Preview

Bis/220 It Acts Paper

Satisfactory Essays
Open Document
Open Document
590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis/220 It Acts Paper
Information Technology Acts
UOP: BIS/220
4 Mar 2013

Abstract
Due to the increasing problem of stealing other people’s work and claiming it as your own, the No Electronic Theft (NET) Act was created. The internet has increased the availability of certain documents and had offered little protection to the people creating these works up until the NET Act. The internet has also made making and spending money much easier from the comfort of your home. The Electronic Fund Transfer Act (EFTA) was created to protect those users from having their information or money stolen.

Information Technology Acts
The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.
The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal



References: Indiana University. (2012). Knowledge Base. What is the No Electronic Theft Act? Retrieved from: http://kb.iu.edu/data/aliv.html. The Federal Reserve. (2008). Electronic Funds Transfer Act. Retrieved from: http://www.federalreserve.gov/boarddocs/caletters/2008/0807/08-07_attachment.pdf.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 7

    • 1479 Words
    • 6 Pages

    * IOS – Electronic funds transfer (EFT). Electronic data interchange (EDI). XML. Radio frequency identification (RFID)…

    • 1479 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Bis 220 Week 1 Checkpoint

    • 603 Words
    • 3 Pages

    In 1978 the U.S. Congress passed and President Jimmy Carter signed the Electronic Funds Act into effect. This act is a “federal law that protects consumers engaged in the transfer of funds through electronic methods.” ("Electronic Funds Transfer Act," 2013) It covers the use of debit cards, ATM’s, and ACH withdrawals from bank accounts. It also offers a means of improving transaction errors and limits the liability from any loss that may occur from the loss of a card or if the card was stolen. The Electronic Funds Act was passed because of the steady increase in electronic ATM and the growing popularity of electronic banking. Since then the use of paper checks slowly have declined over the years. The paper checks were a source of hard evidence that a payment was made so with the growing popularity of electronic financial transactions a law needed to be created give customers a level of confidence that they have with there traditional check system. This would allow customers to challenge any errors and correct them with a 60-day period; it also limits the liability on lost cards up to fifty dollars only upon the customer reporting the lost card within two business days.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The author traces the CFAA history to the 1984 Comprehensive Crime Control Act (CCCA) which was narrow in scope, with the purpose to address unauthorized access computer crimes. As computers in households…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Technology has gone from the days of the pony express to advancing at a rate of a mile a minute to now evolving to what seems like the speed of light or faster. With such a fast paced environment of change in technology, policies and laws must adapt to be compatible to those advancements in order to provide the best method to govern the laws and policies and protect its people. This paper will explore how technological advancements have influenced crucial changes in two essential policies: the Electronic Communications Privacy Act (ECPA) and the Electronic Funds Transfer Act (EFTA).…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information policy and the protection of high value digital assets used to be the responsibility of a select group of practitioners. However, the ubiquity of information technology (IT) security policies and governance have been a long-standing part of many industries with far more “average-consumer” impact since the inception of the Gramm-Leach-Bliley Act of 1999 (Computer Services Inc. - GLBA Act Compliance, 2015). Most individuals who conduct business with any financial institution will notice that the institution is required by Federal law, to comply with one of the federally mandated programs that insures customer deposits up to $250,000 (FDIC , 2009). In addition to this mission, the FDIC is responsible for “Examining and supervising financial institutions for safety and soundness of consumer…

    • 1156 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The electronic funds transfer act was put in place in 1978, it is also known as (EFTA). The electronic funds transfer act was enacted to protect both the consumers and the banking institutions when the consumers use electronic technology to manage their finances. Electronic technologies have replaced most paper transactions. This act provides requirements for consumers and banking institutions. The six basic services that are covered under this act are; ATM transactions, direct deposits, pay-by-phone, internet transactions, debit card transactions, and electronic check conversions (“Debt.org”, 2013). The electronic funds transfer act helps protect all those that are involved in technology related banking. Without this act in place, some consumers may have a harder time being ethical about the transactions he or she has done. On the other hand, banking institutes are held to a higher standard, decreasing unethical choices. This act helps lay down an ethical foundation for all parties involved.…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    These laws were also setup for the protection of society (Melvin, p. 18, 2011). The most recent changes in business law involve the courts and the legislature on how to deal with how technology has impacted the law, particularly with computers and the Internet. Cyber law has been added as a separate topic in these standards because of its emerging importance in the workplace. Specifically, this area of the standards addresses intellectual property law, with an increased focus on patents, trade secrets, trademarks, and copyright law. Contract law, including legislation related to electronic transactions. Statutes dealing with the impact of computers on privacy and crimes and torts related to…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Electronic Funds Act was put in place to protect consumers who transferred or shifted money using electronic means. Electronic methods include the use of credit, or debit cards, automated teller machines, and automatic withdrawals. The Act also restricts the responsibility the consumer would have in matter like a stolen debit card (Investopedia, 2013). A person’s financial institution is liable…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    References: Children’s Internet Protection Act (CIPA). (2003). In Webster 's New World™ Computer Dictionary. Retrieved from http://www.credoreference.com.ezproxy.apollolibrary.com/entry/webstercom/children_s_internet_protection_act_cipa…

    • 392 Words
    • 2 Pages
    Satisfactory Essays