Information Technology Acts Paper

576 words - 3 pages

Information Technology Acts Paper
Advances in technology made it possible to obtain almost any information needed by accessing the World Wide Web. These advances have also paved the way for predators and unwarranted solicitors to retrieve private information. Most homes are either equipped with or have access to a computer and Internet. This technology used to be reserved for the government and businesses but is readily available for the individual consumer. The advances have not only made it possible to access information at home but also encourage teenagers and younger children to participate in gathering information via the Internet.
Access to the web by children led to the enactment of laws such as the Children Internet Protection Act (CIPA) and the Children’s Online Privacy Protection Act (COPPA). These acts were implemented as a security method to aid in the protection of minors. Some websites containing nudity, online pornography, and ...view middle of the document...

Libraries and schools are required to implement filters that will eliminate or attempt to eliminate objectionable material from website possibly viewed by children (Children’s Internet Protections Act (CIPA) to Affect Libraries and the Online Community, 2001). Schools and libraries are eligible for discounts on purchasing communication technology if they follow CIPA guidelines. A monitoring program for tracking online activities by minors is required to be eligible for the discounts under CIPA (Children’s Internet Protection Act, n.d.).
The Children’s Online Protection Act, signed into law in 1998, restricts the gathering of information online from children under the age of 13 (Simmons, 2007). Commissioning the consent of a parent or guardian is required when necessitating personal information from a minor. COPPA details what type of information websites solicit from children and lists responsibilities for protecting the privacy of the minor (Children’s Online Privacy Protection Act of 1998, n.d.).
Information technology definitely has a place in the future of our children; however, safeguards are also necessary to protect them. With advances in technology there will always be someone out there preying on and taking advantage of individuals. We cannot eliminate the web or other forms of technology. The next best thing is to implement safety measures. Creating laws such as CIPA and COPPA are a couple of methods used to help provide a safer environment for our children when using the Internet.

Children's Internet Protection Act. (n.d.). Retrieved November 27, 2011, from
ONLINE COMMUNITY. (2001). Online Libraries & Microcomputers, 19(2), 1. Retrieved November 27, 2011 from ProQuest database.
Children's Online Privacy Protection Act of 1998. (n.d.). Retrieved November 27, 2011 from
Simmons, C. (2007). Protecting Children While Silencing Them: The Children's Online Privacy
Protection Act and Children's Free Speech Rights. Communication Law & Policy, 12(2),
119-142. doi:10.1080/10811680701266492 Retrieved November 27, 2011 from ProQuest database.

Other assignments on Information Technology Acts Paper

Information Use Paper

812 words - 4 pages Information Use Paper Tyler Claire CIS/319 University of Phoenix Facilitator John Ziah October 19, 2012 Information Use Paper The executive summary has critical information Technology. The bullets the author will discuss are as followed. Identifying and describing ways information technology is used in organization today and techniques on organization flow. The organization the author

Mobile Computing And Social Networks Essay

317 words - 2 pages this point, there are no foreseeable bounds where mobile technology is concern. The healthcare industry is now realizing this fact and has decided to implement mobile technology within their industry. While still in the early stages of implementing mobile technology within the healthcare industry, there are many things to consider, and questions to ask. Within this paper, I will answer such questions as patient information accuracy, security

Info Society

1449 words - 6 pages Vision Paper An Innovative Stay In Touch Software INTRODUCTION In today’s world, with so much information being constantly updated and peoples desire to access this information where they want to has created a demand for a new visionary technology which is fast, convenient and more important up to date. As the movement away from printed media increase and the explosion of PDA devices into the market, there is potential for a new company

Week 2- Individual Paper-Information Use

620 words - 3 pages Week 2- Individual Paper CIS/207 November 25, 2013 Week 2: Individual Paper In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of

A Socio-Cognitive View Of Adult Development

321 words - 2 pages useful to understanding how an adults’ thinking, acting, and learning contribute to their development. I chose this article because I thought that it was related to what we have discussed throughout this psychology class. Another reason I chose this article is because I believe the brain has more control over the way a person thinks, acts, responds, etc. than what we may know. If I were to write a research paper about this topic, I would definitely


