Analyze how coppa and cipa are similar and different

Assignment Help Computer Network Security
Reference no: EM131143896

Computer Ethics Paper

Assignment: COPA and CIPA

The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.

Write a three to five page paper in which you:

1. Describe the main compliancy requirements and the protected information for both COPPA and CIPA.
2. Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts.
3. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
4. Speculate on why COPPA and CIPA define protection for different ages; COPPA defines a child as being under the age of 13 and CIPA defines a minor as being under the age of 17.
5. Identify the main opposition to COPPA and CIPA based on research and speculate on whether they will be changed in the future based on the opposition.
6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

o Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

o Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

o Explain the concept of privacy and its legal protections.
o Describe legal compliance laws addressing public and private institutions.
o Use technology and information resources to research legal issues in information security.
o Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM131143896

Questions Cloud

Determine the shearing stress at points a and b : A 750-N.m torque is applied to a hollow shaft having the cross section shown and a uniform 6-mm wall thickness. Neglecting the effect of stress concentrations, determine the shearing stress at points a and b.
Determine the cost of goods available for sale : Determine the cost of goods available for sale. - Determine the ending inventory and- Determine the cost of goods sold under each of the assumed cost flow methods.
Compute the first four natural frequencies : Compute the first four natural frequencies as accurately as possible and compare them to both the analytical values and the measured values.
Payton prepares a multiple step income statement : In 2010, Walter Payton Company had net sales of $900,000 and cost of goods sold of $540,000. Operating expenses were $230,000, and interest expense was $11,000. Payton prepares a multiple-step income statement.
Analyze how coppa and cipa are similar and different : Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two different acts. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
Find the first seven natural frequencies and mode shapes : Find the first seven natural frequencies and mode shapes - Removing the center diagonal members, find the first seven natural frequencies and mode shapes again.
Prepare separate correcting entries for each error : Prepare separate correcting entries for each error, assuming that the incorrect entry is not reversed. (Omit explanations.)
The change in price the bond will experience in dollars : A 8.30 percent coupon bond with 13 years left to maturity is priced to offer a 9.0 percent yield to maturity.- What is the change in price the bond will experience in dollars?
Calculate the baseline performance for delivery time : Prepare an A3 for the executive. As a guide, ensure that you consider the following elements in your A3: Define the problem statement and goal statement Calculate the baseline performance for Delivery Time

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine changes to existing security policies

Determine changes to existing security policies needed to make the NVCC bookstore Web site more secure.

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Implement the affine cipher in c programing language

Implement the Affine Cipher in C programing language with comments - Implement DES in C programming language with comments.

  Theft of logins and passwords

Theft of logins and passwords

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Examine the security characteristics of both ipv4

Examine the security characteristics of both IPv4, which is most prevalent in today's networks, and IPv6, which is up and coming. State and explain the major shortcomings of IPv4 that are now fixed or improved in IPv6.

  Describe the three principles of ip security

Describe The Three Principles of IP Security

  Personal information entered on these websites become

facebook email electronic commerce and collaborative sites for both work and leisure are a normal part of our everyday

  Udp programs allowing two parties to establish a secure

Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob

  Questions on security in computing and program security

Frequently asked questions on security in computing, program security , operating system , database security ? what is intrusion detection system , what is firewall , what re the non malicious programming errors , theft to security , how to contro..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd