Free Essay

Bis 220 Tech Acts Paper

In: Business and Management

Submitted By jpbarron73
Words 724
Pages 3
Regulations: An Integral Part in the technology process
Jake Barron
BIS 220: Introduction to Computer Applications

Abstract:
Technology is an essential part of everyday life, but with the advances in technology problems with how to regulate certain aspects have arisen. Through certain laws, technology advances but remains safe and regulated.

Technology is one of the fastest growing sectors in the business world. From the 1970’s to now, the advancements in this sector have been staggering. Innovation in the area of technology has brought us many amazing things that have made our lives easier and more productive. Through the integration of technology and business the world has become somewhat reliant on these advances. The more reliant we have become, the more susceptible we are to a rapidly growing issue. This issue is crime involving technological advances. There have been laws passed to protect ourselves and these are a couple of examples. Technology has not only played a vital role in communication but it has also played a vital role in commerce and the sharing of information. Digital Data such as music and movies can be purchased at the click of a button, but along with this freedom there lies an internal issue. As easy as it is to purchase, it was just as easy to find the same files free from users who are willing to share. This process of file sharing causes billions of dollars in loss for such intellectual properties. The No Electronic Theft Act (NET Act) was introduced by President Bill Clinton in 1997. “The NET Act makes it a crime to infringe a copyright willfully for purposes of commercial advantage or private financial gain, or by the reproduction or distribution, including by electronic means, during any 180-day period, of one or more copies or phonorecords of one or more copyrighted works, which have a total retail value of more than $1,000...." If the retail value rises above $2,500 it becomes a felony.” This according to NET Act legislation. Due to the NET Act many of the properties that were freely available online have been removed and many perpetrators have been brought to justice for making money off of the hard work of others. The process of file sharing freely online has been classified as an act such as shoplifting and this accurately describes the act given the fact you are freely acquiring something that would ordinarily cost you money, for free. Though the NET Act has not completley abolished these actions, it has certainly made a great contribution to the elimination of them. Technology has not only innovated communication and business, but it has also innovated education. Through technology, information is more readily available to all students through the world wide web. But along with the easy access of information comes an increased danger in the access of content that is not suitable for children. To regulate this type of information, Congress passed the Children’s Internet Protection Act in the year 2000. The CIPA imposes rules for K-12 schools and libraries to implement measures of security for internet browsing to protect children from such things like pornography or any graphic content that is harmful to minors. With information and media so easily available online, the CIPA has played an essential role in the prevention of our children to access such information in places that are supposed to be safe learning environments. Technology advances everyday, and with these advances come various problems that arise. With rules and regulations we can be assured that the advancement of technology will not affect safety and security of any aspect in our life. We can enjoy technology for what it truly is intended, the betterment not detriment of our lives.

References:
No electronic theft (NET) act. (1998). Searcher, 6(2), 24-25. Retrieved from http://search.proquest.com/docview/221080987?accountid=458
Holland, B. (1999). Net piracy act passed. Billboard, 111(43), 8. Retrieved from http://search.proquest.com/docview/227105142?accountid=458
The children's internet protection acts (CIPA). (2001). Teacher Librarian, 28(5), 53-57. Retrieved from http://search.proquest.com/docview/224892531?accountid=458
Cantos, L., Fine, L., Porcelli, N., & Selby, S. E. (2001). Congress passes children's internet protection act. Intellectual Property & Technology Law Journal, 13(3), 23. Retrieved from http://search.proquest.com/docview/227139619?accountid=458…...

