Verified Document

Information Technology Acts While Information Technology Today Research Paper

Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning establishments and health insurance companies are required to provide their clients with a certain level of privacy assurance. For this reason, certain technological advances have required a revision of legislation to ensure that the privacy of citizens is protected. Two such pieces of legislation include The Family Education Rights And Privacy Act (FERPA) of 1974 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

FERPA

The Family Education Rights and Privacy Act of 1974 was passed to address the right to privacy for students at learning institutions. Under the act,...

Parts of this document are hidden

View Full Document
svg-one

Further, such release is subject to permission from students, who also have a right to request that incorrect information be modified. In most other cases, release of information requires written permission (Shiley, 2003).
One of the primary reasons for this law was widespread concern, during the early 1970s, about the potential of the federal government to abuse its power and to implement domestic surveillance. The concern was that governmental information technology has advanced to such a degree that it could be used to identify, observe, and cross-reference "suspicious" persons. A government database, for example, could be used to access student data regarding the direction of study, social or government groups that are identified as potentially harmful to the government and is security. Also, increased media accessibility and technology has brought to light government practices that have been hidden in the past. Hence, the public concern has been raised because of…

Sources used in this document:
References

Gilland, A.T. (2011, Jan). Balancing between two goods: Health Insurance Portability and Accountability Act and ethical compliancy considerations for privacy-sensitive materials in health sciences archival and historical special collections. Journal of Medical Library Association, Vol. 99 No. 1. Retrieved from: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3016646/

Shiley, C.S. (2003, Jun). Putting the Rights into the Family Education Rights and Privacy Act: Enforcement and the Private Right of Action. Retrieved from: http://www.mit.edu/people/cshiley/Thesis/DANCE-DANCE-FERPA.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Assurance
Words: 2565 Length: 10 Document Type: Term Paper

Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both

Technology Issue in Information Assurance
Words: 3012 Length: 10 Document Type: Term Paper

S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a

Role of Information Assurance on
Words: 4099 Length: 16 Document Type: Research Paper

The various e-businesses therefore depend upon various ISP's as well as the internet infrastructure in order to achieve an improved level of convenience as well as unparalleled availability. The merits associated with e-commerce has therefore resulted to rapid adoption of the concept with a heavy reliance on various encryption techniques such as SLL as well as username and password based authentication techniques that rely on authentication files contained within

Looking at the Federal Plan for Cyber Security and Information Assurance...
Words: 2942 Length: 9 Document Type: Research Paper

Federal Plans NICE Plan Development and Research Challenge Future Plan This paper discusses what is referred to as the Federal Plan is for Cyber Security and Information Assurance (CSIA- R&D) Research and Development. Details of the federal government's plan will be discussed as well as what is expected and can be done about cyber security in the long-term. In this federal plan, the terms 'information assurance' and 'cyber security' refer to measures put in place to

Information Security and Employees
Words: 1440 Length: 4 Document Type: Term Paper

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Assurance Program Why/How to Create an Information
Words: 6861 Length: 25 Document Type: Case Study

Assurance Program Why/How to create an Information Assurance Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is to be made. How the information is going to be organized? How will it be possible to ensure that the information released represents the judgment of the management of the company and gives

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now