Top-Rated Free Essay
Preview

Information Technology Acts

Better Essays
761 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Acts
Information Technology Acts That Work
Introduction to Computer Application and Systems

Information Technology Acts That Work Over the last three to four decades, computers and technology are improving very rapidly. Electronic devices seem to be taking over everything we do. There are many people who unfortunately, lost their jobs because of new technology. For example, according to Voorhis (2010),
“Some of the 13,000 Wichita-area jobs lost since 2008 are gone. Forever. Welders, aircraft wing assemblers, the woman who answered the phone, the guy who wrote ad copy. Employers replaced them with robots”.
This shows that technology can be bad for some people. However, the pros definitely outweigh the cons when debating whether new information technology is positive or negative. With all the new information technology being created over the last few decades, there has to be protection and laws that come along as well. There are many Information Technology Acts that help protect the people and their private information, financial information and from annoying advertisements that just bug. Have you ever received a call from a telemarketer and he or she just keeps rambling on about some product but you don’t want to be rude and just hang up? Did you hang up the phone on the telemarketer while they were still talking? Well it does happen and those calls can be annoying and frustrating. Some people have to make those calls, imagine what it must be like for them during a normal business day. As phone prices lowered over the years, almost everyone in the United States eventually had a phone line at their home. Before the Internet became extremely popular, more people used their phones for communication and for shopping. This opened the door for businesses to hire people to make sales calls for their company. Eventually, in 2003, a law was passed and called the, “Do Not Call Implementation Act”. This law was passed for a couple reasons, “To protect consumers from unwanted phone calls from telemarketers. It also led to the establishment of fees to support the Do Not Call Registry and the creation of the Do Not Call Registry” (Benson, n.d., 1).
This helps to eliminate those annoying telemarketing calls we all get and to also help fund the registry. The Do Not Call Registry pretty much takes your name and puts it on a list that telemarketers cannot call. The F.C.C. (Federal Communications Commission) and the Federal Trade Commission would create and maintain the Do Not Call Registry. With the evolution of phones and advances in information technology, Congress felt they needed to create an act to help protect the people from unnecessary phone calls. Have you ever received unwanted messages via text or email on your cell phone? Probably not as often as you would receive spam emails on your desktop or laptop. With the evolution of cell phones over the last 15 years, they have drastically decreased in price from when they first started to hit the market. What does that mean? More opportunities for businesses to advertise on cell phones! Basically, “Congress passed the CAN-SPAM Act to address the rapid growth in unwanted commercial electronic mail messages” (CAN-SPAM - Unwanted commercial electronic mail, 2007). Again, Congress was actually looking out for people and tried to eliminate the unwanted and sometimes plain unnecessary messages that we receive on our cell phones. Maybe Congress knew additional alerts on a cell phone could be a distraction while driving? Were they trying to control the assault of non-solicited pornography? Whatever the main reason, we are happy they did help prevent unwanted messages on the cell phone. Now if they could only eliminate all junk emails! With the advances in information technology over the last few decades, Congress has tried to protect the people and solve these new ethical issues that have come to light. Congress did some good things in 2003, passing the Do Not Call Implementation Act and Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act. These acts also help protect children because some advertisements have girls that are either naked or pretty close to naked. Parents do not want their children stumbling upon nudity. These acts both help to eliminate phone calls and unwanted messages that we receive.

References
Benson, C. (n.d.). The do not call implementation act. eHow. Retrieved from http://www.ehow.com/facts_5490035_do-not-call-i mplementation-act.html

CAN-SPAM - Unwanted commercial electronic mail. (2010). Retrieved from http://transition.fcc.gov/cgb/policy/canspam.html

Voorhis, D. (2010, May). Some jobs lost forever to technology. Wichita Eagle. Retrieved from http://www.mcclatchydc.com/2010/05/20/94554/some- jobs-lost-forever-to-technology.html

References: Benson, C. (n.d.). The do not call implementation act. eHow. Retrieved from http://www.ehow.com/facts_5490035_do-not-call-i mplementation-act.html CAN-SPAM - Unwanted commercial electronic mail. (2010). Retrieved from http://transition.fcc.gov/cgb/policy/canspam.html Voorhis, D. (2010, May). Some jobs lost forever to technology. Wichita Eagle. Retrieved from http://www.mcclatchydc.com/2010/05/20/94554/some- jobs-lost-forever-to-technology.html

You May Also Find These Documents Helpful

  • Powerful Essays

    Gm520 Week2

    • 942 Words
    • 4 Pages

    The agency that controls this regulation is the Federal Trade Commission (FTC). The proposal involves protecting the privacy of consumers, by giving them a choice in whether or not they will not to receive telemarketing calls, by adding themselves to a “Do Not Call” List. The proposal has gone through several revisions already. In this most recent proposal, it is in regards to the fees charged to agencies who which to receive access to the list, and further how the rules surrounding the list once they obtain access, most importantly being that they will not be able to share the list and spilt the fees associated with the list.…