Similar Documents

Free Essay

Bis 220

...Don’t Call Implementation Act, 2003 And Telephone Consumer Protection Act, 1988 Bryan Allen BIS/220 December 11th, 2012 Jadie Giorgis Has there ever been a time when dinner is just about to start and in the middle of saying prayer the phone rings? Dad gets up to answer the phone and on the other end is a telemarketer. The telemarketer is trying to sell something and dad isn’t interested; its dinner time he says, or maybe it is some voice recording selling something. It has happened to just about everyone. Because there have been advances in information technology; the result has been the creation of Acts of Congress to address the ethical issues which could violate our right to privacy. In this essay two Acts will be discussed: The Telephone Consumer Protection Act of 1991 and The Do Not Call Implementation Act of 2003. Both acts have to deal with our rights to privacy. “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively. Regulated by the Federal Communications Commission (FCC), this law requires telemarketers to formalize their existing policies and, where necessary, create new ones to bring their operations into compliance with the following main restrictions” (code of ethics,......

Words: 665 - Pages: 3

Free Essay

It Acts Paper

...Information Technology Acts Paper BIS/220 October 31, 2012 Aaron R. Cuevas Information Technology Acts Paper The Children’s Internet Protection Act of 2000 was to address issues raised about a minor’s access to harmful or explicit content over the Internet. This mandated that schools and libraries impose restrictions over specific subject matter. Schools that have subjected to these guidelines also must include consistent monitoring of all online activities conducted by minors. However, administering guidelines and restrictions was not enough. In 2011 the FCC issued further guidance by implanting further updates. There must also be an explanation, or rather education, provided to the minors about why such rules are in place, what appropriate online behavior is, and cyber-threat awareness and response. “Students will always have some sort of adversarial relationship with anyone that puts up a fence between what they want and what they should have access to, but with input on why sites are blocked and giving them a say in the process will help” (Anderson 2010). The advances made in the Internet being distributed throughout schools as a tool for education greatly expanded teachers, or instructors, resources. The Internet became an infinite domain of tools that could be used in the classroom setting. And it is more cost efficient than supplying the information through physical hardcopies. However, the word ‘infinite’ is what needed to be regarded as a blessing and a......

Words: 812 - Pages: 4

Premium Essay

Bis 220

...Kristian Agnew BIS/220 University of Phoenix February 16, 2013 3% similarity index The world that we live in and the worlds that our grandparents lived in, are more than likely two completely different worlds. There once was a time when people knew who their neighbors were, children played outside for recreation, when a loved one was missed, a letter was written or a telephone call from a landline was made, and books were read the old fashioned way (in paper form). That world seems like it was centuries ago, but it was only a few decades previous. In today’s society, if you haven’t seen a loved one, they are just a skype call or Facebook status away. Almost everyone has an email address. Due to this, a stamp and letter seems more extinct by the day. We live in a world where we have access to books right at our fingertips via our smart phones or tablets and children prefer video games rather than going outside to play with their friends. The advances in information technology have played a key role in shaping the rights we have and much of our day-to-day activities. An example of this would be HIPAA or the Health Insurance Portability and Accountability Act that was established in 1996. Around this time, medical facilities, including hospitals, and private practices, started implementing the use of digital medical records. To limit the amount of personal information being disclosed to anyone other than the patient, the government created this act to......

Words: 680 - Pages: 3

Free Essay

Bis 220

...Proposal for Information Systems Roy L. Tucker BIS/220 October 18, 2012 Kendra Campbell Proposal for Information Systems Table of Contents Table…………………………………………………………………………………….3 Introduction…………………………………………………………………………….4 Challenges………………………………………………………………………………5 Solutions………………………………………………………………………………...5 Benefits.................................................................................................................6 Drawbacks……………………………………………………………………….6 Summary..………………………………………………………………………………6 References………………………………………………………………………………7 Table | Type of System | Function | Example | | | | | |Transaction Processing |Custom business applications including access |Ensures the availability, integrity and | |Systems |of data, inter-computer communications and |security of data. Manages point of sale, | |(TPS) |manage interface |transactions, credit cards, checks, cash | | | ...

Words: 1043 - Pages: 5

Free Essay

Bis 220

...Acts Research Paper BIS/220 August 1, 2012 Nik Johnson Acts Research Paper In this paper, we will examine the advances in information technology that has resulted in new ethical changes in implementing the Telephone Consumer Protection Act, 1998, and Do Not Call Implementation Act, 2003. The two acts that I researched go hand in hand with each other because each Act is implemented by the Federal Communications Commission. Also the Do Not Call Implementation Act, 2003 established as a result of the Telephone Consumer Protection Act, 1991. Both acts have been established to protect the consumer and his or her privacy. Thankfully, advances in information technology have assisted in the protection of consumers for unwanted calls and solicitations, but it has also made it easier for the uninvited calls. The Federal Communications Commission established rules and regulations that companies soliciting had to follow. One of the new rules required the companies to provide caller ID that would help with consumers who had caller ID to identify whether or not someone wants to answer the phone. Also they have to identify themselves and the company they are calling on behalf of when calling consumers. One of the original rules of the Telephone Consumer Protection Act, 1998 is that no solicitation phone calls could be made before eight a.m. and after nine p.m.. After many more complaints of unwanted phone calls from telemarketing companies the Federal Communications Commission......

Words: 447 - Pages: 2

Premium Essay

Bis 220 Week 1 Technology Acts

...Information Technology Acts BIS/220 August 5, 2013 Information Technology Acts Before I began working in the banking industry a few years ago I never realized to this how many people still continue to write checks as a means of payment. While many people have steered away from using checks there are so people that just prefer to still use them. Almost all banking needs can be done without even needing to step foot inside a banking center. With the implementations of ATM’s and mobile banking you can do almost any transaction from the comforts of your own home. These advances in information technology have cause regulations such as the Electronic Funds Transfer Act, 1078 to be implemented to keep the customers money safe while offering convenience. With so much added convenience for the customers, financial institutions and other sales driven businesses required that the Do Not Call Implementation Act, 2003 be brought into play. Electronic Funds Transfer (EFT), 1978 The Electronic Funds Transfer (EFT) was passed in 1978 as a result of all of the growth and development of electronic ATM machines and electronic banking. President Jimmy Carter signed the act in order to establish the rights and liabilities of consumers as well as the responsibilities of all participants involved in the electronic funds transfer activities. (Wikipedia, 2013) The Electronic Funds Transfer Act, is a federal law that protects consumers involved in the transfer of funds through......

Words: 318 - Pages: 2

Premium Essay

Information Technology Acts Paper

...Information Technology Acts Paper Bis/220 3/9/2013 Paul Porch Information Technology Acts Paper The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) was created in response to the terrorist attacks of September 11, 2001. This act once passed became a law almost immediately, less than two months after the attacks. This Act has been modified thru the years implementing better rules to help protect our country. In 2006 the Act was modified once again, this time including a some modifications with technology. “The Act brought the law up to date with current technology, so we no longer have to fight a digital-age battle with antique weapons-legal authorities leftover from the era of rotary telephones. When investigating the murder of Wall Street Journal reporter Daniel Pearl, for example, law enforcement used one of the Act's new authorities to use high-tech means to identify and locate some of the killers.”  ("Justice Information Sharing Department Of Justice").  This Act also extends to law enforcement and foreign intelligence purposes. The purpose of the Act was to enable the government to investigate any potential terrorist more efficiently and effectively. “It expands the authority of the Secretary of the Treasury to regulate the activities of U.S. financial institutions, to combat money laundering.”  (“The PATRIOT Act Revisited ,” 2004). As with anything the......

Words: 590 - Pages: 3

Free Essay

Bis/220 Information Technology Acts Paper

...2012 BIS/220 – Clarence Wheeler, Jr. In the 1970’s, technology was beginning to rapidly change the way the financial sector completed transactions and held records. Many records had changed to being stored electronically and the use of debit cards and electronic banking transactions had begun. This created a higher possibility for fraudulent activity. As records were being stored electronically and information being transferred the same way, consumers’ information was at risk. Regulations had to be put in place to control this activity. The Fair Credit Reporting Act (FCRA), was enacted in 1970 to create guidelines for Credit Reporting Agencies (CRA). CRAs had operated in a way that employees had to meet a quota for offering credit and declining credit to consumers. This created some fraudulent activity and unethical changes made to consumers’ credit reports. Consumers, at this time, had no right to view what was on their credit reports. The government realized this was unacceptable and unethical and created the FCRA to protect consumers. (The Fair, 2011) CRAs were also basing credit worthiness on factors that shouldn’t matter for extending credit. They were looking at things such as religion, sexual orientation and gender to make these decisions. The government put a stop to this with the FCRA. It is now illegal to make such decisions based on personal traits such as these. CRAs must use the same criteria with all consumers to remain fair. The act......

