Preview

Bis/220 Information Technology Acts Paper

Good Essays
Open Document
Open Document
674 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis/220 Information Technology Acts Paper
Information Technology Acts
BIS/220 Introduction to Computer Application and Systems
22 October 2012

Information Technology Acts Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.
Telephone Consumer Protection Act (TCPA), 1991
…show more content…

The introduction of automated systems for automated calls and messages to people as well as fax machines introduced a consumer burden. Beyond these calls being disruptive when received late or early to the recipient, the calls were also costly when to certain types of phone lines. Recipients that would receive these calls on their cell phones or paging devices would often have to pay for their minutes and usage. This added up over time to be a burden on the recipient.
The Act was introduced to stop the use of automated telemarketing with prerecorded messages and autodialing. It also prohibited telemarketers from calling recipient outside of the hours of 8 a.m. to 9 p.m. Telemarketers were also to keep a list of anyone that did not wish to be called again for five years. These rules went into effect on December 20, 1992 (Direct Marketing Association, n.d.). Calls also cannot be sent to emergency numbers, lines to hospital or nursing home rooms, and cell phones or paging devices (Federal Communications Commission,


You May Also Find These Documents Helpful

  • Powerful Essays

    Every customer can use the company software to record and download music to an iPod or an electronic device for easier transportation. Music can also be stored on a desktop or laptop hard drive, a CD Rom and can be transferred from computer to computer for trouble-free mobility. Customer service lines will be set-up to track consumer feedback and to support the business development according to the needs of the consumers. Using a variety of information systems can provide the basics for essential services, new products, and a strategic advantage that will result in higher sales and…

    • 884 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Kudler Fine Foods is a specialty grocery store located in the San Diego area. The first location was opened by Kathy Kudler in June 1998. Currently there are three locations in La Jolla, Del Mar, and Encinitas. Kudler Fine Foods has a variety of domestic and imported food and beverage items including produce, meat, seafood, condiments, packaged foods, cheese, dairy products, wine, and a bakery. Our firm has been hired by Kudler Fine Foods in order to assess their accounting and information technology systems. This brief will address their business and accounting information needs, their current hardware and software, the strengths and weaknesses of the current computer system, explore opportunities for upgrades in technology use, evaluate threats regarding the current information technology systems, and recommendations that could improve their ability to conduct business.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    It’s a database that records and balances all transactions, purchases, returns, payment for services, online ventures, etc. for our business. That’s not the only thing TPS does it handles many other little components that makes up the system and how we will obtain our money from consumer purchases. TPS is also used for a company’s inventory, payroll, sales, profits, and much more. “For example, you make a purchase from Forever 21 with a bank card TPS obtains your bank information for payment, and counts business’s inventory, sales, profits, and payroll (Fitzpatrick).” TPS is also used for businesses that have websites that allow customers to make online purchases then in that case TPS will have to hold more of the customer’s…

    • 784 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bus 250 Week 4 Disc1

    • 323 Words
    • 2 Pages

    Of the three privacy issues, I support Privacy Legislation, although I think the consumer should also protect himself or herself; however I believe the government regulations are helpful. With the new guideline the Federal Trade Commission set forth in, 2009 we have more information on how companies collect and use our information. We now have the option to opt out or be placed on the DO NOT CALL LIST. With the new government regulations, telemarketing has decreased and I’m at ease at answering my phone.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    4) ______ issues involve who may obtain information and how much they should pay for this information…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Have you ever been sitting at home relaxing when the phone rings and it is a telemarketer on the other line trying to sell you something? You didn’t reach out to the company on the other line prompting this intrusion. Most of the time, you don’t even want the product they are selling. This is an issue that has plagued millions of people across the United States since the mid-to-late eighties when businesses started using the telephone in order to market and sell their products. Two Acts in particular have been passed in order to help battle telemarketers and maintain residencies’ privacy when it comes to the telephone.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 107

