Preview

Information Technology

Good Essays
Open Document
Open Document
765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology
Running head: INFORMATION TECHNOLOGY ACTS

Information Technology Acts
Tawyna Rowan
BIS/220
March 7, 2012
John Fritz Information Technology Acts Some people still enjoy writing checks however checks are a thing of the past. Some people still conduct all of their banking needs inside of a banking center however most banking transactions can be conducted online from the comfort of your living room couch. The advances in information technology have caused regulations such as the Electronic Funds Transfer Act, 1978 to be implemented in an effort to keep your money safe while offering you the convenience of microwaveable banking. With convenience come additional challenges for not only financial institutions but sale driven businesses also to earn revenue. This challenge introduced the need for additional advances in information technology such the Do Not Call Implementation Act, 2003. Electronic Funds Transfer (EFT), 1978 The Electronic Fund Transfer Act was passed by the U.S. Congress in 1978 and signed by President Jimmy Carter, to establish the rights and liabilities of consumers as well as the responsibilities of all participants in electronic funds transfer activities. Electronic funds transfer (EFT) provides an alternative method of paying for goods and services and making a wide range of financial transactions. A few of the most popular EFT services include:
• Automated Teller (ATM)
• Point-of-Sale (POS)
• Debit Cards
• Wire Transfers
The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:
• Write or call the financial institution immediately if possible
• Must be no later than 60 days from the date of erroneous statement
• Give name and account number
• Explain why you believe there is an error, the type, dollar amount and date
• May be



References: Electronic Fund Transfer Act, 1978. (2011). Retrieved from http://en.wikipedia.org/wiki/Electronic_Fund_Transfer_Act   USLegal. (2001-2002). Retrieved from http://definitions.uslegal.com/d/do-not-call-implementation-act/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    Due to the increasing problem of stealing other people’s work and claiming it as your own, the No Electronic Theft (NET) Act was created. The internet has increased the availability of certain documents and had offered little protection to the people creating these works up until the NET Act. The internet has also made making and spending money much easier from the comfort of your home. The Electronic Fund Transfer Act (EFTA) was created to protect those users from having their information or money stolen.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The electronic funds transfer act was put in place in 1978, it is also known as (EFTA). The electronic funds transfer act was enacted to protect both the consumers and the banking institutions when the consumers use electronic technology to manage their finances. Electronic technologies have replaced most paper transactions. This act provides requirements for consumers and banking institutions. The six basic services that are covered under this act are; ATM transactions, direct deposits, pay-by-phone, internet transactions, debit card transactions, and electronic check conversions (“Debt.org”, 2013). The electronic funds transfer act helps protect all those that are involved in technology related banking. Without this act in place, some consumers may have a harder time being ethical about the transactions he or she has done. On the other hand, banking institutes are held to a higher standard, decreasing unethical choices. This act helps lay down an ethical foundation for all parties involved.…

    • 640 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 4224 Words
    • 17 Pages

    6. If you wanted to ensure that your business maintains a desirable return on your investment with technology, what should be one of your main concerns?…

    • 4224 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    agamata chap 13

    • 4084 Words
    • 17 Pages

    3. The responsibility for the detection and prevention of errors, fraud and noncompliance with laws and regulations rests with…

    • 4084 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 351 Words
    • 2 Pages

    The term Information Technology (IT) was coined by Jim Domsic of Michigan in November 1981. Domsic created the term to modernize the outdated phrase "data processing". Information Technology is a general term that describes any technology that helps to produce, manipulate, store, communicate and/or disseminate information. Presumably, when speaking of Information Technology as a whole, it is noted that the use of computers and information are associated. “Information Technology” as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware." IT deals with the use of computers and computer software to convert, store, protect, process, transmit and securely retrieve information.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology 

    • 419 Words
    • 2 Pages

    In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install highspeed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    gdgd

    • 4709 Words
    • 19 Pages

    An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "electronic commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers ' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.…

    • 4709 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Ecommerce Law

    • 1143 Words
    • 5 Pages

    It gives legal recognition of electronic data messages, electronic documents, and electronic signatures. (section 6 to 13)…

    • 1143 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cyber Law

    • 821 Words
    • 4 Pages

    1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .…

    • 821 Words
    • 4 Pages
    Good Essays