Words: 654 - Pages: 3

Free Essay

Bis 220 Week 1

...The Up and Coming of Technology BIS-220 April 3, 2013 Charles "Page" Waller The Up and Coming of Technology Information technology is one of the most in demand fields in the world, because of the fact it has many influences in government policy that have passed through the years. The Fair Credit Reporting Act of 1970 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996 were just a couple of policies effected by the impact of information technology. The policies were made to protect the American citizens in ways of obtaining free credit reports and the privacy of personal medical records, which individually will be discussed in the essay. "You hear the terminology Fair Credit Reporting Act and you think that's an act that only applies to credit reports," Paul Stephens (Dilworth, 2012). One would think this quote is right, but it is the complete opposite. In 1970, the Fair Credit Reporting Act was established to help citizens from getting ridiculed by massive organizations that wanted to use his or her credit reports against them. The organizations acquired the information that was only available to them and was not intended to be shared. The policy permitted everyone the right to keep track of his or her own credit report. This gives the companies restricted access to credit reports which under F.C.R.A one cannot share information with anyone, cannot affect him or her from getting a job, one needs permission to access information, and one......

Words: 827 - Pages: 4

Premium Essay

Bis 220 Week 2

...Information Systems Proposal Vince Wainwright BIS/220 2/16/2014 Instructor Alizadeh Scenario: Imagine that you and a business partner are considering starting a small, brick & mortar, nostalgic record store. Your friend does not have much experience with information systems or technology, and needs a basic understanding of the different types of information systems available to businesses. Write a 350 to 700 word proposal of the types of information systems that would work well for your chosen business, and their benefits and drawbacks. A brick and mortar record store must rely on its information systems for the smooth operation of daily operations. The types of information systems that are critical to a record store are Office Information System (employee tasking and email), Transaction Processing System (buying), and a Management Office System (tracking). These three systems are the key components for day to day operation of a successfully ran record store. Employees run the store thereby communication and work hours are important to log on a daily basis. An Office Information System will enable the managers and employees to engage in communications of daily activities, send emails, create reminders, maintain work hours and schedules. Communications of daily activities range from tasking to weekly schedules. Emails are used for fast communication and storing a paper trial of previous conversations and tasking. The maintenance of a weekly schedule...

Words: 368 - Pages: 2

Premium Essay

Tech Acts Paper

...Information Technology Acts Paper Amanda R. Thomas BIS 220 June 16,2014 Information Technology Acts Paper There are so many advances in technology now a days and it is only going to keep growing. The result of having so many advances is that things get overlooked and it causes ethical issues such as privacy, property and ease of access to personal and private information. The Fair Credit Reporting act of 1970 as well as The Telephone Consumer Protection Act of 1991 are good examples of why we need to constantly build onto the acts and not just leave them where they are or were. The Fair Credit Reporting Act of 1970 controls the amount of personal information someone can get from you. It was targeted toward banks and consumer reporting agencies, and businesses that gave them the information. Now that companies and industries have grown and technology has become so much easier to use and information is so much easier to get a hold of. Now a day's people can Google so much of your information that it makes it easier to find out personal information you may not want someone knowing. Identity theft is one of the biggest ones that come to mind. The second you send a text messages and it crosses paths with something else, log onto Face book and fill in the personal information section you are putting your information in a public place that poachers can take it and use your information. There has been a lot of this over the last few years and it is becoming more and more......