282 words - 2 pages Input E-Paper 3D Printer Browser Operating System Wireless Power WiMax Wi-Fi SD Cards Geobrowsing Securexam Remote Proctor Google Search Privacy Supercookies Adware/spyware/ stealthware Cloud Computing Mobile Augmented Reality QR Codes RFID Technology Smart Home Phishing Identity theft Or any topic accepted by your instructor. 1 Gulf University For Science and Technology Department of Management Information Systems The PowerPoint

Blade Runner

650 words - 3 pages Paper #1: Descartes and Artificial Intelligence Blade Runner, a film based in the future, precisely 2019 shows the world with genetically engineered robots called replicants. Replicants look just like other adult beings that are substitutes for humans that live for only four years. Living for such a short period of time allows no opportunity for development or emotional growth. The name of the film Blade Runner, are those who hunt for

The Internet

989 words - 4 pages [Deloitte 2007]. The evolution of technology has had its impact on virtually every business or private aspect of our lives. From privacy to liability issues, the impact of technology on business is only limited to imagination. Unauthorized access to paper documents or phone conversations is still an information security concern, but the real challenge has become protecting the security of computer networks, especially when they are connected


651 words - 3 pages Larry A. Shervington Jr. PHI 314 PAPA Term Paper 12/10/2015 Richard Mason developed the “PAPA” model as a way of characterizing ethics and moral compass as they relate to the information technology industry. As we further progress deeper into the era of information technology these ethics become a more prevalent part of our daily lives. From education and banking to medical and motor vehicles, information technology has now become as much

Sniffer Technology For Detecting Lost Mobiles

651 words - 3 pages A Technical Seminar Report On “Sniffer Technology For Detecting Lost Mobiles” Submitted to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD (T.S) In partial fulfilment of the requirement for the award of Degree of BACHELOR OF TECHNOLOGY In “Computer Science and Engineering” By N.KIRTHI [11D61A0554] Under the guidance of Mr S.Srinivas Associate Professor C.S.E Dept . Department of Computer Science and Engineering RAJA

Rfid Security

3358 words - 14 pages test RFID, or run pilot projects in order to comply with the new requirements. Another adoption of RFID technology has been by governments, with the electronic passport project. In a number of countries, traditional paper passports are gradually being replaced with passports embedded with a small integrated circuit. Biometric information, such as face recognition, fingerprints or iris scans are stored in the electronic passport. The

Similar Documents

Information Technology Acts Paper

423 words - 2 pages be breached when information is stored in databases and shared over networks. Ethical issues due to advances in IT call for the creation of new acts to protect consumers. The Telephone Consumer Protection Act (TCPA) of 1991 and the Do Not Call Implementation Act of 2003 are two perfect examples of Acts being created as direct results of IT advancements coupled with ethical issues.       The advances in information technology that resulted in new

Information Technology Acts Essay

1432 words - 6 pages Information Technology Acts Paper Ryan Beland BIS/220 Mr. Vozella 7/28/2104 In today’s world we do not start our mornings with an essential meal, a cup of coffee, and reading the newspaper; but with the simple press of one of the most iconic buttons, the power button. The dramatic increase in technology demands the attention of almost every person across the globe as they connect, work, and coordinate daily plans and objectives with those

Communication And Information Technology Paper

1137 words - 5 pages Communication and Information Technology Paper Althea McDaniel HCS/240 March 25, 2012 Tralicia Brown Human communication is "the process through which individuals in relationships, groups, organizations, and societies create and use information to relate with others" (Edwards, 2007). "As individuals, communication is our link to the world, our means of making impressions, expressing ourselves

Bis 220 Week 1 Information Technology

606 words - 3 pages Information Technology Acts Liriaxis Marie Gonzalez BIS/220 June 25, 2013 Nnamdi Osakwe Information Technology Acts Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a