Saturday, June 8, 2019

Information Technology Act Paper Essay Example for Free

randomness Technology Act Paper EssayInformation Technology Acts Paper Shawanda Donelson BIS/220 March 31, 2012 Jacquelyn Jones Information Technology Acts Paper In the 1990s the lucre became popular, which children then had unsupervised access. Children were exposed to porn and other defamatory materials. Congress tried to stop it and put it into law, but each direction it went was determined as being unconstitutional. To an extent, engineering science finally prevailed. Congress should not make a law penalizing distributors, but they should pass a law that would affect those who receive Federal funding. Pornography has been around since the 1970s, which was controlled from minors. On December 15, 2000, President schnoz Clinton signed into law the Childrens Internet Protection Act. This act puts restrictions on receiving federals funds. They must use technology and policies that filters or blocks certain material from being Internet accessible. These young children are bei ng targeted because they do not fully understand the dangers of using the internet inappropriately. Therefore, if their parents are not cropd about the dangers of Internet predators it makes it harder to educate their children.The Federal Trade Commission gave Congress a report in March 1998, showing that the childrens personal information did not have copious protection from hackers and predators. On April 21, 2000, the Childrens Online Privacy Protection Act (COPPA) was put into law. The act applied to online services and commercial websites aimed for the attention of children. COPPA law attacks online communication which is sexually explicit that lacks artistic, scientific, serious literary, or political value (Child Online Protection Act and Child Online Privacy Protection Act, 2002).Conclusion In conclusion, the main advancement of technology was the Internet of both acts, one prevented others from collecting information from children, and the other prevented others from send ing information to the children. The type of information that was disseminated was controlled by the development of the software technology. Both laws shield were major, not from collecting or sending information but from people who they are trying to protect. References Childrens Internet Protection Act (CIPA). 2003). In Websters recent World Computer Dictionary. Retrieved from http//www. credoreference. com. ezproxy. apollolibrary. com/entry/webstercom/children_s_internet_protection_act_cipaChild Online Protection Act and Child Online Privacy Protection Act. (2002).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.