Preview

Bis/220 – Introduction to Computer Application & Systems

Satisfactory Essays
Open Document
Open Document
410 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis/220 – Introduction to Computer Application & Systems
Individual Assignment – Week One
Shanita Evans
BIS/220 – Introduction to Computer Application & Systems
March 6, 2012
Dr. Xuan Yu

Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).
The Electronic Communications Privacy Act, an extension of the Federal Wiretap Statute, was endorsed in 1986 (Justice Information Sharing, 2010). This was a necessary implementation with how technology was diversifying ways to communicate and share information. In order to oversee and safeguard technological advancements such as email, cordless and cell phone communications, and electronically stored data the federal government had to amend and sometimes put into operation new policies. These policies, like the Electronic Communications Privacy Act, minimize many ethical issues that came along with the development of these advancements.
As technology experimented with ideals such as wireless connection, it gave way to many unethical and at times illegal practices. Ethical issues that the Electronic Communications Privacy Act had to address included accessibility and privacy; information could be shared outside the confinement of a person’s home or business. The government needed to find a way that would control and guard how this information was access, collected and stored. Implementing the Electronic Communications Privacy Act allowed government officials to include devices outside the scope of the Federal Wiretap Statute.
Eight years before



References: (2010, December). Retrieved from Federal Reserve: http://www.federalreserve.gov/boarddocs/caletters/2010/1007/10-7-attachment.pdf Justice Information Sharing. (2010, April 7). Retrieved from U.S. Dept of Justice: http://it.ojp.gov/default.aspx?area=privacy&page=1285

You May Also Find These Documents Helpful

  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    It’s a database that records and balances all transactions, purchases, returns, payment for services, online ventures, etc. for our business. That’s not the only thing TPS does it handles many other little components that makes up the system and how we will obtain our money from consumer purchases. TPS is also used for a company’s inventory, payroll, sales, profits, and much more. “For example, you make a purchase from Forever 21 with a bank card TPS obtains your bank information for payment, and counts business’s inventory, sales, profits, and payroll (Fitzpatrick).” TPS is also used for businesses that have websites that allow customers to make online purchases then in that case TPS will have to hold more of the customer’s…

    • 784 Words
    • 4 Pages
    Good Essays
  • Good Essays

    4) ______ issues involve who may obtain information and how much they should pay for this information…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In the case of United States v. Warshak, the primary issue at hand is the constitutionality of the government’s warrantless seizure of more than twenty-seven thousand e-mails stored on an internet service provider’s server. To answer the constitutionality issue, the first focus is on e-mail itself as a form of communication, and whether there can be a reasonable expectation of privacy for e-mail stored on a service provider’s equipment. In this case, the Court ruled that e-mail has fundamental similarities with traditional forms of communication, such as a phone call or letter (Craig, 2013). For example, law enforcement cannot obtain a wiretap, search a house, or open mail without a…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Microsoft Access is a system that allows users to manipulate large amounts of data. The different areas and features of Microsoft provide quick learning and easy to use software which can benefit both small and large business environments. The different parts that make up Access are queries, reports, tables, modules and macros. Queries allow the user to pull information from the given tables and calculate using the information filled into the table. Tables associated with Access are used to store data. Information on the tables can be entered on the forms and printer-ready information is displayed on the report portion of Access, These reports can also be exported to Microsoft Excel or Word. The automation of database tasks are done using macros. Modules are used for advanced programming within the database. Microsoft Access is beneficial in the work environment because it incorporates features that are also found in other Microsoft Office applications, the learning curve with Access is not steep at all it is a very easy system to operate. Because of wizards, it is easier to create a database in less than an hour. Another benefit of Access is that it allows the user to integrate large amounts of data not having to sacrifice performance of the system. Information that has already been made available can be transferred over to the Access program. Microsoft Access can e used for both small and large business environments. However, a large office environment allows access to be programmed from the enterprise resource software.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Linda Greenhouse writes an article about how the wiretapping laws need improvement. She really goes into depth about how laws, just like technology, can become obsolete. She starts off by addressing and informing the reader about the dates and the laws that were first established by congress. She defines the wiretap law, with facts and detailed examples. This article also provides information of the types of wiretapping that the government uses. It is very detailed in its examples of each topic Greenhouse…

    • 938 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    English Paper Wiretapping

    • 2159 Words
    • 6 Pages

    Thesis: Wiretapping enables both parties and government agencies to monitor the communications of targeted people to determine if they are doing something wrong. The Government should not have the luxury of imposing on the privacy of Americans without a reasonable doubt as to when they should get a warrant to be able to do so. The Government should not wiretap because it is an abuse of power, distrust, and ethical dilemma, the violation of the Fourth Amendment which involves the collecting and storing information about people who are not criminals to be penalized.…

    • 2159 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Technological Advances and Ethical Issues precipitating the passage of the Patriot Act and the Federal Information Security Management Act…

    • 780 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Gasser, Urs. "Recoding Privacy Law: Reflections On The Future Relationship Among Law, Technology, And Privacy." Harvard Law Review 130.2 (2016): 61-70. Academic Search Premier. Web. 5 Feb. 2017.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The government has passes legislation to protect privacy with federal wiretap laws. The Electronic Communications Privacy Act 1986 is one of these. This Federal law broadened the existing regulations placed on electronic communication interception and…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Patriot Act

    • 1014 Words
    • 5 Pages

    There are ten total parts, or titles, in the patriot act and each one covers a different part of growing the security in America in hopes of stopping terrorism. These titles touch on everything from anti-terrorism funding to the ability to wiretap the phone of any suspected terrorist without getting a warrant first. This has brought up many controversial discussions on whether it gives the government too much power and whether it goes against our constitutional rights. This paper will discuss the contents of The Patriot Act and whether or not it should have been signed into law.…

    • 1014 Words
    • 5 Pages
    Good Essays
  • Good Essays

    There were many advances in information technology that resulted in new ethical issues necessitating the creation of certain acts that the government had to implement. The two that will be discussed in this paper are the PATRIOT Act of 2001, and the Fair Credit Reporting Act of 1970. Both of these acts were deemed necessary due to increasing terrorist threats for the PATRIOT Act, and for fairness in obtaining credit for the Fair Credit Reporting Act.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays