Free Sample: Information Technology paper example for writing essay

Information Technology - Essay Example

The registry was created to limit calls made by telemarketers to consumers’ homes. Telemarketers are individuals hired by companies to call consumers’ attempting to sell the company’s products or services. Majority of the time, these calls would be made during times when a consumer would normally be home. If telemarketing companies did not follow the guldens set forth by the Federal Trade Commission (FTC) they would have to pay fines for the penalty of not following the law, and contacting consumers that are on the Do Not Call Registry.

The reason for this law as to stop telemarketing companies from invading consumers’ rights to their privacy. According to “Do Not Call Implementation Act Law & Legal Definition” (2001 2013), “The bill was sponsored by Representatives Billy Taught and John Dingle and signed into law by President George W. Bush on March 11, 2003. ” (Para. 1). The advances in information technology that resulted in ethical issues to arise, which required the creation of The Do Not Call Implementation Act of 2003, included access to certain demographic information on consumers.

This information was used as dads for companies who utilized a call center to promote their products or services they provide. As a result of changes in information technological processes, congress was forced to provide protection for consumers and restrain telemarketing companies against calls that were determined to be harassing. This act abolished automated telemarketing programs that left pre-recorded messages on consumers’ answering machines. This act has been vital to the privacy of families and detrimental for companies.

As a result consumers are happy and companies have ad to create new methods to sell their products or services. The second act which is the Children’s Internet Protection Act, 2000 was to address issues raised about children’s access to pornography or explicit content over the internet. This act required schools and libraries to create restrictions over specific subject matter. Schools that followed these guidelines also must Include monitoring of all online activities conducted by children. However, administering guidelines and restrictions was not sufficient.

In 2011 the Federal Communications Commission Issued further audience by Implementing further details. The details Included that children must be provided an explanation of the rules when on the Internet and educated on why such rules are In place. In addition, children must be taught what appropriate online behavior Is, and taught cyber-threat awareness and responses when encountered with Inappropriate material. “Students will always have some sort of adversarial relationship with anyone that puts up a fence between what they want and what they in the process will help” (Anderson, 2010).

The advances made in internet being strutted throughout schools and libraries as a tool for education greatly expanded rapidly which necessitated the creation of this act. The internet became an infinite domain of tools that could be used in the classroom setting. It is also, more cost efficient than supplying the educational information through physical textbooks. However, the word ‘infinite’ is what needs to be monitored closely because the internet has its pros and cons. While educational information was readily available at a moment’s notice, without restrictions in place, pornography or explicit content may be accessed as well.