Words: 751 - Pages: 4

Premium Essay

Information Tech Acts

... Information Technology Acts J Lacy Parson BIS/220 4 Oct 2014 Lisa Paulson Information Technology Acts There were many different acts to choose from. Throughout the years so much as changed in terms of information technology, it seems that every year there are new issues. The most interesting to me were the No Electronic Theft (NET) Act, enacted in 1997 and the Federal Information Security Management Act of 2002. The No Electronic Theft Act protects copyright owners against infringement. According to Indiana University it makes copyrighted material “federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.” (What is the No Electronic Theft Act 2014) This came from the progression that the internet made. The internet made is so easy to share information or download songs. It was a necessary act in my opinion. With blogs being such a big thing it also protected against someone claiming information as their own. The next very interesting act is the Federal Information Management Security Act of 2002. The act states that; “The Department of Homeland Security activities will include (but will not be limited to): overseeing the government-wide and agency-specific implementation of and reporting on cyber security policies and guidance;......

Words: 481 - Pages: 2

Premium Essay

Bis 220

...SYLLABUS BIS/220 Introduction to Computer Application and Systems Copyright ©2014 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including word processing, spreadsheet, database, and presentation software to accomplish business objectives. Other topics include uses of application software and the Internet for effective problem solving, exploration of relevant emerging technologies, and how information is used across different industries. Course Dates 35 days Faculty Information Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): • Academic Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Get Ready for Class • Familiarize yourself with the textbooks used in this course. Course Materials All electronic materials are available on your student website. Week1 Information Systems and Word Processing Tools Tasks • Download the new and improved Phoenix Mobile app. • Review the Week One Student Guide. 7 days Objectives/Competencies 1...

Words: 789 - Pages: 4

Premium Essay

Bis 220 Final Paper

...Wireless Technologies Proposal Keshia Smith, Joshua Crouch, Amber Kelly, JaLynn Coombs BIS 220 January 16, 2012 Michael Chu Wireless Technologies Proposal Mobile computing and mobile commerce in addition to a traditional computer system is what Party Plates will use to house information for the company at one location that could be accessible by a wireless device as well. If Party Plates want their services readily available, convenient to their customers, and to remain productive; then they may consider the use of wireless devices to compete with other businesses that supply the same services. Mobile services allow Party Plates as well as their customers to access information real-time while connecting from mobile devices and other computing environments. Whether Party Plates use mobile devices or remain in its current position, we are recommending mobile computing and mobile commerce as wireless services to move Party Plates into the future. The pros and cons of each service are listed within this proposal. Mobile computing refers to real-time wireless connection between a mobile device and other computing environments, such as the Internet. These days it is spreading everywhere, at work, at home, in education, health care, entertainment, and in so many other areas. The pros of mobile computing is its mobility to take a small hand held device and go anywhere and its broad reach to just about anywhere instantly [ (Rainer & Cegielski, 2011) ]. Mobile......

Words: 619 - Pages: 3

Premium Essay

Bis/220

...Fair Credit Reporting Act 1970 University Of Phoenix BIS/220 Professor Bob Branch Congress enacted the Fair Credit Reporting Act in 1970 because the improper use of credit records. The reporting agencies put in place procedures for meeting the needs of commerce for consumer credit, personal insurance, and other information in a manner that is fair to the consumer, which is confidential, accurate, relevant, and properly used (Maurer & Thomas, 1997). The fair credit report act even has an impact on how employers conduct outside investigations on employees. The FTC made an amendment to the Fair Credit Report Act making newly expanded disclosures notification and consent requirements to apply to employers who use the Fair Credit Report Act when making employment decisions (Morgan, Owens & Gomes, 2000). Employers are required to provide in writing to employee’s using clear understandable language, stating that a consumer investigative report may be obtained for employment purposes. Employer must give notice to employee separate from any other disclosures. Employer must also give written consent before he or she can investigate further. If an employer decides that an investigation is an appropriate action second notice disclosure must be given to the employee. The employer has three days to request an investigative report for an outside consumer reporting agency. A third notice must be given to the employee of the nature of the investigation only if the employee......

Words: 509 - Pages: 3