StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology Acts Paper - Essay Example

Cite this document
Summary
Information Technology Acts Paper Information Technology Acts Paper Author Author’s Affiliation Date Introduction At the present, we live in an age where information technology plays a significant role in our lives. It provides an excellent support for improving the standard of our lives…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Information Technology Acts Paper
Read Text Preview

Extract of sample "Information Technology Acts Paper"

Information Technology Acts Paper Information Technology Acts Paper Affiliation Introduction At the present, we live in an age where information technology plays a significant role in our lives. It provides an excellent support for improving the standard of our lives. However, the emergence of new technology has also created some of the ethical and security issues. In fact, in this new technology based era these issues have become more and more drastic. This paper presents an analysis of some of the well-known acts which are created and implemented to respond to these issues.

Someone can imagine encountering a wide variety of alternatives when it appears to select a cable TC supplier or some issues regarding the telephone purposes. In this paper I will discuss two popular information technology acts. Basically, this research will cover Telephone Consumer Protection Act (TCPA) of 1991 and Cable Communications Act of 1984. The main objective of this research is to assess potential impact of information technology on ethical issues necessitating the creation of these acts.

Cable Communications Act of 1984 First act that I am going to discuss in this paper is the Cable Communications Act of 1984. This act was established in 1984. This act was developed and implemented as a new law that offered a great deal of support for balancing the resistance between the local government and FCC. Historically, this Act was being presented by the application of a steady struggle between both parties for supremacy in the cable business. In this scenario, this act was supposed to resolve the earlier and current issues of what or who should be capable to exercise the power over local cable processes.

On the other hand, what this act stated was about the implementation of policies for cable businesses to follow (University of Miami School of Medicine, 2005; PUBLIC ACCESS AWARENESS ASSOCIATION, n.d). According to Cable Communications Act of 1984, cable operators and service providers must offer a written policy of personal privacy practices to every cable network subscriber at the time of delivery of services into a service contract as well as at least once a year after that. Hence, it reveals that none of the cable operators were exempt from the customary set forth through The Cable Communications Act.

On the other hand, the ethical management act as well protected cable operators from inequitable rejections of renewals from the diverse franchises. What was exposed by all when the smoke settles was that the act minimized some needless rule that could have extremely well brought regarding the extreme burden on the cable communication system (University of Miami School of Medicine, 2005; PUBLIC ACCESS AWARENESS ASSOCIATION, n.d). In addition, this act has ensured a great deal of safety and security to customers.

This act restricted companies to expose the customer information and take appropriate approval before carrying out such kind of activities. Hence, these initiatives have offered an excellent support for securing customer data (University of Miami School of Medicine, 2005; PUBLIC ACCESS AWARENESS ASSOCIATION, n.d). Telephone Consumer Protection Act (TCPA), 1991 The telephone consumer protection act (TCPA) was introduced in 1991 was based on the fair credit reporting. Additionally, this act encompasses a number of rules implemented for the safety of the customer.

Though, there are many kinds of acts that secure the customers. This ethical act protects the customer to fundamental areas that are of significance. In this scenario, the telephone consumer protection act makes sure that customers are not stressed by telemarketers and have the capability to opt-out (Aydenemma, 2012; FCC, 2012; American Teleservices Association, 2012; Direct Marketing Association, 2012). In addition, this act is aimed at ensuring the security of telephone consumer protection act that was passed in 1991.

Basically, the Federal Communications Commission placed policy to control and execute the TCPA that initiated in 1992. In this scenario, this act needs solicitors to offer their name, the name of the entity or person on whose behalf the particular call is done, as well as an address or phone number at which that entity or person can be reached. Additionally, this act disallows solicitations that utilize a recording or artificial voice. Moreover, this act also bans some calls made via automated telephone systems or a prerecorded or artificial voice to an emergency line like 911.

Furthermore, this act also provides an excellent support for restricting autodialed calls that connect two or more lines of a traditional communication structure of multi-line business. This act also prohibits the unsolicited advertising faxes on the personal phone based system (Aydenemma, 2012; FCC, 2012; American Teleservices Association, 2012; Direct Marketing Association, 2012). Moreover, this act has also established some penalties for violation. In case of violation of this act subscriber can be fined for up-to $1,500 for every violation.

In this scenario, the main objective of this act was to restrict people for making use of the illegal new information technology based tools and application for carrying out illegal activities. This act also provides a great deal of support for stopping telephone technology abuse. This act also supported customer for the potential safety of their personal information and data. Consequently, all participating entities are able to make security supported calls without any problem (Aydenemma, 2012; FCC, 2012; American Teleservices Association, 2012; Direct Marketing Association, 2012).

References American Teleservices Association. (2012). Telephone Consumer Protection Act. Retrieved September 26, 2012, from http://www.ataconnect.org/public/consumers/teleconsumerprotection.php Aydenemma. (2012, March 15). TCPA And The Fair Credit Reporting Act. Retrieved September 25, 2012, from http://www.otherpapers.com/Business/TCPA-Fair-Credit-Reporting-Act/23965.html Direct Marketing Association. (2012). Telephone Consumer Protection Act (TCPA). Retrieved September 27, 2012, from http://www.the-dma.org/guidelines/tcpa.shtml FCC. (2012).

Telephone Consumer Protection Act 47 U.S.C. § 227. Retrieved September 24, 2012, from http://transition.fcc.gov/cgb/policy/TCPA-Rules.pdf PUBLIC ACCESS AWARENESS ASSOCIATION. (n.d). THE CABLE COMMUNICATIONS ACT OF 1984. Retrieved September 27, 2012, from http://www.publicaccess.org/cableact.html University of Miami School of Medicine. (2005, May 11). Cable Communications Policy Act of 1984 (CCPA). Retrieved September 25, 2012, from http://privacy.med.miami.edu/glossary/xd_ccpa.htm

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Acts Paper Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Information Technology Acts Paper Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1457705-information-technology-acts-paper
(Information Technology Acts Paper Essay Example | Topics and Well Written Essays - 750 Words)
Information Technology Acts Paper Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1457705-information-technology-acts-paper.
“Information Technology Acts Paper Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1457705-information-technology-acts-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology Acts Paper

Information Technology Revolution Impact on the Third World Countries

This paper will come up with a proposed research concerning information technology revolution in the third world countries and how it impacts them.... hellip; According to the report people can state that the information technology revolution brings “up to the minute” knowledge.... As the paper declares information technology advancement seems to lack in terms of its progress specifically, in the third world countries.... This essay stresses that the information technology revolution in the third world countries, similar to all revolutions, comes along with it a newer and more vital gap between social groups and nations....
5 Pages (1250 words) Research Paper

Information and Communication Technology

• Use of computers in information technology has become crucial in the modern societies for processing of data and thus save effort and time.... Marketing Table of Contents Introduction 3 Information and Communication Technology (ICT) Policies 4 Promotion of ICT Policies 5 Benefits of the promotion of the ICT policies 7 Implementation of the Government ministries and Institutions 8 Conclusion 10 Works Cited 11 Name of the Student: Name of the Professor: Course Number: Date of the paper: Information and Communication Technology (ICT) Introduction Information and communication are regarded as the integral part of human society....
7 Pages (1750 words) Research Paper

Information Technology and Human Resource

information technology and Human Resource Name Institutional Affiliations information technology and Human Resource The rapid development in technology has made the world become so competitive that companies across the world are trying hard to get over the other by being distinctive in the respective field.... In summary, this research paper will discuss on the impacts of social media such as Facebook, LinkedIn and Twitter on potential career growth, future business systems, personal and professional privacy as well as, personal and business ethics....
4 Pages (1000 words) Research Paper

Should technology be use in classroom

This paper is about new technology that is used in classrooms for studying.... hellip; This research paper is aimed at discussing mainly on the advantages of using technology in the classroom, as it is the order of the day.... The paper outlines all pros and cons of using modern technologies at schools.... The world today is growing towards technology; everything in life is becoming very much involved with the technology in the recent world....
6 Pages (1500 words) Research Paper

Federal Acts Affecting MIS

This paper discusses two popular information technology acts: one is Telephone Consumer Protection Act (TCPA), which was introduced in 1991 and other is the Cable Communications Policy Act of 1984.... In this scenario, this act outlined the rules, FEDERAL ACTS AFFECTING MIS Federal Acts Affecting MIS Affiliation This paper discusses two popular information technology acts: one is Telephone Consumer Protection Act (TCPA), which was introduced in 1991 and other is the Cable Communications Policy Act of 1984....
1 Pages (250 words) Research Paper

Meaningful Use of Health Information Technology

The author of this paper explores that health information technology is the most advanced database for maintaining patients, doctors, and all concerned health-related departments throughout the U.... hellip; By the term meaningful use of health information technology, it implies that following the standard defined by the Centres of Medicare and Medicaid Services.... This system had a kick start in 2004, when President Health information technology Plan came into existence....
5 Pages (1250 words) Research Paper

Emerging Information Security Threat Advisory White Paper

 This paper "Emerging Information Security Threat Advisory White paper" focuses on the challenge that financial institutions face while securing their private data from hackers.... The paper focuses on social engineering and how the institutions can secure their employees and data analysts.... hellip;   Improper destruction of data: Financial institutions must be worry of any information, catalogs, papers and files that are to be discarded or destroyed....
6 Pages (1500 words) Term Paper

Information Security Concept Map

… The paper "Information Security Concept Map" is a great example of a term paper on information technology.... The paper "Information Security Concept Map" is a great example of a term paper on information technology.... The paper is meant to help information security managers organizations understand the concept of information security with reference to its importance, responsibilities, and threats involved, control measures, and how to plan and implement security policies....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us