Preview

Information Technology Systems

Good Essays
Open Document
Open Document
506 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Systems
Information Technology and Law

The use of the Internet for communication, marketing, and commerce necessitated government regulation through the establishment of various acts. As the Internet grew in use by people of all ages many people had begun to use it for the collection of private information. As e-mail grew commonplace in the 1990s, many unscrupulous users would collect e-mail addresses for mass marketing purposes. Credit card fraud began to rise so profusely that many credit card companies greatly restricted or refused to honor online transactions. The need for regulation of the use of this new technology was growing extremely apparent.
One of the foremost important issues on the Internet was the regulation of the collection of children’s private information. Because of its growing popularity, many schools began to adopt the Internet as a teaching tool for children. As children began to use the Internet, marketers began to collect their information for marketing purposes (Electronic Privacy Information Center, 2010). The Children’s Online Privacy Protection Act (COPPA) in 1998 established restrictions on the collection and distribution of the minor children’s private information for those under the age of 13. “Since the implementation of the rule, several companies have received rather large civil fines for violations of COPPA. Most recently, UMG Recordings was fined $400,000.00 for violations” (Information Shield, Inc., 2004).
Another important issue was the use of electronic mail for unsolicited marketing messages. As the popularity of email grew, so did the amount of emails. In the mid-to-late 90s marketers would collect mass email addresses and indiscriminately send marketing messages to every email address they could find. In 2003 the Federal Communications Commission (FCC) adopted the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act to control the onslaught of unsolicited commercial messages. “The CAN-SPAM Act



References: Electronic Privacy Information Center. (2010, April 28). Children 's Online Privacy Protection Act (COPPA). Retrieved from epic.org: http://epic.org/privacy/kids/ Federal Communications Commission. (unk). Spam: Unwanted Text Messages and Email. Retrieved from FCC.gov: http://www.fcc.gov/guides/spam-unwanted-text-messages-and-email Information Shield, Inc. (2004). Regulations: Children 's Online Privacy Protection Act (COPPA). Retrieved from InformationShield.com: http://www.informationshield.com/coppaoverview.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Electronic Communications Privacy Act, an extension of the Federal Wiretap Statute, was endorsed in 1986 (Justice Information Sharing, 2010). This was a necessary implementation with how technology was diversifying ways to communicate and share information. In order to oversee and safeguard technological advancements such as email, cordless and cell phone communications, and electronically stored data the federal government had to amend and sometimes put into operation new policies. These policies, like the Electronic Communications Privacy Act, minimize many ethical issues that came along with the development of these advancements.…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Jjt2 Task 1

    • 3217 Words
    • 8 Pages

    COPPA - Children 's Online Privacy Protection Act. (n.d.). Retrieved April 30, 2014, from COPPA.org: http://www.coppa.org/coppa.htm…

    • 3217 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Have you ever been sitting at home relaxing when the phone rings and it is a telemarketer on the other line trying to sell you something? You didn’t reach out to the company on the other line prompting this intrusion. Most of the time, you don’t even want the product they are selling. This is an issue that has plagued millions of people across the United States since the mid-to-late eighties when businesses started using the telephone in order to market and sell their products. Two Acts in particular have been passed in order to help battle telemarketers and maintain residencies’ privacy when it comes to the telephone.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Info Systems

    • 1106 Words
    • 5 Pages

    8) When a business process is determined to have poor performance, the firm should always…

    • 1106 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Harlen Coben, in an essay in The New York Times, “The Undercover Parent” (March 16, 2008) asserts that parents should install spyware on their children’s computers in order to protect children from the dangers of the internet. Coben claims that because what a child does on the internet is public, as a parent you have the right to view it as well, so we should be monitoring them in this area as well. However, Coben does admit that this is indeed an invasion of privacy, but that in order to be a good parent we must do so to protect our children from pedophiles and bullies that lure on the internet. Coben attempts to educate parents about the dangers the internet poses to children, and how spyware can be an effective solution to our need to protect our kids.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    COPA and CIPPA

    • 636 Words
    • 3 Pages

    The Children’s Online Privacy Protection Act (COPPA), discussed in Section 3, requires parental consent before web sites can collect data from children. But the law only protects those under age 13. The lives of many teens are closely intertwined with the electronic culture offered by commercial web sites and by Internet services like social networking, Instant Messaging and music sharing.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003) was created because of complaints that people were being misled and deceived by emails and text messages that they were receiving from companies. In the past, there was no need for such a law because there was no such thing as email and text messaging. SPAM, which is unsolicited email and text message advertizing, was the main issue that caused people to see the need for such an Act. People felt that…

    • 554 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Systems

    • 386 Words
    • 2 Pages

    d) Explain how the two tables are related. Which table contains the foreign key? What is the foreign key?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a result government passed acts to prevent child abuse on the internet. The two acts being discussed in this paper are the Children’s Internet Protection Act of 2000 and the Children’s Online Protection Act (COPPA) of 1998.…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the internet changing constantly every day the United States Congress are implementing many legislative acts to address concerns with the usage of different kinds of technology. There are many advances in information technology that resulted in ethical issues such as the creation of the Children’s Internet Protection Act (CIPA) which was put into law in the year of 2000 by Congress. This law addresses any concerns about access to offensive content on the internet in the schools and libraries. Children and teenagers are exposed to the internet daily in schools, public, and at home. The internet can expose children to inappropriate material and predators online. The schools and libraries must enforce an Internet safety policy that contains protection measures, which block or filter the internet access to images that are obscene, child pornography, and what is harmful to minors. The main purpose of the act is to protect children from the dangers that the internet has ("Federal Communications Commission", n.d.).…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With the advancement of technology comes increased connectivity to a digital world where our children find themselves with limited guidance. This new realm is one that parents and educators have continually tried to navigate in an attempt to create a safer place for our children. Parents try to protect their children by imposing restrictions on Internet usage, while teachers struggle to teach Internet safety and digital citizenship in the classroom. Holding our youth accountable for their online behavior in a society that values Internet sensaltionalism has proven to be difficult, causing those in positions of authority to ask themselves where to draw the line. As the answer to this question changes with each new case, and more and more children…

    • 1535 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Undercover Parent

    • 1438 Words
    • 4 Pages

    Have you ever wondered if your child’s safety could be endangered on the Internet? Or how about what websites they could be going onto and if they are talking to strangers? These are some topics that Harlen Coben discusses in his article entitled “Undercover Parent”. He suggests that parents should put spyware on their child’s computers, or other electronic devices, to monitor their Internet usage, activity, and safety. Now some may say that this is an invasion of privacy, but others disagree and say that it will benefit your child. Throughout the article, Coben presents information about the pros and cons of spyware. In my opinion, I both agree and disagree with Coben’s argument on spyware.…

    • 1438 Words
    • 4 Pages
    Powerful Essays

Related Topics