Preview

Information Acts Paper

Good Essays
Open Document
Open Document
418 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Acts Paper
The advances in information technology resulted in new ethical issues that needed to addressed and necessitating the creation of The United States Computer Fraud and Abuse Act of 1986 and the Children’s Internet Protection Act of 2000 are to be addressed in this paper. The advancement in information technology such as the world wide web, search engines, YouTube, and virtual databases have made it easily accessible to obtain personal information, but also grant anyone access to age-inappropriate sites.
The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes.
Technology advancements made it necessary to protect everyone’s privacy since it had become much easier to store and access an individual’s personal data within a corporation’s database. According to our text: “privacy is the right to be left alone and to be free of unreasonable personal intrusions. Information privacy is the right to determine when, and to what extent, information about yourself can be gathered and/or communicated to others (Rainer & Cegielski, 2011, pg. 79). Identity theft has become a very serious issue since technology advancements have made it easier for criminals to commit Identity Theft or allow companies to track one’s habits and create a personal profile of a consumer within seconds. The Children’s Internet Protection Act of 2000 was created “To require the installation and use by schools and libraries of a technology for filtering or blocking

You May Also Find These Documents Helpful

  • Good Essays

    Children are our society’s most valuable and fragile resources. It is our responsibility as parents, adults, and caregivers to provide our children with as many safeguards to protect them from physical and virtual dangers. Children are spending more and more time on the internet and without the proper protection and supervision they can be exposed to indecent or harmful material or predators that seek to harm them. “What children are encountering on the Internet, particularly in terms of indecent or otherwise unsuitable material or contacts with strangers who intend to do them harm, is an issue of major concern.” (Smith, 2001). The Children’s Internet Protection Act (CIPA) of 2000 and the Children’s Online Privacy Protection Act (COPPA) of 1998 were put in place as an attempt to protect our children from the harm that could befall them on the internet from harmful materials and predators that target children.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Children’s Online Privacy Protection Act (COPPA) was performed in 1998. The main goal for COPPA is to give parents control over what information is gained from their children online. Like we all know, the web is full of infinite websites that are not safe for most children. This Act was designed to protect children under the age of 13 while on the extreme navigation of the web. COPPA applies to commercial websites and online services that are directed to children under age 13 that collect, use, or disclose personal information from children. Operations that are covered under COPPA’s rule must post a clear and understandable privacy policy on their website describing their information practices…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the internet changing constantly every day the United States Congress are implementing many legislative acts to address concerns with the usage of different kinds of technology. There are many advances in information technology that resulted in ethical issues such as the creation of the Children’s Internet Protection Act (CIPA) which was put into law in the year of 2000 by Congress. This law addresses any concerns about access to offensive content on the internet in the schools and libraries. Children and teenagers are exposed to the internet daily in schools, public, and at home. The internet can expose children to inappropriate material and predators online. The schools and libraries must enforce an Internet safety policy that contains protection measures, which block or filter the internet access to images that are obscene, child pornography, and what is harmful to minors. The main purpose of the act is to protect children from the dangers that the internet has ("Federal Communications Commission", n.d.).…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is a fundamental moral right in a democratic society. It is the right bestowed upon individuals that strengthen the freedoms of speech, press, association, and assembly which are crucial for a free, democratic society. However, advancement in technology threatens privacy and autonomy which reduces the control over private data and exposes individuals to undesirable consequences. Thus, a loss of privacy leads to a loss of an individual’s freedom in society.…

    • 1755 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    More and more frequently laws are being put in place to protect the privacy rights of certain individuals on the internet. One of the most prevalent laws involving privacy is associated with children. Protecting children online is very important, because there are people out there willing to harm them. The Children's Online Privacy Protection Act states that it is unlawful for an online service directed towards children to collect personal information from them. The COPPA’s website, characterizes…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identity theft is not a new problem; it has actually been around for many years but with technology evolving by the minute it has made identity theft easier than ever before to do and almost get away with, leaving little to no traces. In the past the way to commit identity theft was to kill a person and assume their identity, this was way before photo ids were customary, during those times id theft wasn’t that prevalent. During the 50’s and 60’s with the invention of credit cards and Social Security Cards identity theft began to increase slightly, since most people carried their social security cards or passports in their wallets making it easy for thieves to steal and assume their identity; even though a thief may have had your personal information it still wasn’t easy for them to get credit without applying for it in person with photo identification or without the manager of the bank that was extending the credit vouching for you personally (History of Identity Theft)…

    • 1196 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Every day, businesses, schools, and individuals depend on computers to perform a variety of significant tasks. Such as tracking sales, recording student grades, creating reports, Web, and sending e-mail. People increasingly rely on computers to create, store, and manage critical information, so it is important to ensure that computers and software are protected from loss, damage, and misuse. School districts, for example, must take precautions to guarantee that student information, such as grades, attendance rates, personal and family data, and learning problems, is protected from loss and kept confidential Gary B. Shelly (2010). In 2000, congress passed the children’s internet protection act (CIPA) in order to protect children from obscene and graphic materials with in most school districts. The universal natural of the internet it is of the up most important to protect our students online with the ever changing technology and lack of decorum, the internet can be rude and take advantage of others. In order to protect my students from internet predators and any inappropriate material I need to add internet safety to the classroom curriculum so that the student can have a constant prompt on how to use the internet safely. Talking to parents about internet policy, also have parents and students sign a technology agreement that has all the rules and consequence for parent and students to read before student is able to use school technology. Closely monitor student on computer, with today’s technology teacher can see on their monitor what students are doing on each computer. Teach student how to recognize unsafe sites and have filter to block or filter out pornographic material and gang-sites, hate groups.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986 intended to reduce cracking of computer systems and to address federal computer-related offenses. The Computer Fraud and Abuse Act (codified as 18 U.S.C. § 1030 governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are involved, where the crime itself is interstate in nature, or computers used in interstate and foreign commerce. It was amended in 1988, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. Subsection (b) of the act punishes anyone who not just commits or attempts to commit an offense under the…

    • 549 Words
    • 3 Pages
    Good Essays