Information Technology Acts Paper

423 words - 2 pages

The daily use of information technology for personal and business environment has created an innovative effect on people lives. This change has been an important factor for success through everyday life function. The fast growing pace of information technology brought along many ethical issues, like privacy, property, and accuracy, as people began to share their personal data over networks. These major issues brought new laws to defend consumers, for example The Telephone Consumer Protection Act (TCPA) of 1991, and the Do Not Call Implementation Act of 2003 form after Information Technology began to grow so fast creating ethical issues over customers information shared on networks.

The new laws Telephone Consumer ...view middle of the document...

The major ethical issues associated with IT advancements are privacy, property, accuracy, and ease of access to sensitive information. Privacy can easily be breached when information is stored in databases and shared over networks. Ethical issues due to advances in IT call for the creation of new acts to protect consumers. The Telephone Consumer Protection Act (TCPA) of 1991 and the Do Not Call Implementation Act of 2003 are two perfect examples of Acts being created as direct results of IT advancements coupled with ethical issues.
      The advances in information technology that resulted in new ethical issues necessitating the creation of the TCPA of 1991 and the Do Not Call Implementation Act of 2003 consisted of computer networks, predominantly the Internet, allowing organizations to collect, combine, store, and share massive amounts of data on institutions, groups, even individuals (Rainer & Cegielski, 2011). Access to specific consumer demographic information basically became potential leads for telemarketing organizations. Once the leads were accessed, telemarketing businesses used call centers to push the products or services they sold. IT advances forced Congress’ hand to offer some semblance of defense for consumers and restraint for telemarketing organizations against practices deemed harassing.
      According to American Teleservices Association (2012), “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate Telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively” (Telephone Consumer Act, para. 1). The...

Other assignments on Information Technology Acts Paper

Information Use Paper

812 words - 4 pages Information Use Paper Tyler Claire CIS/319 University of Phoenix Facilitator John Ziah October 19, 2012 Information Use Paper The executive summary has critical information Technology. The bullets the author will discuss are as followed. Identifying and describing ways information technology is used in organization today and techniques on organization flow. The organization the author

Mobile Computing And Social Networks Essay

317 words - 2 pages this point, there are no foreseeable bounds where mobile technology is concern. The healthcare industry is now realizing this fact and has decided to implement mobile technology within their industry. While still in the early stages of implementing mobile technology within the healthcare industry, there are many things to consider, and questions to ask. Within this paper, I will answer such questions as patient information accuracy, security

Info Society

1449 words - 6 pages Vision Paper An Innovative Stay In Touch Software INTRODUCTION In today’s world, with so much information being constantly updated and peoples desire to access this information where they want to has created a demand for a new visionary technology which is fast, convenient and more important up to date. As the movement away from printed media increase and the explosion of PDA devices into the market, there is potential for a new company

Week 2- Individual Paper-Information Use

620 words - 3 pages Week 2- Individual Paper CIS/207 November 25, 2013 Week 2: Individual Paper In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of

A Socio-Cognitive View Of Adult Development

321 words - 2 pages useful to understanding how an adults’ thinking, acting, and learning contribute to their development. I chose this article because I thought that it was related to what we have discussed throughout this psychology class. Another reason I chose this article is because I believe the brain has more control over the way a person thinks, acts, responds, etc. than what we may know. If I were to write a research paper about this topic, I would definitely

Rfid

282 words - 2 pages Input E-Paper 3D Printer Browser Operating System Wireless Power WiMax Wi-Fi SD Cards Geobrowsing Securexam Remote Proctor Google Search Privacy Supercookies Adware/spyware/ stealthware Cloud Computing Mobile Augmented Reality QR Codes RFID Technology Smart Home Phishing Identity theft Or any topic accepted by your instructor. 1 Gulf University For Science and Technology Department of Management Information Systems The PowerPoint

Blade Runner

650 words - 3 pages Paper #1: Descartes and Artificial Intelligence Blade Runner, a film based in the future, precisely 2019 shows the world with genetically engineered robots called replicants. Replicants look just like other adult beings that are substitutes for humans that live for only four years. Living for such a short period of time allows no opportunity for development or emotional growth. The name of the film Blade Runner, are those who hunt for

The Internet

989 words - 4 pages [Deloitte 2007]. The evolution of technology has had its impact on virtually every business or private aspect of our lives. From privacy to liability issues, the impact of technology on business is only limited to imagination. Unauthorized access to paper documents or phone conversations is still an information security concern, but the real challenge has become protecting the security of computer networks, especially when they are connected

Papa

651 words - 3 pages Larry A. Shervington Jr. PHI 314 PAPA Term Paper 12/10/2015 Richard Mason developed the “PAPA” model as a way of characterizing ethics and moral compass as they relate to the information technology industry. As we further progress deeper into the era of information technology these ethics become a more prevalent part of our daily lives. From education and banking to medical and motor vehicles, information technology has now become as much

Sniffer Technology For Detecting Lost Mobiles

651 words - 3 pages A Technical Seminar Report On “Sniffer Technology For Detecting Lost Mobiles” Submitted to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD (T.S) In partial fulfilment of the requirement for the award of Degree of BACHELOR OF TECHNOLOGY In “Computer Science and Engineering” By N.KIRTHI [11D61A0554] Under the guidance of Mr S.Srinivas Associate Professor C.S.E Dept . Department of Computer Science and Engineering RAJA

Rfid Security

3358 words - 14 pages test RFID, or run pilot projects in order to comply with the new requirements. Another adoption of RFID technology has been by governments, with the electronic passport project. In a number of countries, traditional paper passports are gradually being replaced with passports embedded with a small integrated circuit. Biometric information, such as face recognition, fingerprints or iris scans are stored in the electronic passport. The

Similar Documents

Information Technology Acts Paper

576 words - 3 pages Information Technology Acts Paper Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the

Information Technology Acts Essay

1432 words - 6 pages Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those

Communication And Information Technology Paper

1137 words - 5 pages Communication and Information Technology Paper Althea McDaniel HCS/240 March 25, 2012 Tralicia Brown Human communication is "the process through which individuals in relationships, groups, organizations, and societies create and use information to relate with others" (Edwards, 2007). "As individuals, communication is our link to the world, our means of making impressions, expressing ourselves

Bis 220 Week 1 Information Technology

606 words - 3 pages Information Technology Acts Liriaxis Marie Gonzalez BIS/220 June 25, 2013 Nnamdi Osakwe Information Technology Acts Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a