Information Technology Acts Paper
In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those close and far away. Information technology is one of the largest demanded and growing systems users have available.
Information technology is the use of computer and telecommunication based systems; to store, send, manipulate, and retrieve data ...view middle of the document...
gov, n.d.)(Wallace, 2013). CIPA requires that internet safety protocols (filters/guidelines) are established and implemented in order for schools and libraries to be eligible and continuously receive e-rate discounts (federal funding) on internet/internal communication systems (fcc.gov, n.d.)(Wallace, 2013). By the CIPA law; schools/libraries who wish to receive e-rate discounts must follow specific guidelines to remain eligible, yet some schools who wish to not have e-rate discounts are not required to follow CIPA guidelines (fcc.gov, n.d.)(Wallace, 2013). CIPA regulated schools/libraries must also have two separate certification requirements which are; internet safety policies must monitor online student activity, and they must educate students about appropriate online behavior (social networking/ cyber-bullying) which are also provisions under the Protecting Children in the 21st Century Act (fcc.gov, n.d.)(Wallace, 2013). The other guidelines to gain eligibility in accordance to CIPA, is schools must adopt an internet safety policy that addresses (fcc.gov, n.d.):
* Access to inappropriate material by minors
* Safety and security of minor when using chat rooms, email, or direct electronic communication tools
* Unauthorized access or other unlawful activities by minors
* Unauthorized disclosure/use of personal information relating to minors
* Measures that restrict minor access to harmful materials
With young impressionable minds at stake; the internet within these organizations must be monitored to govern what users should and should not be exposed to. The increase in these technological information systems has changed the ethics behind what is and is not okay relating to the materials shared/viewed and the age groups accessing them. No parent or respectful/responsible adult wants a minor to be exposed to sex, drugs, vulgarity, or any action that can change a minor’s view of something in a negative manner in or outside of the home. CIPA even though has been challenged due to its restrictions on what some argue imposes on their First Amendment Rights; it is not out to control individuals lives, but to protect and keep individuals (more so minors) from accessing or being victims to inappropriate materials/persons. CIPAS regulation/guidelines previously discussed help organizations construct a useful and effective system, and motivate these organization to maintain a safe environment by offering selected funding programs (e-rates).
Now let’s examine the Computer Fraud and Abuse Act. As technological information and the internet advances so does the abilities of those who use these systems. Individuals are becoming more aware and educated on how to access weak points, read code encryptions, and further breakdown the various barriers (firewalls) established protecting personal, academic, and even professional computer systems. Increased access, speed, and education on computer based systems has required society to develop...