Preview

Bis 220 Week 1 Checkpoint

Satisfactory Essays
Open Document
Open Document
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bis 220 Week 1 Checkpoint
Information Technology Acts
XBIS/220
May 23, 2013

This week we are to pick two information technology acts to research and discuss the advances in information technology that resulted in new ethical issues that created the act. I currently work as a teller for a local bank and have chosen to research and discuss the Electronic Funds Transfer Act of 1978 and Fair Credit Reporting Act of 1970. I chose both of these because they coincide with my current job.
Electronic Funds Act of 1978 In 1978 the U.S. Congress passed and President Jimmy Carter signed the Electronic Funds Act into effect. This act is a “federal law that protects consumers engaged in the transfer of funds through electronic methods.” ("Electronic Funds Transfer Act," 2013) It covers the use of debit cards, ATM’s, and ACH withdrawals from bank accounts. It also offers a means of improving transaction errors and limits the liability from any loss that may occur from the loss of a card or if the card was stolen. The Electronic Funds Act was passed because of the steady increase in electronic ATM and the growing popularity of electronic banking. Since then the use of paper checks slowly have declined over the years. The paper checks were a source of hard evidence that a payment was made so with the growing popularity of electronic financial transactions a law needed to be created give customers a level of confidence that they have with there traditional check system. This would allow customers to challenge any errors and correct them with a 60-day period; it also limits the liability on lost cards up to fifty dollars only upon the customer reporting the lost card within two business days.

Fair Credit Reporting Act of 1970 Next, is the Fair Credit Reporting Act of 1970, which was originally passes in 1970 and is enforced by the U.S. Federal Trade Commission and private litigants. The act was passed "to ensure fairness, accuracy and privacy of the personal information contained in the

You May Also Find These Documents Helpful

  • Good Essays

    a) Joan’s first mistake is not using control of cash receipts. She is having only one person go through the whole accounting controls process. There should be other people involved in this process including Joan herself. Joan must also realize the limitations of human controls. One person going through the entire process is bound to make a human error.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The subsidiary ledger is made out of many different accounts and makes the general ledger easier to read because the descriptions do not have to be written out all the way for the general ledger.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Explain some of the graphical user interfaces (GUIs) and communications messages that occur during the operation of a microwave…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 4. Retrieved from Mark S Merkow, Jim Briethaupt, IT244-Intro to IT Security.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    BIS 303 Week 1 Assignment

    • 472 Words
    • 3 Pages

    If you need to save money on food, turn your eye to breakfast. There are plenty of options that you can make that are quick, will fill you up and that don"™t cost a lot. For example, oatmeal is a great choice. If you are able to save on breakfast and lunch, you may be able to treat yourself to a meal out with friends every now and then.…

    • 472 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hsm 230 Week 5 Checkpoint

    • 266 Words
    • 2 Pages

    How does HIPAA serve to protect patient rights? What areas of the JSBMHA did HIPAA compliance impact? What actions should the JSBMHA director take about the HIPAA violation? Explain your answers in detail.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fin Week 7 Checkpoint

    • 264 Words
    • 2 Pages

    Trade credit is the most popular form of short term financing, figures show that over 40 percent of businesses use this form. Trade is also known as accounts payable. This form of short term financing happens when manufacturers or suppliers provide goods or services upfront to companies with the expectation of getting payment within 30 to 60 days from time of delivery. Usually suppliers may offer discounts if the receiving company makes payment within a specified period of time. This kind of short term financing would be chosen by businesses for many reasons such as the company may not readily have the cash on hand to purchase inventory.…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    A census is the process of acquiring and recording information from the general public to determine population or housing numbers. For the 2010 census, the United States Census Bureau decided to implement a program called Field Data Collection Automation (FDCA). The program was intended to improve the data collection process by using handheld electronic devices. The mobile handhelds were to canvass addresses during the initial stage of the census.The FDCA program was important to the U.S. Census Bureau because it would replace the millions of paper forms and maps that were previously required to complete the census (Laudon&Laudon, 2011, p413). It was also important because it was meant to reduce costs, improve data quality, improve data collection efficiency, and encourage people to participate. Unfortunately, the FDCA program had problems.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sci 275 Week 4

    • 362 Words
    • 1 Page

    The four factors that produce changes in population size includes on a global scale, the change in population is due to the number of births and deaths. However, in the local populations, like in the United States, the number of births, deaths, immigrants, and emigrants will affect the population size.…

    • 362 Words
    • 1 Page
    Good Essays
  • Good Essays

    Bis 220 Week 1

    • 470 Words
    • 2 Pages

    The Telephone Consumer Protection Act of 1991 (TCPA) was established to protect consumers from the increasingly intrusive methods employed by telemarketers. Information technology advances such as auto-dialers, predictive dialers, and automated faxes made it easier to reach large numbers of businesses and households in a relatively short time. These methods were not only highly annoying to consumers, but through the use of these devices, telemarketing companies were also passing some of the cost of marketing onto the consumer. Consumers on the receiving end of numerous calls from various companies throughout the day were spending time that could have been spent in other activities and were rightly frustrated about the loss of their time. In the case of automated faxes, resources such as paper, ink, and even the data connection being used to receive what is essentially junk mail was a cost the consumer had no way to avoid. Fortunately, lawmakers responded to this unethical action of telemarketing companies with the TCPA. Specifically, the law makes it illegal to use auto-dialers and pre-recorded voice messages to make sales calls to emergency phone lines, medical offices, hospital rooms, homes for the elderly, paging services, or cellular phones. It also requires the recipient of pre-recorded telemarketing calls to give prior consent to receive the calls. It also made it illegal to send unsolicited fax messages. The law also gave states their own authority to regulate telemarketing practices. The Federal Communications Commission (FCC) enforces the rules set forth in the TCPA. The FCC was also given authority to issue regulations beyond the TCPA in order to continue to protect consumers from abusive telemarketing practices. This provision shows that Congress recognizes that over time changes in information technology may make the TCPA insufficient to meet the task of consumer protection ("EPIC - Telemarketing and the Telephone Consumer Protection Act (TCPA)").…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Rules: Fair Credit Reporting Act (FCRA) relates to protection of consumer credit information by credit reporting agencies (CRA) and other businesses that handle credit information. FCRA outlines significant responsibilities for CRAs and other covered business entities. A company becomes a covered entity under FCRA when it “procures and uses information when granting credit, furnishes and transmits information by reporting information to CRA or other third parties, or markets credit or insurance product.”[1] FCRA also mentions that, “Given the preponderance of electronically available information and the growth of identity theft, financial institutions should manage the risks associated with obtaining and using consumer reports.” [1]…

    • 608 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Last week was our first week of class in which we discussed several different topics relating to business in the computer field also known as BIS/220. We discussed the ethical challenges surrounding the movie and music industries as they related to the internet, what ways the university of Phoenix deals with plagiarism, collaborating tools that we use in our personal and work life and different concepts of Microsoft Word that we might not have been aware of. Along with our group work, we were also giving a list of different political acts that have effect the technology world and were told to argue the two acts and why or how they added to the change of technology. In this summary I will explain what Team A has summarized about last week from what we discussed with the discussion questions as well as our individual papers about different acts how technology has promoted their change.…

    • 617 Words
    • 3 Pages
    Good Essays
  • Better Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 979 Words
    • 4 Pages
    Better Essays