Information Technology Paper

In: Business and Management

Submitted By cmisaac
Words 592
Pages 3
Christena Isaac
BIS220
4/23/2012
Lauri Figueroa

Information Technology Acts

Technology has made numerous advances since computers have first come out. With technology advances come better systems and more threats. With today’s new technology society has to be careful of the threats that can happen because a person a computer. Advances in information technology have made it a necessity for Congress to create acts that protect people’s privacy and rights.
Technology has made it possible for people to steal other’s identity easily, terrorist attacks, and even threats to our children. With the internet, a person can portray themselves as whoever they want and can pose a threat to children even while they are in school. While children are in school, it has become almost a guarantee that they will use computers for various reasons. One act that Congress implemented was the Children’s Internet Protection Act. The Children’s Internet Protection Act was implemented in 2000 by Congress to regulate children’s use on computers at school. Congress needed to set rules and guidelines that schools must follow in order to gain funding for computers. Some rules were, “The protection measures must block or filter Internet access to pictures that are: (a) obscene; (b) child pornography; or (c) harmful to minors (for computers that are accessed by minors)” (Childrens internet protection, 2012). This was necessary because people are able to put anything and everything online for others to view. Children do not know what is acceptable and what is not.
In today’s society people use technology for everything. There are numerous sites that ask you for personal information just to sign up. In grocery stores there are cards that have to be used to receive discounts on groceries. However, what these businesses do not tell you, is they sell your information to other companies that…...

Similar Documents

Information Technology Acts Paper

...Information Technology Acts Paper Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the individual consumer. The advances have not only made it possible to access information at home but also encourage teenagers and younger children to participate in gathering information via the Internet. Access to the web by children led to the enactment of laws such as the Children Internet Protection Act (CIPA) and the Children’s Online Privacy Protection Act (COPPA). These acts were implemented as a security method to aid in the protection of minors. Some websites containing nudity, online pornography, and other explicit content are banned from exploiting children. Children are viewed as easy victims to trick into providing private information or soliciting monetary compensation for obscene content. Because of this perception, additional laws are necessary to protect children when in comes to information technology. CIPA places restrictions on schools and libraries such as limiting the support of federal funding if certain requirements are not adhered. This act was signed by former President Bill Clinton in December 21, 2000. The......

Words: 576 - Pages: 3

Information Technology Act Paper

...Information Technology Act Lizette Ortiz-Ortiz BIS/220 November 13, 2012 Professor Aníbal López-Torres Information Technology Act * Electronic Funds Transfer Act of 1978 * The Electronic Funds Transfer (EFT) Act was signed by Jimmy Carter on 1978. The purpose of the creation of this act was to protect peoples and institutions money on electronic transactions. This act is part of the Credit Card Consumers Act and the ETF was not considered this act was created. “The EFT Act contains important provisions concerting entry of consumers into the EFT system, delineation of rights of parties involved in EFT use, and establishment of liability for unlawful EFT use” (Fox, 1980, p. 212). The definition for EFT in the act is “a transfer of funds is initiated through an electronic terminal, telephone, computer (including on-line banking) or magnetic tape for the purpose of ordering, instructing, or authorizing a financial institution to debit or credit a consumer’s account. EFTs include, but are not limited to point-of-sale (POS) transfers; automated teller machine (ATM) transfers; direct deposits or withdrawals of funds; transfers initiated by telephone; and transfers resulting from debit card transactions, whether or not initiated through an electronic terminal” (Electronic Funds Transfer Act of 1978, Section 205.3(b)). By having EFT defined, clearly can......

Words: 1012 - Pages: 5

Information Technology Acts Paper

...Information Technology Acts Paper Bis/220 3/9/2013 Paul Porch Information Technology Acts Paper The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) was created in response to the terrorist attacks of September 11, 2001. This act once passed became a law almost immediately, less than two months after the attacks. This Act has been modified thru the years implementing better rules to help protect our country. In 2006 the Act was modified once again, this time including a some modifications with technology. “The Act brought the law up to date with current technology, so we no longer have to fight a digital-age battle with antique weapons-legal authorities leftover from the era of rotary telephones. When investigating the murder of Wall Street Journal reporter Daniel Pearl, for example, law enforcement used one of the Act's new authorities to use high-tech means to identify and locate some of the killers.”  ("Justice Information Sharing Department Of Justice").  This Act also extends to law enforcement and foreign intelligence purposes. The purpose of the Act was to enable the government to investigate any potential terrorist more efficiently and effectively. “It expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, to combat money laundering.”  (“The PATRIOT Act Revisited ,” 2004). As with anything the......

