2.
As an organization implements innovative technology
there are legal and ethical issues that could arise at any
time. Intellectual property, privacy, copyright, and fair
use are some legal and ethical issues that organizations
could encounter.
INTRODUCTION
4.
The Privacy Act of 1974, guards records that are
accessible by personal identifiers such as a name,
social security number, or other identifying number
or symbol. An individual is allowed to access and to
request modification of their records if necessary.
The Privacy Act excludes disclosure of these records
without the written approval of the individual to
whom the records pertain unless one of the twelve
disclosure exemptions enumerated in the Act
applies.
PRIVACY ACT OF 1974
5.
Title 15 Section 94 of the Federal Trade Commission
(FTC) Act requires financial institutions to take
measures to protect consumer information.
These businesses bear liability if they fail to shield
their clients' privacy from any unidentified third
party.
The FTC enforces the FTC Act and takes companies
that violate the terms of the act to court.
CONSUMER PRIVACY
ACT
6.
The Freedom of Information Act (FOIA) is a law that
allows public access to U.S. government records.
Upon written request, agencies of the United States
government are obligated to reveal those records, unless
they can be lawfully withheld from disclosure.
If this act is violated the agencies that failed to adhere will
be taken to court.
THE FREEDOM OF
INFORMATION ACT
7.
An acceptable use policy (AUP) is a written agreement all
parties that share a network of computers promise to
follow for the common good of the organization.
An AUP describes the anticipated uses of the network
including improper uses and the penalties for non-
compliance.
A substantial Acceptable Use Policy covers necessities for
network etiquette, mention limits on the use of network
resources, and clearly indicate of the level of privacy a
member on the network should expect.
ACCEPTABLE USE
POLICY
8.
The Children’s Internet Protection Act (CIPA) was endorsed
by Congress in 2000 to address concerns regarding
children’s access to obscene or harmful content over the
Internet.
CIPA forces schools or libraries that receive discounts for
internet access to adhere to specific requirements.
In order to be CIPA compliant, institutions are required to
install a technology protection measure on all computers in
the library with access to the Internet.
CHILDREN’S INTERNET
PROTECTION ACT
9.
When implementing new technology it is important as an
organization that all legal and ethical issues are considered.
These issues should be evaluated individually to verify that
the new technology aligns with the guidelines of policies and
procedures that are currently in place.
CONCLUSION
10.
Electronic Privacy Information Center. The privacy act of 1974. Retrieved May 18, 2014,
from http://epic.org/privacy/1974act/
Federal Communications Commission. (2014). FOIA. Retrieved May 18, 2014, from
http://www.fcc.gov/foia
Small Business Administration. (2014). Privacy Law. Retrieved May 19, 2014, from
http://www.sba.gov/content/privacy-law
Techopedia. (2014). Acceptable use policy. Retrieved May 18, 2014, from
http://www.techopedia.com/definition/2471/acceptable-use-policy-aup
Visser, M. (2014). Revisiting the children’s internet protection act: 10 years later
Retrieved May 18, 2014, from http://www.districtdispatch.org/2014/01/
revisiting-childrens-internet-protection-act-10-years-later/
REFERENCES