Computer Fraud And Abuse Act 1986 And Children's Internet Protection Act
Submitted By originalone
Words: 1323
Pages: 6
Bis220 week1
Information Technology Acts
In the 21st century information technology has continual moved ahead over the years, ethical concerns are now issues today? Accordingly, the government executed specific acts to govern these concerns. In this paper two of those Acts will be addressed, The Computer Fraud and Abuse Act 1986 and Children’s Internet Protection Act, 2000. The Computer Fraud and Abuse Act 1986.
Years ago there were no laws were established to monitor or regulate the usage of computers. Laws are created to respond to ethical concerns or social issues, in the early 70’s and 80’s there were no know problems pertaining to the use of computers. In the mid 1980’s technological advances brought personal computers into widespread use in homes, high schools, colleges, and businesses (Encyclopedia Computer Science 2002). The use of telephone lines and modems became the interconnections of computers. People could now store confidential and personal information on home and business computers, which made the information vulnerable to interferences.
The U.S. Computer Fraud and Abuse Act of 1986 was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984(Encyclopedia Computer Science 2002). It was the first comprehensive legislation in the US to identify and provide for the persecution of crimes committed through and against computer systems. In 1984, there were only three areas of this Act that were covered as it relates to crimes related to the use of computers. The three areas was all related to the unauthorized access of federal government data, consumer credit information and unauthorized access to a computer used for, or on behalf of, the U.S government. Because the 1984 Act was limited to government computers the Act of 1984 was superseded in 1986. In 1986 the Computer Fraud and Abuse Act of 1986 was established to include government and non-government computers. The U.S. government has the right to regulate commerce between or among several states (Computer Law 1991). It was illegal to intentionally without authorization, attempt to obtain protected information.
Information Technology Acts
Nakia Rogers
University of Phoenix
BIS/220 INTRODUCTION TO COMPUTER APPLICATION AND SYSTEMS
Donald Hunter
January 21, 2013
Information Technology Acts
While information technology continual to move ahead over the years, ethical concerns turn into an issue. Accordingly, the government executed specific acts to govern these concerns. Even as some of these acts exists, this text centered on two sections specifically: US Patriot Act of 2001, and Fair Credit Reporting Act of 1970. Whereas the Patriot Act was executed to lessen terrorist activities by the use of the internet, the Fair Credit Act was executed to give every American with be on a par with credit opportunities.
The Patriot Act of 2001 The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, also well-known as the Patriot Act of 2001 was enacted in 2001. The Patriot Act was established to “deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and other purposes” (US).
Table 1.1 Sections of the Patriot Act of 2001
|Section |Purpose |
|311 |“Special Measures for Jurisdictions, Financial Institutions, or International Transactions of Primary Money Laundering |
| |Concern |
|312 |Special Due Diligence for Correspondent Accounts and Private Banking Accounts |
Related Documents: Computer Fraud And Abuse Act 1986 And Children's Internet Protection Act
Information Technology Acts Paper Leisa Allender BIS/220 January 14, 2013 Instructor Prasad The world of information technology is forever advancing. Advances to information technology is an improvement to a mechanism used to store, manipulate, distribute, or create information. The Federal Government and Congress have laws to protect consumer rights. In 1991 the Telephone Consumer Protection Act (TCPA) was signed into law by President George H. W…
Information Technology Act Paper Travis Hall May 6, 2013 BIS/220 Dr. Moland Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This was a very sound control. Then the Internet came in the 1990’s…
Microsoft was founded in 1975 as a technology company. According to the company’s 10K report “We develop and market software, services, and hardware that deliver new opportunities, greater convenience, and enhanced value to people’s lives. We do business worldwide and have offices in more than 100 countries”. It is a common trend in the world of technology that everything is moving to the cloud, which as a result, as a pioneer in the technology industry, Not only has Microsoft focusing on developing…
Wireless Technologies Proposal Introduction Party Plates has grown to a point where we need to incorporate smart phones and GPS into our business model. We need to make our team more efficient and increase productivity. By putting the precision of Real-Time GPS tracking into our vehicles and upgrading our sales team and delivery drivers with the new iPhone 4S we will get the greatest value from them all. These two wireless technologies may seem expensive but it is an investment…
3 Assessment of Existing Relevant Technologies Due to the recent increase in environmental awareness and concern about the environmental impact of many activities, there has been an increased focus on the development of technologies that do not rely on “dirty” energy sources such as coal or oil. One of these forms of power generation is wave power. Although there has been some progress in the large-scale industrial production of power from the waves, there has not been any focus on small, personal…
11/25/2012 COSC-1301-P19 | Daniel De La Rosa | | Technology | | Technology | Technology. We are surrounded by it. Whether it’s the e-mailing, cell phone, computers, laptops, tablets, video conferencing, video gaming, has changed each and every day living dramatically. Everything from the business world, to decision making, to human resources has been highly affected by the new and advanced technology. It’s amazing how technology has improved and more advanced than decades before.…
Kevin Vasquez English 105 Ms.Nagel 09/16/13 Technology With all the technology in today’s society it is very easy to see how dependent of it we have become. As of today, there is practically everything to make life a whole lot easier for the human being. It might seem ironic to make such a statement but it is something which is very well validated, especially as of late. Things such as cell phones, internet, cars and things of that nature have made us into a much less sociable race. Since…
Information Technology Acts Paper BIS/220 Introduction to Computer Application and Systems Donald Hunter Technology is changing so much around us, sometimes it hard to keep up. Making sure that our families and our self are covered is a big worry of most people. In ways to help the government has established acts put in place to protect everyone from a wide range of things, from ethical issues to fraud. The two that I find to be very important are, Health Insurance…
Information Technology Acts Paper BIS/220 January 22, 2014 Much of the changes that occur in our society are based on advancements in our technology. For the most part these advancements help create a more sophisticated avenue, so that we can function properly with each change that comes along. Technological advancements take place everyday and with these constant changes it is important to have organization and guidelines that will be understood by the public. Having…
Information Technology Acts Paper Today’s global business use information technologies to survive and prosper in this highly competitive environment. Information Technology relates to any computer based tool that people use to work with information and to support the information and information processing needs of an organization (Rainer & Cegielski, 2011). In this new digital econonmy, business rely heavily on information technology to keep things running smoothly. If not handled properly Information…