this activity. The Fair Credit Reporting Act (FCRA), was enacted in 1970 to create guidelines for Credit Reporting Agencies (CRA). CRAs had operated in a way that employees had to meet a quota for offering credit and declining credit to consumers. This created some fraudulent activity and

Information System Technology This Paper Covers What Must One Consider If Adding Automation To An Antiquated System

921 words - 4 pages , top management uses strategic planning system to forecast long-range company objectives. Each designed information system type produces information for decision making throughout the organization. Regardless of the size of the company in order to achieve any success with the implementation of information technology all three levels must be understood throughout the organization.Information systems are costly, to deploy and maintain, yet the