Words: 590 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper University of Phoenix Information Technology Acts Paper To start, I will begin with introducing my first Act that I am covering, The "Controlling the Assault of Non-Solicited Pornography and Marketing Act Of 2003" Otherwise known as the (CAN-SPAM Act) of 2003. The CAN-SPAM Act defines a "commercial electronic mail message" ("CEMM") as any electronic mail message, the primary purpose of which is commercial advertisement or the promotion of a commercial product or service (including content on an Internet web site operated for a commercial purpose). To put it all in a nutshell the best I can; Emails and the internet are now becoming more and more popular now it’s 2003. Advancement in Computer systems and electronic mail messages led to a big increase in business’s in America sending misleading or deceptive emails to try to sell a product or service. To summarize it in a few sentences, businesses were flat out lying via subject headings, addresses, having multiple email accounts, etc. etc. Also, Sending a CEMM that includes sexually oriented material without adequate warnings in the subject heading and an opt out message prior to displaying any additional information in the message is prohibited. With Microsoft, Apple, and others producing advancement in computers, phones, and technology, the internet was becoming a portal for pornography companies and others to sell their product or service. The American public got tired of it and told...

Words: 683 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper Joseph Morales University of Phoenix BIS 220 Gregory Peterson March 11, 2014 Information Technology Acts Paper With the advent of technology and many uses of it, come new ethical problems. Technology has helped out in many ways such as making business and personal communication efficient and effective. It has also changed how companies run the business and how consumers purchase goods. Technology has also made it much easier to do research and review things that are of interest or needed for many things. The internet is an example and one of the most widely used for all of these technological purposes. Telecommunications such as phones is another technology and has been around for some time now but has been exploited for unethical uses. Unethical uses of telecommunications and the internet is also a reason why some of these acts such as the Do Not Call Implementation Act, 2003 and the Children’s Internet Protection Act has been put in place. To bombard people with phone calls to solicit business is believed to be unethical. This is a reason why the Do Not Call Implementation Act, 2003 was put into place. By inputting any personal information on the internet such as when applying for a new credit card for example, that opens the flood gates to solicitors accessing that information and potentially inundating one with phone calls. This act made it illegal for telemarketers to contact registered phone numbers, the law did not extent......

Words: 517 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper MPS BIS/220 July 21, 2014 JM Information Technology Acts Paper With the advancement of technology, like practically everything which exists, comes the pros and the cons, the advantages and disadvantages, the benefits and the liabilities. The Internet or the World Wide Web is no different. It has exposed individuals to a literal wealth of information. It has opened borders, exposed cultures and vastly improved knowledge and productivity. In essence, the Internet has made the world a "smaller" place in that, a person can hold a face-to-face conversation with another person on the other side of the world without ever boarding a plane and information can be sent hundreds of thousands of miles in seconds. But this information highway is not only used to share useful and appropriate information but also harmful and offensive messages, leaving the most vulnerable users, children, at risk. In an effort to protect American children using the vast and almost uncensored internet, in 2000, two Acts took effect, the Children's Internet Protection Act, 1998 and Children's Online Privacy Protection Act, 2000. Due to the advancement in information technology and rising ethical issues, these Acts were necessary in order to hold internet vendors and website operators accountable for the proper handling of children where their personal information and the nature of the information they are exposed to are applicable. The first Act, The Children's......

Words: 610 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper Justine Huffman BIS/220 July 28, 2014 Vivien Lewis Information Technology Acts Paper With the advances in information technology (IT) today, individual’s personal and business lives are improving in a numerous amount of ways. Regrettably, with new technology advances, comes a growing amount of ethical issues such as an invasion of property, privacy and easy access to sensitive information. With personal information being stored in databases and shared over the web privacy can be breached with just a couple clicks of a button. Ethical issues that have formed from the advancements in IT call for new acts to be put in place to protect the privacy of today’s consumers. The Children’s Internet Protection Act of 2000 and the Do Not Call Implementation Act of 2003 are examples of Acts that are being created because of the ethical issue being formed from the advancements in IT. The Children’s Internet Protection Act was sign in to law on December 21, 2000 by President Bill Clinton. This act was designed for public libraries and public schools to apply filters and monitoring to block visual depictions of obscenity, child pornography and material harmful to minors (Canon, 2001). Before schools or libraries adopt the act the must hold at least one public hearing or meeting to address the proposal. Schools and libraries must meet two certification requirements: 1) the Internet safety policy must monitor the online activities of minors and 2)...

