Analyze how coppa and cipa are similar and different

Assignment Help Computer Network Security
Reference no: EM131143896

Computer Ethics Paper

Assignment: COPA and CIPA

The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.

Write a three to five page paper in which you:

1. Describe the main compliancy requirements and the protected information for both COPPA and CIPA.
2. Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts.
3. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
4. Speculate on why COPPA and CIPA define protection for different ages; COPPA defines a child as being under the age of 13 and CIPA defines a minor as being under the age of 17.
5. Identify the main opposition to COPPA and CIPA based on research and speculate on whether they will be changed in the future based on the opposition.
6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

o Explain the concept of privacy and its legal protections.
o Describe legal compliance laws addressing public and private institutions.
o Use technology and information resources to research legal issues in information security.
o Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM131143896

Questions Cloud

Determine the shearing stress at points a and b : A 750-N.m torque is applied to a hollow shaft having the cross section shown and a uniform 6-mm wall thickness. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Determine the cost of goods available for sale : Determine the cost of goods available for sale. - Determine the ending inventory and- Determine the cost of goods sold under each of the assumed cost flow methods.
Compute the first four natural frequencies : Compute the first four natural frequencies as accurately as possible and compare them to both the analytical values and the measured values.
Payton prepares a multiple step income statement : In 2010, Walter Payton Company had net sales of $900,000 and cost of goods sold of $540,000. Operating expenses were $230,000, and interest expense was $11,000. Payton prepares a multiple-step income statement.
Analyze how coppa and cipa are similar and different : Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
Find the first seven natural frequencies and mode shapes : Find the first seven natural frequencies and mode shapes - Removing the center diagonal members, find the first seven natural frequencies and mode shapes again.
Prepare separate correcting entries for each error : Prepare separate correcting entries for each error, assuming that the incorrect entry is not reversed. (Omit explanations.)
The change in price the bond will experience in dollars : A 8.30 percent coupon bond with 13 years left to maturity is priced to offer a 9.0 percent yield to maturity.- What is the change in price the bond will experience in dollars?
Calculate the baseline performance for delivery time : Prepare an A3 for the executive. As a guide, ensure that you consider the following elements in your A3: Define the problem statement and goal statement Calculate the baseline performance for Delivery Time

Reviews

Write a Review

Computer Network Security Questions & Answers

  Distance vector routing with link state routing

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

  E-mail that promotes product or service

is unsolicited e-mail that promotes product or service, or they be part of hoax: Infare wireless networks that pretend to offer trustworthy WI-FI connection to the Internet

  What was the apparent motivation of the attacker

Who was the victim of the attack? Who was the attacker, if known? What did the attacker do to the victim? What was the apparent motivation of the attacker?

  Result is the theft or misuse of confidential information

what is a security incident?a security incident in an organization is a serious event that can occur at any point from

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

  How did computer crimes affect computer systems

How did computer crimes affect computer systems and law enforcement when computers first appeared? What are the important definitions about computer crime and security that CSII employees should remember?

  Services to three different types of technologies

Asynchronous Transfer Mode (ATM) offers services to three different types of technologies: Constant Bit Rate (CBR), Unspecified Bit Rate (UBR) and Available Bit Rate (ABR). Each technology has its pros/cons when dealing with ATM.

  Time the client issued the initial syn

How long from the time the client issued the initial SYN did it take the server to answer with the SYN-ACK

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Is john''s price setting approach ethical. is it legal.

How would you have set and advertised the Craft pen's price? Would you have used a cost-plus approach or some other method? Explain

  Media technologies affect social and societal issues

Any introduction of a new technology into a society initiates an endless series of effects, especially for those who have and use the technology compared with those who do not or cannot use the technology. Write a 1,400- to 1,750-word paper that a..

  Evaluate computer forensic analysis procedures and

computer crime and forensic analysisprovide two examples to distinguish the difference between what is considered a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd