This website uses cookies to ensure you have the best experience. Learn more

Information Technology Acts Essay

618 words - 3 pages

Information Technology Acts
Bruce Washington
BIS/220
December 4, 2012
Troy Adams

Information Technology Acts
Throughout the years, technology has advanced at an ever increasing rate. Advances in information technology in particular, have made information that years ago, would have taken weeks or even months to gather, available at the push of a button. With information so readily available to anyone and everyone, new ethical issues arose that resulted in the need for regulations to be placed on how that information can be used.
Acts such as the Telephone Consumer Protection Act (TCPA), 1991 and the Do Not Call Implementation Act, 2003 were created to stem the tidal wave of telemarketing calls that swept the country and continue to aggravate and annoy millions of people. Calls that come just when dinner is being served, or at some other inappropriate time. The rise of computers and the internet, coupled with businesses that ...view middle of the document...

In 1991, congress passed the Telephone Consumer Protection Act, putting into place rules intended to regulate the use of unethical practices employed by the telemarketing industry. The TCPA prohibited solicitors from calling residences before 8 a.m. or after 9 p.m., local time. It also stopped companies from misrepresenting themselves by requiring them to provide their name and the name of the person or entity on whose behalf the call is being made. The TCPA prohibited sales calls to cell phones and further required that solicitors maintain a list of consumers that do not wish to be called. Although regulations regarding the Do Not Call list were in place, they were in effect ineffective. DNC regulations required consumers to go through the frustrating experience of making the Do Not Call request to each telemarketer. This gave telemarketers the opportunity to continue with business as usual.
Not until 2003, with the passing of the Do Not Call Implementation Act and the FTC’s adoption of the National Do Not Call Registry was there any kind of relief. The Do Not Call Registry gave telemarketers 90 days from the date a number is registered with the Registry to stop calling that number. Once a number was registered, it stayed on the list for five years. Subsequent improvements to the Act, have lowered the time it takes to stop receiving calls from 90 days to 31 days and increased the time a number stays on the list. Instead of five years, numbers now added to the list are listed permanently. The Registry did not put a stop to all unwanted calls. Regulations still allow calls from political organizations, not for profit groups, those conducting surveys, and companies with which an existing business relationship is established.
Funny thing the way technology works. When one avenue of communication suffers a setback, technology steps in with a replacement, so, while the laws are somewhat protecting consumers, the rapid rate of advancement in Information Technology ensures that new ethical issues will arise and new laws will be need to put into place to deal with them.

Other Papers Like Information Technology Acts

Information Technology Acts Paper1

1073 words - 5 pages Information Technology Acts Financial Services Modernization Act Of 1999 Can what happened during the Great Depression ever happen again? They are not sure. As a country, they have taken steps to decrease the extent of damage something like this could ever do again. The technological systems used today for tracking, maintaining, and storing data are much more complex, complicated, of larger capacity, and in need of complex laws to protect

Bis/220 Information Technology Acts Paper

673 words - 3 pages fraud much simpler for criminals. Since banks are responsible for unauthorized card use, they have taken many steps to assure security for customers. When fraudulent activity is suspected, many institutions will place a hold on the card in question and contact the consumer. Both acts have been modified greatly since their enactment, to keep up with technology changes. Technology will be ever-changing, so updates to the acts will be a necessity

Information Security

988 words - 4 pages factors that are comprehensively adequate in solving the above human acts in regard to information security. These factors include usability and short cuts. Information technology involves certain complex processes that require strict adherence by users of information technology systems. The complexity of these systems makes them to be difficult for human beings to easily operate. Owing to these complexities, most users tend to develop shortcuts in

Tech Acts Paper

774 words - 4 pages Information Technology Acts Paper Amanda R. Thomas BIS 220 June 16,2014 Information Technology Acts Paper There are so many advances in technology now a days and it is only going to keep growing. The result of having so many advances is that things get overlooked and it causes ethical issues such as privacy, property and ease of access to personal and private information. The Fair Credit Reporting act of 1970 as well as The Telephone

