Preview

Bis/220 It Acts Paper

Satisfactory Essays
Open Document
Open Document
590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis/220 It Acts Paper
Information Technology Acts
UOP: BIS/220
4 Mar 2013

Abstract
Due to the increasing problem of stealing other people’s work and claiming it as your own, the No Electronic Theft (NET) Act was created. The internet has increased the availability of certain documents and had offered little protection to the people creating these works up until the NET Act. The internet has also made making and spending money much easier from the comfort of your home. The Electronic Fund Transfer Act (EFTA) was created to protect those users from having their information or money stolen.

Information Technology Acts
The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.
The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal



References: Indiana University. (2012). Knowledge Base. What is the No Electronic Theft Act? Retrieved from: http://kb.iu.edu/data/aliv.html. The Federal Reserve. (2008). Electronic Funds Transfer Act. Retrieved from: http://www.federalreserve.gov/boarddocs/caletters/2008/0807/08-07_attachment.pdf.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bis 220 Week 1 Checkpoint

    • 603 Words
    • 3 Pages

    In 1978 the U.S. Congress passed and President Jimmy Carter signed the Electronic Funds Act into effect. This act is a “federal law that protects consumers engaged in the transfer of funds through electronic methods.” ("Electronic Funds Transfer Act," 2013) It covers the use of debit cards, ATM’s, and ACH withdrawals from bank accounts. It also offers a means of improving transaction errors and limits the liability from any loss that may occur from the loss of a card or if the card was stolen. The Electronic Funds Act was passed because of the steady increase in electronic ATM and the growing popularity of electronic banking. Since then the use of paper checks slowly have declined over the years. The paper checks were a source of hard evidence that a payment was made so with the growing popularity of electronic financial transactions a law needed to be created give customers a level of confidence that they have with there traditional check system. This would allow customers to challenge any errors and correct them with a 60-day period; it also limits the liability on lost cards up to fifty dollars only upon the customer reporting the lost card within two business days.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information policy and the protection of high value digital assets used to be the responsibility of a select group of practitioners. However, the ubiquity of information technology (IT) security policies and governance have been a long-standing part of many industries with far more “average-consumer” impact since the inception of the Gramm-Leach-Bliley Act of 1999 (Computer Services Inc. - GLBA Act Compliance, 2015). Most individuals who conduct business with any financial institution will notice that the institution is required by Federal law, to comply with one of the federally mandated programs that insures customer deposits up to $250,000 (FDIC , 2009). In addition to this mission, the FDIC is responsible for “Examining and supervising financial institutions for safety and soundness of consumer…

    • 1156 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The author traces the CFAA history to the 1984 Comprehensive Crime Control Act (CCCA) which was narrow in scope, with the purpose to address unauthorized access computer crimes. As computers in households…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    These laws were also setup for the protection of society (Melvin, p. 18, 2011). The most recent changes in business law involve the courts and the legislature on how to deal with how technology has impacted the law, particularly with computers and the Internet. Cyber law has been added as a separate topic in these standards because of its emerging importance in the workplace. Specifically, this area of the standards addresses intellectual property law, with an increased focus on patents, trade secrets, trademarks, and copyright law. Contract law, including legislation related to electronic transactions. Statutes dealing with the impact of computers on privacy and crimes and torts related to…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Electronic Funds Act was put in place to protect consumers who transferred or shifted money using electronic means. Electronic methods include the use of credit, or debit cards, automated teller machines, and automatic withdrawals. The Act also restricts the responsibility the consumer would have in matter like a stolen debit card (Investopedia, 2013). A person’s financial institution is liable…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Fraud and Abuse Act was initially crafted in the 1980s to prevent remote computer hacking as away to protect government interest computers. Computer use has extended in the years since it was put into effect. Computer Fraud and abuse Act has equally extended to cover several other computer-related actions. The definition of a computer protected under the Act dramatically expanded to include any computer used in interstate commerce or communication, i.e., any computer connected to the Internet (Pollaro, 2010).…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 7

    • 1479 Words
    • 6 Pages

    * IOS – Electronic funds transfer (EFT). Electronic data interchange (EDI). XML. Radio frequency identification (RFID)…

    • 1479 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    References: Children’s Internet Protection Act (CIPA). (2003). In Webster 's New World™ Computer Dictionary. Retrieved from http://www.credoreference.com.ezproxy.apollolibrary.com/entry/webstercom/children_s_internet_protection_act_cipa…

    • 392 Words
    • 2 Pages
    Satisfactory Essays