Saturday, September 7, 2019

Information Technology Act Paper Essay Example for Free

Information Technology Act Paper Essay Information Technology Acts Paper Shawanda Donelson BIS/220 March 31, 2012 Jacquelyn Jones Information Technology Acts Paper In the 1990s the Internet became popular, which children then had unsupervised access. Children were exposed to porn and other harmful materials. Congress tried to stop it and put it into law, but each direction it went was determined as being unconstitutional. To an extent, technology finally prevailed. Congress should not pass a law penalizing distributors, but they should pass a law that would affect those who receive Federal funding. Pornography has been around since the 1970s, which was controlled from minors. On December 15, 2000, President Bill Clinton signed into law the Children’s Internet Protection Act. This act puts restrictions on receiving federals funds. They must use technology and policies that filters or blocks certain material from being Internet accessible. These young children are being targeted because they do not fully understand the dangers of using the internet inappropriately. Therefore, if their parents are not educated about the dangers of Internet predators it makes it harder to educate their children. The Federal Trade Commission gave Congress a report in March 1998, showing that the children’s personal information did not have enough protection from hackers and predators. On April 21, 2000, the Children’s Online Privacy Protection Act (COPPA) was put into law. The act applied to online services and commercial websites aimed for the attention of children. COPPA law attacks online communication which is sexually explicit that lacks artistic, scientific, serious literary, or political value (Child Online Protection Act and Child Online Privacy Protection Act, 2002). Conclusion In conclusion, the main advancement of technology was the Internet of both acts, one prevented others from collecting information from children, and the other prevented others from sending information to the children. The type of information that was disseminated was controlled by the development of the software technology. Both laws resistance were major, not from collecting or sending information but from people who they are trying to protect. References Children’s Internet Protection Act (CIPA). 2003). In Websters New Worldâ„ ¢ Computer Dictionary. Retrieved from http://www. credoreference. com. ezproxy. apollolibrary. com/entry/webstercom/children_s_internet_protection_act_cipaChild Online Protection Act and Child Online Privacy Protection Act. (2002).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.