Information Technology Acts
What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?
One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives. This is when the laws must be updated to reflect these advancements. In some cases, this involves taking existing regulations and addressing specific issues. While at other times, this requires implementing new guidelines that will address specific moral and ethical issues. Two such regulations are: the Fair Credit Reporting Act of 1970 and the Do Not Call Implementation Act of 2003.
Fair Credit Reporting Act of 1970
The Fair Credit Reporting Act of 1970 was implemented to address the large amounts of information that were being collected, stored and evaluated about consumers....
This was part of an effort to provide lenders, employers and other organizations with a history of the person (based on their ability to pay their bills / residential history / employment related issues). However, the fact that large amounts of personal data were collected raised concerns about possible civil rights abuses. As a result, the federal government enacted the Fair Credit Reporting Act of 1970. ("The Fair Credit Reporting Act," 2004)
This required that certain provisions must be followed at all times for various entities such as: credit bureaus, consumer specialty reporting agencies and information fund raisers. Under the law, credit bureaus are required to provide consumers with: all information about them inside the agency's files, take steps to verify accuracy and they cannot hold onto negative information for more than 10 years. In the case of consumer specialty reporting agencies, they are required to disclose to the individual all information they have about them to include: medical records, check writing history, work experience, residency…
Information Technology Acts The advancement of information technology has generally been considered to be a good thing, but there are also problems that have been created by it. Some of these have to do with the lack of privacy, and others have to do with the protection of the most vulnerable members of society. Two acts will be discussed here: the Children's Internet Protection Act of 2000 and the Telephone Consumer
Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning
Another study found that there are many different strategies that are utilized when information technology is developed within the federal government and many of these tend to come not from the top managers but from the management instead (Gupta, Holladay, & Mahoney, 2000). Much of this has to do with the fact that the top managers in the federal government are often political appointees and therefore know somewhat less about
" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used
Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform Define and build out a portal development plan that encompasses all shared processes
End Notes 1) Given the recent tardy but well-meaning responses by the federal, state and local officials in the Gulf Coast, it can be assumed that the nation remains relatively unprepared for a terrorist attack of September 11-proportions. The U.S. is struggling to negotiate a nuclear arms treaty with Iran and North Korea (the latter having recently agreed to forego additional nuclear weapons testing in exchange for light-water nuclear reactors, a