Information Technology Act Paper

Only available on StudyMode
  • Download(s) : 86
  • Published : August 17, 2012
Open Document
Text Preview
Information Technology Acts Paper

Shawanda Donelson

BIS/220

March 31, 2012
Jacquelyn Jones

Information Technology Acts Paper

In the 1990s the Internet became popular, which children then had unsupervised access. Children were exposed to porn and other harmful materials. Congress tried to stop it and put it into law, but each direction it went was determined as being unconstitutional. To an extent, technology finally prevailed. Congress should not pass a law penalizing distributors, but they should pass a law that would affect those who receive Federal funding. Pornography has been around since the 1970s, which was controlled from minors. On December 15, 2000, President Bill Clinton signed into law the Children’s Internet Protection Act. This act puts restrictions on receiving federals funds. They must use technology and policies that filters or blocks certain material from being Internet accessible. These young children are being targeted because they do not fully understand the dangers of using the internet inappropriately. Therefore, if their parents are not educated about the dangers of Internet predators it makes it harder to educate their children. The Federal Trade Commission gave Congress a report in March 1998, showing that the children’s personal information did not have enough protection from hackers and predators. On April 21, 2000, the Children’s Online Privacy Protection Act (COPPA) was put into law. The act applied to online services and commercial websites aimed for the attention of children. COPPA law attacks online communication which is sexually explicit that lacks artistic, scientific, serious literary, or political value (Child Online Protection Act and Child Online Privacy Protection Act, 2002). Conclusion

In conclusion, the main advancement of technology was the Internet of both acts, one prevented others from collecting information from children, and the other prevented others from sending information...
tracking img