Tuesday, April 16, 2019

Information Technology Act Paper Essay Example for Free

Information Technology make for theme EssayInformation Technology Acts Paper Shawanda Donelson BIS/220 March 31, 2012 Jacquelyn Jones Information Technology Acts Paper In the mid-nineties the Internet became popular, which children then had unsupervised access. Children were exposed to porn and other harmful existents. carnal knowledge tried to bar it and put it into law, but each direction it went was determined as being unconstitutional. To an extent, technology finally prevailed. Congress should non pass a law penalizing distributors, but they should pass a law that would affect those who stimulate Federal funding. Pornography has been around since the 1970s, which was controlled from minors. On December 15, 2000, President Bill Clinton signed into law the Childrens Internet defense Act. This procedure puts restrictions on receiving federals funds. They must use technology and policies that filters or blocks certain material from being Internet accessible. These young children are being targeted because they do not fully understand the dangers of apply the internet inappropriately. Therefore, if their parents are not educated about the dangers of Internet predators it makes it harder to educate their children.The Federal Trade bang gave Congress a report in March 1998, showing that the childrens personal education did not have enough protection from hackers and predators. On April 21, 2000, the Childrens Online Privacy Protection Act (COPPA) was put into law. The act applied to online services and commercial websites aimed for the attention of children. COPPA law attacks online communication which is sexually explicit that lacks artistic, scientific, serious literary, or political value (Child Online Protection Act and Child Online Privacy Protection Act, 2002).Conclusion In conclusion, the principal(prenominal) advancement of technology was the Internet of both acts, one prevented others from collecting information from children, and the ot her prevented others from sending information to the children. The type of information that was disseminated was controlled by the development of the software technology. Both laws resistance were major, not from collecting or sending information but from people who they are trying to protect. References Childrens Internet Protection Act (CIPA). 2003). In Websters New World Computer Dictionary. Retrieved from http//www. credoreference. com. ezproxy. apollolibrary. com/entry/webstercom/children_s_internet_protection_act_cipaChild Online Protection Act and Child Online Privacy Protection Act. (2002).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.