Preview

Information Tech Acts Paper

Good Essays
Open Document
Open Document
597 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Tech Acts Paper
Information Technology Acts Paper

Information Technology Acts Paper
Fair Credit Reporting Act, 1970
Congress enacted the Fair Credit Reporting Act (FCRA or the Act) in 1970[1] to define the standards of practice for credit reporting agencies and the rights of people who are subjects of credit reports. (Maurer V. G., 1997). Before this people had no means to verify information which was reported to creditors, insurance companies or anyone who needed to check a person’s credit report. Mistake in credit reporting were handled at the court level.
Throughout the years following 1970 the Fair Credit Reporting Act has been revised numerous times. With time comes change, change in technology which makes it much easier for people with low morals to take advantage of someone. Identities are stolen much easier using technology. The advancement in technology made it necessary to create the Fair Credit Reporting Act. Information is readily available to almost anyone with computer access. This makes it easier to commit crimes, crimes such identity theft. With access to a person’s credit report, thieves can assume another person identity with ease. Advances in technology can be a double edged sword. It makes it easier to track and enter data but it also makes it easier for the data to be entered incorrectly, in turn the incorrect data is being reported.
The Act has made it possible for consumers to be proactive in the information available in their credit report. With the ability to access ones credit report, one can monitor what is being report to anyone who requests it. We have the ability to identify and correct errors as well as monitoring any unauthorized access as well as activity.

Computer Fraud and Abuse Act, 1986
In response to increasing computer use in the United States, Congress enacted the Computer Fraud and Abuse Act (CFAA) in 1984 (Booms, 2011). This Act covers a broad area of computer crimes. One in particular is, crimes of an employee against a



References: Booms, T. E. (2011). Hacking into Federal Court: Employee "Authorization" Under the Computer Fraud and Abuse Act. Vanderbilt Journal Of Entertainment & Technology Law, 13(3), 543-575. Maurer, V. G., & Thomas, R. E. (1997). Getting credit where credit is due: Proposed changes in the Fair Credit Reporting Act. American Business Law Journal, 34(4), 607.

You May Also Find These Documents Helpful

  • Best Essays

    Sarbanes Oxley Act

    • 3132 Words
    • 13 Pages

    Financial reporting has been dissected over and over again by legislation. The U.S. Securities and Exchange Commission (SEC) hold the key to providing protection and integrity when companies are submitting their financial statements. Although their mission is to provide order and efficiency for financial markets, insidious plans are still developed by companies which ultimately result in turmoil to the economy. To provide a safeguard to investors, the Sarbanes-Oxley Act (SOX) was passed by congress in 2002, which was constructed because of fraudulent acts of well-known companies such as Enron. Before the SOX was inaugurated, two sets of accounting rules were used as guides for CPA firms.…

    • 3132 Words
    • 13 Pages
    Best Essays
  • Good Essays

    An employee that violates restrictions or exceeds authorized use of a computers access, may be held criminally responsible and charged. However, “damages” according to the CFAA is defined as “impairment to the integrity or availability of data, program, system or information” (Leagle. 2008. Sec.1,par.3). In order for damages to be filed as a civil suit, Nichols would have had to erase or dispose of, or infect the files on the computer, in which he did not. Furthermore, Wong failed to specify an exact amount with detailed information regarding the loss he incurred through Nichols’ actions. However, Wong can file an amended claim for loss (Leagle. 2008).…

    • 878 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bis 220 Week 1 Checkpoint

    • 603 Words
    • 3 Pages

    Next, is the Fair Credit Reporting Act of 1970, which was originally passes in 1970 and is enforced by the U.S. Federal Trade Commission and private litigants. The act was passed "to ensure fairness, accuracy and privacy of the personal information contained in the…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Mullinex, L. S. (2012, January). Confusion over the Telephone Consumer Protection Act. Social science research network, 34(20), 9.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Sarbanes-Oxley Act was passed in 2002 by Congress after a series of scandals involving companies such as Enron, WorldCom, and Tyco. This was passed because of shady transactions and misrepresented financial data which caused shareholders to lose millions of dollars and their trust in investing in public companies. It was passed to create new rules of accountability and accuracy for public companies.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In society today it has become increasingly necessary to effectively use technologically advanced Information systems and software applications to run an organization. In our technologically advanced and dynamic society, organizations are being pushed to use and operate updated and advanced information systems and software applications to store information, process data and effectively manage day to day operations. In this paper the subject discussed will be how a CIS (computer information systems) can help an organization, what they are, and an example of a CIS and its uses in a retail environment.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Often when governments pass laws and acts, it is to serve better the people within their country or jurisdiction at that moment as well as the foreseeable future. However with the quickly changing technology of today it is not always possible to pass laws that last very long when it aimed at controlling or monitoring certain technology. In the last few decades the United States Government passed two laws aimed at telemarketers. The first Act was passed in 1991 and is called the Telephone Consumer Protection Act (TCPA) and the second is the Do Not Call Implementation Act of 2003.…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Chances are you have probably come across HIPPA before while in a doctor’s office in the past. HIPPA is the acronym for Health Insurance Portability and Accountability Act. This Act was passed by Congress in 1996. As far as one can remember, medical files containing all medical and personal information were kept in locked drawers or file cabinets which were for authorized personnel’s only before HIPPA was passed but that was not enough to guarantee the protection of patient information. It also protects the people who have changed job or lost their job to reinstate their health coverage without any complications. Although HIPPA was proposed to become a law in 1996, it did not officially become a law until 2001. HIPAA opposes unfair guidelines of health insurance carries. HIPAA has put into place strict criteria for keeping medical records of patients, including being able to transfer patient information using electronic devices. These devices also assist in managing and keeping sensitive patient information safe. There were many hoops to jump through, however, it was eventually decided and was released to the general public.…

    • 541 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Credit Score Essay

    • 343 Words
    • 2 Pages

    IV Recently with the newfound importance of a persons credit score, there have been issues with people falsely obtaining lines of credit using other peoples information…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Privacy Law Affect

    • 309 Words
    • 2 Pages

    Privacy issue occurs when employers enforce certain rules and procedures in the workplace that violate an employee’s freedom to do as they please.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Children are our society’s most valuable and fragile resources. It is our responsibility as parents, adults, and caregivers to provide our children with as many safeguards to protect them from physical and virtual dangers. Children are spending more and more time on the internet and without the proper protection and supervision they can be exposed to indecent or harmful material or predators that seek to harm them. “What children are encountering on the Internet, particularly in terms of indecent or otherwise unsuitable material or contacts with strangers who intend to do them harm, is an issue of major concern.” (Smith, 2001). The Children’s Internet Protection Act (CIPA) of 2000 and the Children’s Online Privacy Protection Act (COPPA) of 1998 were put in place as an attempt to protect our children from the harm that could befall them on the internet from harmful materials and predators that target children.…

    • 794 Words
    • 4 Pages
    Good Essays