Preview

Bis220 Electronic Communications

Good Essays
Open Document
Open Document
477 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis220 Electronic Communications
Electronic Communication Privacy Act of 1986

The creation of chat rooms like my-space, face-book, cell phones, and other personal messaging services has created ethical issues and opportunity for criminals to commit crimes. “Since the wide spread use of computers and the Internet have entered the mainstream of American life. Millions of Americans spend hours every day using computers and mobile devices to send and receive email, surf the Internet, maintain databases, and participate in countless other activities,” (Office of Legal Education Executive Office for United States Attorneys, 2009). The creation and widespread use of social networks have led to ethical problems of protecting the rights citizens and law enforcement agencies. Even though we want law enforcement agents and the government to capture criminals, we want to protect the rights of law abiding citizens. “The Electronic Communications Privacy Act and the Stored Wire Electronic Communications Act are commonly referred together as the Electronic Communications Privacy Act of 1986 (ECPA).” (Justice Information Sharing , US. Department of Justice, 2012). “ The onset of computer and other digital and electronic communications prompted the need to make updates to the ACT.” (Justice, 2012) The USA PATRIOT Act and subsequent federal enactments have clarified and updated the ECPA in light of the ongoing development of modern communications technologies and methods, including easing restrictions on law enforcement access to stored communications in some cases. (Justice Information Sharing U.S. Department Of Justice, 2012). “The Electronic Communications Privacy Act (“ECPA”) was passed in 1986 to expand and revise federal wiretapping and electronic eavesdropping provisions. It was envisioned to create “a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement.” Epic.org. (2010). The advances in social networking and telephone communications brought the



References: Epic.org. (2010). Retrieved from http://epic.org/privacy/epca/ Justice Information Sharing U.S. Department of Justice. (2012). Retrieved from http://www.it.ojp.gov/ Office of Legal Education Executive Office for United States Attorneys. (2009). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Retrieved from http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Next we would like to equip each truck with Bluetooth technology to seamlessly keep our customers connected with our drivers via phone. Our drivers are already using cellphones, however, with the current law, only Bluetooth devices are legal to use in our trucks. We are proposing purchasing Aliph Jawbone Era Bluetooth…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    BIS261 Final Exam Paper

    • 1552 Words
    • 7 Pages

    The articles from the DeVry University Library: Managing Virtual Teams by LaBrosse; Successfully Transitioning to a Virtual Organization by Lockwood; and Technology Support for Enhanced Productivity in International Virtual Teams by Seilheimer, Ishman, & Seilheimer…

    • 1552 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Microsoft Access is a system that allows users to manipulate large amounts of data. The different areas and features of Microsoft provide quick learning and easy to use software which can benefit both small and large business environments. The different parts that make up Access are queries, reports, tables, modules and macros. Queries allow the user to pull information from the given tables and calculate using the information filled into the table. Tables associated with Access are used to store data. Information on the tables can be entered on the forms and printer-ready information is displayed on the report portion of Access, These reports can also be exported to Microsoft Excel or Word. The automation of database tasks are done using macros. Modules are used for advanced programming within the database. Microsoft Access is beneficial in the work environment because it incorporates features that are also found in other Microsoft Office applications, the learning curve with Access is not steep at all it is a very easy system to operate. Because of wizards, it is easier to create a database in less than an hour. Another benefit of Access is that it allows the user to integrate large amounts of data not having to sacrifice performance of the system. Information that has already been made available can be transferred over to the Access program. Microsoft Access can e used for both small and large business environments. However, a large office environment allows access to be programmed from the enterprise resource software.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS 220

    • 808 Words
    • 4 Pages

    With the advancements in technology we all are introduced to new or improved forms. There are times when advancing and learning of new technologies is a wonderful thing as long as one can also retain new information along with previously learned knowledge. In last week’s teachings we have learned new functions and capabilities as well as had a refresher course on the Microsoft PowerPoint program. Along with this informative we have also learned of the importance of the system development life cycle (SDLC) in regards to the planning, organizing, and implementing of information systems to include the project management of IT acquisitions, hardware and software selections.…

    • 808 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis 220

    • 454 Words
    • 2 Pages

    In opening a new business we must take a look at the types of information systems to use to launch our business out the public. As a new nostalgic record store we must see ways for us to buy and sell records. In this summary I will be proposing two types of information systems with descriptions of each type and why it would be best suited for our record store.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The article Swartz wrote pointed out to many people that phone companies can track one’s cell phone by tower signals. Swartz also alerted citizens that the government could use similar methods to secretly monitor movements of suspects. The main idea of Swartz’s essay is that the prosecutors have not been successful in accessing court approval to gain evidence against suspects. Swartz quotes, “Prosecutors argue that having such data is crucial to finding suspects, corroborating their whereabouts with witness accounts, or helping build a case for a wiretap on the phone” (302). In the last paragraph of Swartz’s article she soothes people’s conscience by quoting, “[T]he stream of data that carries a telephone conversation or an e-mail message contains a great deal of information, including when and where the communications originated. And that makes it harder for courts to determine whether a certain digital surveillance method invokes Fourth Amendment protections against unreasonable searches”…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Elliot, J. & McCartan, K. (2013). The Reality of Trafficked People’s Access to Technology. Journal of Criminal Law. Volume 77. Issue 3.…

    • 572 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    I don’t have to define to you what social media is, we all use it on a daily basis. If I was speaking to an older audience I may have to explain, but to be honest most of you are going to go home and log onto Facebook. It has always been a part of our world and it probably always will be. Sadly, one part of social media that we are very aware of is that it is often used to harm, to hurt – this is clearly evident in the numerous accounts of cyber bullying. I do not intend to pretend that there aren’t negative aspects of social media; I am simply trying to emphasise the enormous power and influence that it holds. If we could harness this power and rather use it to protect and assist in law enforcement the advantages would be tremendous.…

    • 1258 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Therefore, as numerous American make different social accounts, the percentage of crimes, such as stalking, harassing and kidnapping rose to the extent. Also, If the Crime Scene Investigators, Federal Bureau of Investigators, and the House of Representatives do not bug our devices, we will not be protected. The government is interested in (Singer 463). More and more children and teens are being kidnapped by disturbed people because they can easily Google the victim’s name and finds copious amounts of information on them.…

    • 1306 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In the recent past, law enforcement in various parts of the world has come under serious threat from different types of media. In the United States, law enforcement agencies argue that their work is greatly affected by the misrepresentation made by the electronic, print, and social media (Colbran, 2014). They fear that in the contemporary world, social media platforms such as YouTube, Facebook, and Twitter are negatively affecting their work and playing a major role in the rising cases of violence across the country. The misrepresentation of law enforcement by media has been termed as the biggest challenge that authorities have had to deal with in the contemporary world of high technological advancements. People have developed a tendency…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Mandatory Sentencing

    • 1159 Words
    • 5 Pages

    Smith, Jordan (2008, October) The Austin Chronicle. Reefer Madness: Drug Laws are So Fifties. Retrieved February 16, 2009 from http://www.austinchronicle.com/gyrobase/Issue/column?oid=689798…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Probation And Punishment

    • 700 Words
    • 2 Pages

    References: 1. Siegel, L. J., & Worrall, J. L. (2013) Essentials of criminal justice , Belmont, CA…

    • 700 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sutherland, M. (2005). Judicial Tyranny: The New Kings of America. St. Louis, MO: The National Policy Center. ISBN: 9780975345566…

    • 1559 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays