Preview

account information system

Satisfactory Essays
Open Document
Open Document
431 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
account information system
Module 3 Discussion
Suppose you were an IT Policy adviser to the president of the United States. What major changes would you suggest the president propose with regards to IT legislation and policy? Why would you suggest those changes? Who would those changes help? Who would those changes hurt? Who would likely oppose your suggested changes?
Answer:
If I were an IT policy advisor to the President of the United States, I would suggest three changes with regards to IT legislation and policy as below:
1 The first change is to require a new legislation for a legal approach to IT crime and define new laws for actions taken in cyberspace as crimes. Because the IT explosion has opened up many leeway for cybercriminals. Cybercriminals are relatively easy to obtain injunctions from the court order since IT crimes are new and only occur in cyberspace. Therefore, victims are hindered by the lack of legislation in place currently to obtain their legal rights. This change would help victims to approach their legal rights and prevent cybercriminals to take advantage of legal systems. This change may impose more taxable income and hurt tax payer’s benefits. Tax payers and business owners who benefit from current US law may oppose this change.

2 The second change is to equip with IT professionals or IT departments for police departments specialized in IT crime. Because IT crimes are not violent and often hard to identify the exact location of the offenders. Otherwise, cybercriminal’s evidence can be easily destroyed or erased. This change would help municipal polices to locate cybercriminals and adopt proper legal actions based on the type of IT crimes. This change would hurt federal government budget and tax payer’s benefits because IT crimes are low on priority list of police departments now and tax payers will have to pay more income tax. Therefore, government budget administrators and tax payers may oppose this change.

3 The third change is to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Townsend & Townsend

    • 577 Words
    • 3 Pages

    There is also another issue, the segregation of duties within the IT department as this is a great concern as it can create a high possibility of unauthorized changes, therefore reducing the integrity of the data and a lack of accountibility among the IT employees. We would recommend that you clearly define the duties and restrictions among the IT staff and monitor these…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Risk Management

    • 663 Words
    • 3 Pages

    3.What questions would you bring to executive management prior to finalizing your IT risk mitigation plan?…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan?…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bsbwor501 Final Exam

    • 1303 Words
    • 6 Pages

    3) One of the significant changes in IT governance is the shift to a centralized IS executive decision making process. – True…

    • 1303 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Why: Management should define the policies for the reason to use the Internet, how to use the Internet, responsibilities of the person online, and consequences for in appropriate use. This will allow the IS department to take measures to ensure security over the Web, while still allowing for successful business to be conducted.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crm Research

    • 379 Words
    • 2 Pages

    Explain why laws, which have defined criminal enterprise, must change to keep pace with advancing technologies i.e. computer/cyber crimes, use of DNA in identifying potential suspects/offenders, GPS systems in tracking sexual…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    In this paper, I will seek to develop a proposal that will outline the changes that should be made…

    • 2938 Words
    • 12 Pages
    Best Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan? What is the budget and time frame for the migration…

    • 287 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    References: IT IG Board Briefing in IT Governance, 2nd Edition, IT Governance Institute, 2003, www.itigi.org…

    • 2116 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    With increasing circulation of electronic information and awareness, laws are in need.we have tried in our research to explore a less focused and under-viewed area of law. Cyber torts is an emerging area which requires a special attention.cyber law encompasses electronic communication,freedom of expression,intellectual property rights,juridiscation and choice of law,privacy rights,etc.Nations and private organizations ,all aim for better net policing as it looks increasingly daunting due to the fact of security measures and to avoid accidents,which have been quite frequent in the past and if not improvised- it can be a serious threat.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Computer Crime

    • 3460 Words
    • 14 Pages

    occur over long periods of time, or when a computer operator uses a computer to…

    • 3460 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Ict Acceptable Use Policy

    • 5292 Words
    • 22 Pages

    Change Approval The ICT Acceptable Use Policy is reviewed regularly and amended as necessary. The Information Security Forum will agree significant changes to the policy.…

    • 5292 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    One Note

    • 1048 Words
    • 5 Pages

    services are made available over the Internet by July 1, 2002. Utah was one of the…

    • 1048 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    addressing cybercrime

    • 3009 Words
    • 13 Pages

    Cybercrime is one of the fastest growing non-violent crimes in the Asian region. It takes a great deal of technical expertise and co-operation, both local and foreign, in order to address such problems. This crime affects different countries in varying degrees, depending on the extent of the legislative enactment of each country. In the Philippines, as technical and electronic landscapes change, there is a need to enact laws or amend existing laws to fully address cyber threats.…

    • 3009 Words
    • 13 Pages
    Powerful Essays