Words: 733 - Pages: 3

Information Technology Acts Paper

...ASHLEI MCQUEEN Information Technology Acts Paper BIS/220 PROFESSOR ZAMIR DEEN July 21, 2014 Information Technology Acts Paper The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003 was enacted into law in January 2004 (Kigerl, 2009). This law was created from the enormous bulk spam in emails that hit airwaves I the 2000 's. everyone now has a computer of some sort Weathersby desktop laptop or tablet well and the new millennium decade everyone had a desktop home computer. What kept reoccurring was some of these balk messages would contain pornographic material and unwanted irritating and embarrassing material into people's inboxes of their email. This created a really bad phenomenon of people not liking to use email because I cannot tell what real email was and what was junk and there was nothing to break down each email or monitor what you were really writing to people because of all the horrendous spam. This is when can spam Law was created it big knowledge the ethical issues and recognized the marketing downfall people would face if they cannot protect email users from unwanted messages . As far as it manages an informational technology based on the ethical issues above they have had many advancements. For one the email service allows people to write a message to anyone on the continent with the click of a button. However many features have made ethical problems and prevailed through and made spam one of the most unwanted......

Words: 956 - Pages: 4

Nursing and Information Technology Paper

...The Institute of Medicine (IOM )focuses on five core competencies for healthcare professionals. In order to provide safe care to patients with the best outcomes, the healthcare system requires an overhaul in order to efficiently take knowledge and implement it into practice. Among the core competencies is the use of healthcare informatics. The IOM (2003) defines utilizing informatics as a way to “communicate, manage knowledge, mitigate error, and support decision making using information technology” (p. 46). By utilizing informatics, healthcare providers can use data to help with decision making. The emphasis on transferring from a paper based healthcare system to a portable, technology based system reduces medical errors, improves patient outcomes, and is more efficient. Informatics involves the transference of data into knowledge that allows the nurse to understand the patient better and make judgments for patient-centered care based upon the understanding of the data. Develop a SMART goal 5 key components make up the SMART goal. First, the specific task is to education nursing staff on the new electronic health record so they are competent users when the EHR goes live. The measurable standard is the bedside nurses who attend the classes on the EHR, including current staff and new hires. The task is achievable when providing the nursing staff with education provided by the informatics staff. The plan is realistic because time and resources are committed......

Words: 606 - Pages: 3

Information Technology Acts Paper

...Information Technology Acts Paper George Tomadakis BIS/220 January 16, 2012 Marry Robbins Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This was a very sound control. Then the Internet came in the 1990’s, children had unsupervised access. The porn industry went crazy; they would do anything to get anyone to their sites. Children were being exposed to it and it was deemed harmful. Congress tried to pass laws to stop it, but every direction they went was determined to be unconstitutional. Finally technology prevailed, to an extent. Maybe Congress could not pass a law that would penalize the distributor; they could pass a law that would affect the end user that received federal money. On December 15, 2000 Congress added the Children’s Internet Protection Act and President Bill Clinton signed it into law on December 21, 2000. The Act places restrictions on entities receiving Federal funding. They must use policies and technology that blocks or filters certain material from being accessed using the internet. ("American Library Association", 1997-2012). The Internet with all of its wonders was not only being used to show are children imagery and information, the technology......

Words: 471 - Pages: 2

Communication and Information Technology Paper

...Title: Communication and Information Technology Paper Marcia Williams HCA/320Course 08/16/2010 Marcia Baker Communication and information Technology Paper Each year technology has become more advance making professionals interaction among people within the business community much better and faster. Especially the internet people are flocking to be a part of that network. There is more virtual banking where cooperation’s are conducting business in a virtual setting. It cut back on their administrative costs tremendously various businesses has capitalized with the utilization of the internet and the Healthcare Industry is a huge beneficiary. Over a period of time many doctors gave such resistance to incorporate the use of modern technology in their daily routines such as entering information on patients, or even a progress or update note in a database or computer system. Many physicians were set in their own way; as the old saying goes a person cannot teach an old dog new tricks it is the same with moving away from paper and welcoming electronic. Almost every specialist embraces the usage of the internet perfect examples of the specialists are Radiologists, Cardiologists to list a few. Electronic Medical Records The utilization of paper records and information’s has been......