Computer Fraud

836 words - 4 pages when considering a partnership in one way or another and obtaining factual data within seconds is an amazing benefit that information technology has provided. As with many situations and/or inventions occurs it can have its pitfalls. With information technology being readily available to anyone has its pitfalls. There are those that utilize information for illegal acts such as identity theft, theft of organizational information, and

Technology in Education

2555 words - 11 pages theorists, technology does not only facilitate research and analysis in the learning environment, but also promotes information processing among learners. The tool enhances the development of human memory for improved storage and data processing. Constructivism approach posits that the tool enables learners to understand their immediate environment and construct meaning from the observable environmental features (Yukselturk & Bulut, 2009

The Children’S Online Privacy Protection Act (COPPA)

1761 words - 8 pages The government has passed some laws which are intended to protect children on the internet. The Children’s Online Privacy Protection Act (COPPA) and Children’s Internet Protection Act (CIPA) are to give protection for children who are accessing the internet. There are requirements and protective information for both COPPA and CIPA. Both acts are similar and different in ways to protect children but needed to be done with two acts. There are

Acts Paper

898 words - 4 pages , including individual’s children. Thankfully we have Acts that prohibit such actions from occurring. References Multnomah County Library. (23, December 2009).Children's internet protection act; questions and answers. Retrieved from http://www.multcolib.org/news/cipa.html Epic.org. (20, April 2010). Children's online privacy protection act (coppa). Retrieved from http://epic.org/privacy/kids/ Information Technology Acts Paper Grading

chasing girl

877 words - 4 pages the identity of the transaction target, one side of a deal, finally ruined trading. Now I will talk about some protect Measures Firewall Firewall is built on the boundary of the corresponding network communication monitoring system to protect the security of computer networks which is a control technology can be both a software product and can make or embedded into some kind of hardware products. All information on the transmission of

Info Tech Acts

719 words - 3 pages Information Technology Acts Paper BIS220 July 15 Information Technology Acts Paper The Children’s Internet Protection Act (CIPA) was enacted by Congress in 2000 to address concerns about children’s access to obscene or harmful content over the Internet. CIPA applies to any web site that is directed to children under 13 that collects personal information from them or to any web site that collects personal information where they know

Internet Access

674 words - 3 pages consent or not and additionally, control over what information the operator can utilize. While these acts and others do not dismiss all ethical issues related to information technology, they do help in minimizing potential threats related to our children. Children need to be taught all the benefits of having access to these technological advancements, but as parents, children need to be taught about the different threats that can follow them

Related Essays

Information Technology Acts Essay

734 words - 3 pages Information Technology Acts BIS/220 February 25, 2013 Abstract The basis of this paper is to explain the advances in information technology that ultimately resulted with the creation of the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Children’s Online Protection Privacy Act (COPPA). These two acts are beneficial to the privacy of oneself regarding medical files and the protection

Information And Technology Acts Essay

533 words - 3 pages creation of these acts? There are seven crimes listed under the CFAA: obtaining national security information, trespassing in a government computer, damaging a computer or information, compromising confidentiality, trafficking in passwords, threatening to damage a computer, and accessing to defraud and obtain value. Essentially, this act protects against hacking. The evolution of information technology (IT) though, has increased the

Information Technology Acts Essay

704 words - 3 pages Information Technology Acts Kimberly Bundrick BIS/220 July 9, 2012 Heather Shankwiler Information Technology Acts There are several advances in information technology that resulted in new ethical issues necessitating the creation of certain acts. The two acts which will be discussed in this paper are the Children’s Internet Protection Act of 2000, and the Family Educational Rights and Privacy Act of 1974. Children’s Internet Protection

Information Technology Acts Essay

807 words - 4 pages Information Technology Acts Echo Fairley BIS/220 07/28/14 Rita Solomon- Moore For this assignment, I chose the Children’s Internet Protection Act 2000primarily because I have three children of my own who use the internet in some way daily, and the Do Not Call Act of 2003 because I find unwanted calls to my home or cellular phone obnoxious and unethical invasions. New and evolving technologies have led to unethical business practices