    • 942 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Today, there are many laws that address different acts of computer crimes. It is very important to understand what laws are applicable in a given situation. The law I have selected is the “no electronic theft act of 1997.” The no electronic theft act is also known as the net act, it came into law under presidents Clinton in 1997. This was used to protect against copyright violations on the Internet. The law makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted work. As such it is a crime to distribute copyrighted material even if it is done without financial gain. The law also requires that the commission of the crime be willful and that the total value of the copyrighted material exceeds $1000. There also is a five-year statute of limitations, meaning that the crime must be charged and prosecuted within five years of his commission. The net act also makes it a federal crime to record live performances without permission and further distribute the recordings.…

    • 1030 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Since the implementation of the ‘Do Not Call Implementation Act,’ there are some evidence that calls have declined, ‘from 2006 to 2010, the number of call centers is estimate to decline by 2.8 percent to 55,300 from 2006 to 2010 by 2.8 percent,’ (Srivastava, Fontenot, & Stroup, 2009,) based on the number of call center estimated.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many of us are constantly annoyed by all the telemarketers that call on a daily basis. This has been going on for decades. Why did it take so long for the Do Not Call List to be created? In the 1990s, Congress finally took into consideration the voice of the people. “In 2002, low long-distance telephone rates allowed more foreign telemarketing companies (and con artists) to call US residents. This motivated Congress and the Federal Trade Commission (FTC) to develop stricter laws to stop unwanted calling. The Do Not Call Implementation Act, which makes it illegal for telemarketers to contact consumers whose numbers are on the Do Not Call List, finally went into effect in March 2003. The FTC began the Do Not Call List a few months…

    • 541 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Business Studies

    • 1263 Words
    • 6 Pages

    From the person taking the calls view, you need to keep the callers personal information private and respect their privacy,…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    These Telemarketing calls at least for what I can say can actually keep you from receiving important calls. Because if you do not recognize the number on the caller id now you are force to ignore the call without knowing that it may be an important call from a family member or a life threaten situation.…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Telephone Consumer Protection Act was the Federal Communications Commissions (FCC) way to address the issues of the growing telemarketers in America. The Act addresses the issues pertaining to telemarketers responsibilities of proper identification, call hour restrictions, “Do not Call” Policies, auto dialers, facsimile regulations, and enforcement of penalties…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Congress enacted the Fair Credit Reporting Act (FCRA or the Act) in 1970[1] to define the standards of practice for credit reporting agencies and the rights of people who are subjects of credit reports. (Maurer V. G., 1997). Before this people had no means to verify information which was reported to creditors, insurance companies or anyone who needed to check a person’s credit report. Mistake in credit reporting were handled at the court level.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information technology has increased significantly over time. The caller Identification technology and other telephone number capturing systems have placed the consumer at the mercy of telemarketers and other nuisance callers. The increasing use of the advanced information technology such as automated and prerecorded messaging to consumer homes caused many complaints to government authorities. The Congress and the Federal Communications Commission (FCC) established the TCPA, and 12 years later the Do Not Call Implementation Act.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The original Children’s Internet Protection Act became effective on October 21, 1998 and was modified April 21, 2000 (Information Shield, 2004-2011). The law was aimed at operators of commercial websites, and online services directed at children below the age of 13. The law also targeted operators directed at the public with the knowledge of children 13 and below visiting there sites. With the increased use of computers, information technologies like electronic mail, chat room websites, and social websites creating direct contacts with children. These young children needed to be protected from information that the children were too young for, as well as organizations that illegally could use information that these children may provide them (Federal Communications Commission, 2013). The Children’s Internet Protection Act requires institutions to make parents aware of their communications with their children. The institutions have to get the parent’s consent; the parent can review what the child has been doing on the site, and to restrict further activity. The institution must limit the information it receives from a child and have a system in place to protect the information it does collect (Information Shield, 2004-2011). The rule was put into place because of ease that children had gaining access to inappropriate material.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 893 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TABLE OF CONTENTS TABLE OF CONTENTS vii LIST OF TABLES ix LIST OF FIGURES x 1. INTRODUCTION 11 1.1 Origin of the Report 11 1.2 Background of the Report 11 1.3 Objective of the Study 12 1.3.1 Primary Objective 12 1.3.2 Secondary Objective 12 1.4 Scope of Study 13 1.5 Methodologies 13 1.5.1 Literature review 13 1.5.2 Observation 13 1.5.3 Interview 13 1.5.4 Field visits 14 1.5.5 Discussion 14 1.6 Source of Information 14 1.6.1 Primary Source of Information 14 1.6.2 Secondary Source of Information 14 1.7 Definition & Acronyms 15 1.8 Limitation 16 1.9 Report Preview 17 2. ORGANIZATIONAL 18 2.1 History of the organization 18 2.2 Mission 18 2.3 Vision 18 2.4 Goal 18 2.5 Strategy 19 2.5.1…

    • 6329 Words
    • 26 Pages
    Powerful Essays