Bio 220 Entire Course (Ash)

Submitted by: Submitted by

Views: 10

Words: 1079

Pages: 5

Category: Other Topics

Date Submitted: 09/07/2016 01:52 AM

Report This Essay

BIO 220 Entire Course (Ash)

Purchase here

Product Description

BIS 220 Week 1 Individual Information Technology Acts Paper

Select two of the following acts to research:

• Do Not Call Implementation Act, 2003

• Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003

• Federal Information Security Management Act (FISMA), 2002

• Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006

• Children’s Internet Protection Act, 2000

• Financial Services Modernization Act, 1999

• Children’s Online Privacy Protection Act (COPPA), 1998

• No Electronic Theft (NET) Act, 1997

• Health Insurance Portability and Accountability Act (HIPAA), 1996

• Telephone Consumer Protection Act (TCPA), 1991

• Video Privacy Protection Act, 1988

• Computer Fraud and Abuse Act, 1986

• Electronic Communications Privacy Act, 1986

• The Cable Communications Policy Act, 1984

• Electronic Funds Transfer Act, 1978

• Family Educational Rights and Privacy Act, 1974

• Fair Credit Reporting Act, 1970

Prepare a 350- to 1,050-word paper that answers the following question:

• What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?

BIS 220 Week 2 Individual Information Systems Proposal

Scenario: Imagine that you and a business partner are considering starting a small, brick & mortar, nostalgic record store. Your friend does not have much experience with information systems or technology, and needs a basic understanding of the different types of information systems available to businesses.

Write a proposal of the types of information systems that would work well for your chosen business, and their benefits and drawbacks. The summary must outline five types of information systems. See Table 2.2 in Introduction to Information...