Verified Document

Information Technology Acts While Information Technology Today Research Paper

Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning establishments and health insurance companies are required to provide their clients with a certain level of privacy assurance. For this reason, certain technological advances have required a revision of legislation to ensure that the privacy of citizens is protected. Two such pieces of legislation include The Family Education Rights And Privacy Act (FERPA) of 1974 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

FERPA

The Family Education Rights and Privacy Act of 1974 was passed to address the right to privacy for students at learning institutions. Under the act,...

Further, such release is subject to permission from students, who also have a right to request that incorrect information be modified. In most other cases, release of information requires written permission (Shiley, 2003).
One of the primary reasons for this law was widespread concern, during the early 1970s, about the potential of the federal government to abuse its power and to implement domestic surveillance. The concern was that governmental information technology has advanced to such a degree that it could be used to identify, observe, and cross-reference "suspicious" persons. A government database, for example, could be used to access student data regarding the direction of study, social or government groups that are identified as potentially harmful to the government and is security. Also, increased media accessibility and technology has brought to light government practices that have been hidden in the past. Hence, the public concern has been raised because of…

Sources used in this document:
References

Gilland, A.T. (2011, Jan). Balancing between two goods: Health Insurance Portability and Accountability Act and ethical compliancy considerations for privacy-sensitive materials in health sciences archival and historical special collections. Journal of Medical Library Association, Vol. 99 No. 1. Retrieved from: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3016646/

Shiley, C.S. (2003, Jun). Putting the Rights into the Family Education Rights and Privacy Act: Enforcement and the Private Right of Action. Retrieved from: http://www.mit.edu/people/cshiley/Thesis/DANCE-DANCE-FERPA.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology: Managerial and Organizational
Words: 8439 Length: 26 Document Type: Term Paper

Another study found that there are many different strategies that are utilized when information technology is developed within the federal government and many of these tend to come not from the top managers but from the management instead (Gupta, Holladay, & Mahoney, 2000). Much of this has to do with the fact that the top managers in the federal government are often political appointees and therefore know somewhat less about

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Technology and Law Enforcement the Field of
Words: 2051 Length: 7 Document Type: Essay

Technology and Law Enforcement The field of law enforcement has been one of the most challenging fields from the historical time yet it is a department that cannot be wished away as long as the society has to remain sane and civilised. The only option is to persistently and consistently update law enforcement and equip it in order to cary out the respective duties and responsibilities that it should in order

Information Technology Acts the Advancement of Information
Words: 1084 Length: 3 Document Type: Essay

Information Technology Acts The advancement of information technology has generally been considered to be a good thing, but there are also problems that have been created by it. Some of these have to do with the lack of privacy, and others have to do with the protection of the most vulnerable members of society. Two acts will be discussed here: the Children's Internet Protection Act of 2000 and the Telephone Consumer

Technology, Terrorism, and Crime Apa . Technology, Terrorism,
Words: 1436 Length: 4 Document Type: Essay

Technology, Terrorism, and Crime (APA). Technology, Terrorism, and Crime One of the most heinous terrorist groups currently operating in the U.S. In called the "Aryan Nations." This group openly states on their website that they have been "Fighting Jewish Takeover for over 35 years." (aryan-nation.org) This group of domestic terrorists post articles on their website with grammatically incorrect titles like "The menace of Multiculturalism," and "Jews that control Hollywood: Meet the filthy

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now