Words: 877 - Pages: 4

Communication and Information Technology Paper

...Communication and Information Technology Paper Althea McDaniel HCS/240 March 25, 2012 Tralicia Brown Human communication is "the process through which individuals in relationships, groups, organizations, and societies create and use information to relate with others" (Edwards, 2007). "As individuals, communication is our link to the world, our means of making impressions, expressing ourselves, influencing others, and giving ourselves" (Ruben & Stewart, 2006). Communication involves interaction between two or more individuals. "Communication is the means of pursuing joint activities, relating to each other, and sharing ideas" (Ruben & Stewart, 2006). The ability to perform communication is what we take for granted. Every day we use speaking, reading, writing, and understanding skills. We express our feelings, share thoughts and opinions, exchange information. We cannot imagine our lives without communication, which is the foundation we build our lives on. However, according to World Health Organization approximately 10% of world’s populations are disabled people. Main types of disabilities that make communication challenging affect hearing (deaf people or those having a hearing loss), language (people having difficulties with speaking, reading, writing and understanding others), cognition (people with problems regarding remembering, learning, understanding, or problem-solving) and movement (people having difficulties......

Words: 1137 - Pages: 5

Information Technology Act Paper

...Nowadays, technology is advancing at an exponential rate. Over the last two decades or so, everyone in the world has essentially become connected to one another via computer, the internet, and social media. But as the world becomes more connected, does it also become more vulnerable? Let’s be honest, not everyone in the world has everyone else’s best interest at heart. How many times have you had to turn off the ringer of your phone because of the nonstop assault of telemarketer calls? How many emails have you received saying you’ve won the lottery in London or that the Prince of Nigeria would like to conduct business with you? It is these types of issues that motivated the United States Congress to enact several laws to protect America and its citizens from technological attacks and exploitation. In this paper, I will describe two such acts and discuss the advances in technology that resulted in new ethical issues making each such act necessary. In 2002, the United States Government enacted the Federal Information Security Management Act (44 U.S.C. § 3541, et seq.), or FISMA. FISMA recognizes the significance of information security to the economic and national security interests of the United States and mandates that each federal agency develops documents, and implements an agency wide program to provide information security for that agency ("FISMA Center", 2010). This law was enacted due to the thousands of cyber-attacks of several Federal Agencies by both foreign and......

Words: 516 - Pages: 3

Communication and Information Technology Paper

... Communication and Information Technology Paper Electronic medical records Ginger The electronic medical records are medical records that are computerized for the use of hospital or office of physicians. The system allows storage, modification and retrieval of patients’ records. This is efficient because it eliminates the records being paper based and doctors can record data at the moment they are talking to the patient. The effectiveness of electronic medical record errors is less likely to happen because everything will be electronic. By law health care providers are to have patients’ records for seven years. When a provider has to look up information on patients’ history al there information well be in one place, instead all over the place with paper based records. The electronic medical records are becoming more common means of recording information of patients. It has not been easy from transition of paper charting to the use of electronic medical records. There are people in the health care profession who find it time consuming and difficult to use; however, electronic medical record present advantages to their paper counterparts. The advantage to electronic medical record includes that repetitive information can decrease.   The healthcare professional remotely can access the information. When information have been up-to-date all healthcare provider have access to it. The information is less likely to be destroyed or lost.......

Words: 310 - Pages: 2

Communication &Information Technology Paper

...Communication & Information Technology Paper University of Phoenix HCS/320 Health Care Communication Strategies Jada Harmon May 28, 2012 Electronic Medical Records (EMR) “is records about patient care that are kept on a computer rather than on paper, the traditional medium for patient histories. These records can include extensive information about a patient's general health, current and past illnesses and medical conditions, diagnostic test results and treatments and medications prescribed. Often, electronic medical records also include an application for prescribing and ordering medication.” (E How Health, 1999-2012) The history of EMR’S begin in the 1960’s when a doctor named Lawrence L Weed was the first to think of a theory to program and restructure patients medical records for the doctors use furthering to improve patient care. In 1967 Dr. Weed worked on a program called PROMIS (Problem Oriented Medical Information System) this was the basis to get the automated Electronic Medical Records started. This aspiration was to develop a system so that would administer timely and chronological patient information to the doctor to quickly collected information of the patient for medical purposes. During the 1970’s and 1980’s is when the Electronic Medical Records really begin to be used by hospitals by the 1990’s arrived with the progression of computers and diagnostic software Electronic Medical Records are used more increasingly. In today’s technology world......

Words: 847 - Pages: 4

iphone 6 plus | Batman la releve | DC Super Hero Girls (4)