- All Free Papers and Essays for All Students

Information Technology Acts Paper

Autor:   •  May 9, 2014  •  Essay  •  479 Words (2 Pages)  •  1,246 Views

Page 1 of 2

Information Technology Acts Paper

The world is full of information and technology. As technology advances an issue with ethical boundaries of privacy has grown more and more in the last century. Throughout history, the advantages of technology have shaped a vast impression, both negative and positive, on our culture. In studying more present history, technical developments have designed a new general need to progress and initiate The Telephone Consumer Protection Act of 1991and The Fair Credit Reporting Act of 1970.

The Telephone Consumer Protection Act of 1991 was formed because of the vast amount of consumer complaints of continuous, disturbing telemarketing calls to people’s homes. Families would be home relaxing, enjoying each other’s company and the calls from telemarketers would never end. The telemarketing companies were obtaining information from computer made lists that were from subscribers of telephone services. This was an attempt to sell numerous amounts of items or promotions, deals. The increase of frustrated consumers voiced their concern for privacy. The rights and privacy of consumers were protected under this act. It granted the consumer to have an option to request that they be put on a “Do Not Call” list. Phone companies and telemarketers are to obey there request, if they do not a fine is set into place of five hundred dollars, which is paid to the consumer (“Consumer Privacy,” n.d.).

The Fair Credit Reporting Act of 1970 was a time when the information of private consumers, was reported dishonestly and wrongly to credit bureaus. The improvements such as the use of evidence done by computers allowed them to create profiles and lists that caused consumers to recruit complaints of confidentiality and there rights that were violated. The act was intended to screen the collection, distribution, and the usage of consumer data provided by the computer made lists which protects


Download as:   txt (3 Kb)   pdf (59.1 Kb)   docx (10.7 Kb)  
Continue for 1 more page »