    • 1747 Words
    • 7 Pages

    Modern telephone systems offer a variety of features. Some are essential communication tools; other features that people will likely use on a more discretionary basis. One common and frequently used feature of today’s telephone systems is voice mail. If you can’t take am incoming call, voice mail allows callers to record messages which you can access at your convenience. An auto-attendant feature, useful for businesses, consists of a centralized recorded message to greet callers and direct their calls to the right numbers. You can use a phone systems conference – calling feature to allow a number of people to participate in a call at the same time. Each system allows different numbers of people to participate, and all remain on the call until they hang up. Telephone systems offer various features for managing incoming calls, one useful feature is call transfer, which allows me to transfer calls from my number to another number. Another much used feature is call holding if you are on the phone and receive an incoming call, you can put the first call on hold and attend to the second call. One more feature within the trust is call mute/secrecy, with allows me to mute the call so that the person on the other end of the phone can’t hear what I’m discussing, which helps with confidentiality because they can’t hear client or patient information.…

    • 1747 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Bis 220 Week 1

    • 470 Words
    • 2 Pages

    The Telephone Consumer Protection Act of 1991 (TCPA) was established to protect consumers from the increasingly intrusive methods employed by telemarketers. Information technology advances such as auto-dialers, predictive dialers, and automated faxes made it easier to reach large numbers of businesses and households in a relatively short time. These methods were not only highly annoying to consumers, but through the use of these devices, telemarketing companies were also passing some of the cost of marketing onto the consumer. Consumers on the receiving end of numerous calls from various companies throughout the day were spending time that could have been spent in other activities and were rightly frustrated about the loss of their time. In the case of automated faxes, resources such as paper, ink, and even the data connection being used to receive what is essentially junk mail was a cost the consumer had no way to avoid. Fortunately, lawmakers responded to this unethical action of telemarketing companies with the TCPA. Specifically, the law makes it illegal to use auto-dialers and pre-recorded voice messages to make sales calls to emergency phone lines, medical offices, hospital rooms, homes for the elderly, paging services, or cellular phones. It also requires the recipient of pre-recorded telemarketing calls to give prior consent to receive the calls. It also made it illegal to send unsolicited fax messages. The law also gave states their own authority to regulate telemarketing practices. The Federal Communications Commission (FCC) enforces the rules set forth in the TCPA. The FCC was also given authority to issue regulations beyond the TCPA in order to continue to protect consumers from abusive telemarketing practices. This provision shows that Congress recognizes that over time changes in information technology may make the TCPA insufficient to meet the task of consumer protection ("EPIC - Telemarketing and the Telephone Consumer Protection Act (TCPA)").…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In society today it has become increasingly necessary to effectively use technologically advanced Information systems and software applications to run an organization. In our technologically advanced and dynamic society, organizations are being pushed to use and operate updated and advanced information systems and software applications to store information, process data and effectively manage day to day operations. In this paper the subject discussed will be how a CIS (computer information systems) can help an organization, what they are, and an example of a CIS and its uses in a retail environment.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The article “Freedom of Speech and My Right to Silence at Bath Time” by Patti Waldmeir is about how telemarketers should not be calling family householders. Telemarketers get angry at the negative response the people give them when they call, but after all, they are disturbing people in the comfort of their own. However, these telemarketers also have freedom of speech. As it says in the article “… advertisers have a right to broadcast their wares, but consumers have a right to refuse to listen.”…

    • 568 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Children are our society’s most valuable and fragile resources. It is our responsibility as parents, adults, and caregivers to provide our children with as many safeguards to protect them from physical and virtual dangers. Children are spending more and more time on the internet and without the proper protection and supervision they can be exposed to indecent or harmful material or predators that seek to harm them. “What children are encountering on the Internet, particularly in terms of indecent or otherwise unsuitable material or contacts with strangers who intend to do them harm, is an issue of major concern.” (Smith, 2001). The Children’s Internet Protection Act (CIPA) of 2000 and the Children’s Online Privacy Protection Act (COPPA) of 1998 were put in place as an attempt to protect our children from the harm that could befall them on the internet from harmful materials and predators that target children.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Do not Call Registry: Registering here is one of the effective ways to stop such calls. There is a National do not call registry in most of the countries and by registering your mobile number there, you can stop any unsolicited commercial communication in the form of phone calls or message. Telemarketer is supposed to verify in the do not call registry database before making any telemarketing call to make sure they are not calling someone who have registered to avoid penalties.…

    • 432 Words
    • 2 Pages
    Good Essays