Preview

Regulating Technology

Good Essays
Open Document
Open Document
840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Regulating Technology
Regulating Technology

BIS/220
June 26, 2012
Paul Sam

Regulating Technology

Since the 1970’s, information technology has completely changed the world. Technology is an ever evolving machine whose possibilities are endless. This generation has seen more technological advances than any other generation in history. By having the ability to access and relay information so quickly, computers and other technological devices have proven to be both a blessing and a curse. Users have the ability to compile, analyze, store, retrieve and utilize information to make business processes more efficient; however, if compromised by unauthorized individuals for malevolent purposes, there can be a multitude of negative consequences. The Computer Fraud and Abuse Act, 1986 (CFAA) was designed to prevent such instances by deeming it a Federal offense to knowingly access a protected computer without authorization or exceeding one’s authorized access and as a result, causes damage. The Telephone consumer Protection Ac, 1991 (TCPA) is another Federal legislative action that governs the practices of telemarketer. The act was created to ensure a balance between protection of consumer rights and permitting companies to effectively utilize telemarketing. As a result of a myriad of technological tools, ranging from cell phones and laptops to government protected software, the U.S. Government recognized the need to create legislation that would facilitate the use of such technology to enhance our society by maintaining a secure structure for all parties.

Potential vulnerability According to Encyclopedia.com (2002), one must first study the state of the computer industry prior to 1986, when the act was created.“In 1981 IBM Corporation introduced its personal computer—the IBM-PC. By 1986, barely five years after the IBM-PC had been introduced, personal computers were being used for mainstream business purposes, and the computing power that had once been available to large



References: Computer sciences. (2002). In Encyclopedia.com. Retrieved from http://www.encyclopedia.com/topic/Computer_Fraud_and_Abuse_Act_of_1986.aspx#1-1G2:3401200032-full Kim, G. (2009, July 30). Wireless vs. landline a cultural question. Chicago Tribune. Retrieved from http://articles.chicagotribune.com/2009-07-30/news/0907290726_1_landline-cell-phone-wireless-only

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Have you ever been sitting at home relaxing when the phone rings and it is a telemarketer on the other line trying to sell you something? You didn’t reach out to the company on the other line prompting this intrusion. Most of the time, you don’t even want the product they are selling. This is an issue that has plagued millions of people across the United States since the mid-to-late eighties when businesses started using the telephone in order to market and sell their products. Two Acts in particular have been passed in order to help battle telemarketers and maintain residencies’ privacy when it comes to the telephone.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    James Naismith does the name mean anything? Well it should, because of Naismith we have the game basketball. Naismith was born in Almont, Ontario, and was educated at McGill University and Presbyterian College in Montreal. Naismith was the physical education teacher at McGill University from 1887 to 1890 and at Springfield College in Springfield, Massachusetts 1890 to 1895 (Bellis). It wasn’t until 1890 that Naismith was given the job to create a new game by Dr. Luther Halsey Gulick, the director of the physical education department (McCuaig).…

    • 694 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Government regulates the library in a positive way by enforcing the no gun or weapons law, I don't think there is anything negative about the government regulating tha public libraries.…

    • 197 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Regulation

    • 596 Words
    • 3 Pages

    State the administrative agency which controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you or the business in which you are working? If so, how? Submit a copy of the proposed regulation along with your responses to these five questions. The proposed regulation can be submitted as either a separate Word document (.doc) or Adobe file (.pdf). This means you will submit two attachments to the Week 2 Dropbox: (a) a Word document with the questions and your answers and (b) a copy of the proposed regulation you used for this assignment. (10 points)…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There were many advances in information technology that resulted in new ethical issues necessitating the creation of certain acts that the government had to implement. The two that will be discussed in this paper are the PATRIOT Act of 2001, and the Fair Credit Reporting Act of 1970. Both of these acts were deemed necessary due to increasing terrorist threats for the PATRIOT Act, and for fairness in obtaining credit for the Fair Credit Reporting Act.…

    • 738 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Has there ever been a time when dinner is just about to start and in the middle of saying prayer the phone rings? Dad gets up to answer the phone and on the other end is a telemarketer. The telemarketer is trying to sell something and dad isn’t interested; its dinner time he says, or maybe it is some voice recording selling something. It has happened to just about everyone. Because there have been advances in information technology; the result has been the creation of Acts of Congress to address the ethical issues which could violate our right to privacy. In this essay two Acts will be discussed: The Telephone Consumer Protection Act of 1991 and The Do Not Call Implementation Act of 2003. Both acts have to deal with our rights to privacy.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For many years the Congress or Federal Government had to step into help and protect consumers by creating lawful Acts. Some of these acts are: the Family Educational Rights and Privacy Act (1974), Fair Credit Reporting Act (1970), Computer Fraud and Abuse Act, (1986), The Telephone Consumer Protection Act (1991), and Do not Call Implementation Act (2003). Presently the Federal Government has numerous acts that authorize the government to implement consumer protection; however, this paper will address only two of them. We will discuss the Telephone Consumer Protection Act (TCPA) of 1991 and the Do not Call Implementation Act of 2003.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    American Revolution Essay

    • 812 Words
    • 4 Pages

    The American Revolution was and still is a staple in american history, as it is taught in schools across the nation.That being said, what brought the men and women of those times to the point of revolution is a vital turning point in history. This revolution was initiated by the undesirable laws that Britain forced onto the colonies which brought an uprising of frustration.…

    • 812 Words
    • 4 Pages
    Good Essays