Information Technology Acts Paper

Only available on StudyMode
  • Download(s) : 244
  • Published : May 14, 2013
Open Document
Text Preview
Information Technology Acts Paper
BIS 220
November 9, 2011

Information Technology Acts Paper
The invention of the internet and the growing use of it by children caused for implementation of new protection acts. Among these acts are the Children’s Online Privacy Protection Act (COPPA), which passed into law in 1998, and the Children’s Internet Protection Act (CIPA), which became law in 2000. This paper will discuss the advances in information technology that resulted in new ethical issues necessitating the creation of these acts. Children’s Online Protection Act (COPPA), 1998

As the internet grew in popularity among the public, children began to use it more and more for everything from homework, to communicating, to searching for whatever information is out there (surfing). In most cases, websites required the users to put in their personal contact information and, in many cases, allow the website upload tracking cookies to the user’s computer. Almost anyone could then find, buy, and/or use that information for whatever reason. Children’s personal information could be accessed by pedophiles, bullies, or any other type of creep. According to L. Fair of the Federal Trade Commission, COPPA puts parents in control of what information children put online. Whether studying, shopping, surfing or chatting, today’s kids take advantage of everything the Internet has to offer. But when it comes to their personal information, who’s in the driver’s seat? Parents, according to the Children’s Online Privacy Protection Act (COPPA) and regulations enforced by the Federal Trade Commission.  

If you operate a website directed to children under 13 that collects personal information – or if you operate a website directed to a general audience and have actual knowledge you’re collecting personal information from kids – you must comply with COPPA’s two main requirements. First, you must prominently post your information security practices on your homepage and wherever you...
tracking img