Children internet protection act

Assignment Help Basic Computer Science
Reference no: EM131046430

The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.  

Write a three to five (3-5) page paper in which you:

  1. Describe the main compliancy requirements and the protected information for both COPPA and CIPA.
  2. Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two (2) different acts.
  3. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
  4. Speculate on why COPPA and CIPA define protection for different ages; COPPA defines a child as being under the age of 13 and CIPA defines a minor as being under the age of 17.
  5. Identify the main opposition to COPPA and CIPA based on research and speculate on whether they will be changed in the future based on the opposition. 
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length. 

The specific course learning outcomes associated with this assignment are:

  • Explain the concept of privacy and its legal protections. 
  • Describe legal compliance laws addressing public and private institutions. 
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM131046430

Questions Cloud

Cobol within the international symbol : Manifestations of this movement included the slogan to "Kill the COBOL programmer" (not literally, of course) and T-shirts bearing the word COBOL within the international symbol for not permitted (a red circle with a red line diagonally across the..
Identify a vertical relationship in your company : Identify a vertical relationship in your company and determine whether it could be managed more profitably by tying, bundling, exclusion, or vertical integration. Clearly identify the source of the profitability (regulatory evasion, elimination of..
Residual plot and regression plot graph : I just need you put the data into STATA and give me some simple analysis like R^2, variance, coefficient, also i need some graph from STATA like the residual plot, regression plot and other plots you think is good
How many boxes of envelopes should the company order : To minimize costs, how many boxes of envelopes should the company order - Find an equation of the tangent line to the curve at the given point.
Children internet protection act : The Children's Online Privacy Protection Act (COPPA) and the Children's Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.
Calculate this transformers voltage regulation at full load : Calculate this transformer's voltage regulation under the same conditions, using the per-unit system.
Size of an address field : You are designing an instruction set for your computer. All the instructions are of same size (11 bits long). The size of an address field is 4 bits. You have already designed five 2-address instructions and 40 1-address instructions. How many 0-a..
Non-negative numbers by using repeated additions : Write a MARIE program using a loop that multiplies 2 non-negative numbers by using repeated additions. For example, to multiply 3 x 6, the program would add 3 six times (e.g. 3 + 3 + 3 + 3 + 3 + 3) or add 6 three times (e.g. 6+6+6).
Compute the standard deviation of the data : Assume 7 classes, with a class interval width of 4, and plot the data. Note that the resulting curve is essentially an experimental observation of the underlying probability distribution. What type of distribution does it appear to be?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a script that creates and calls a stored procedure

Write a script that creates and calls a stored procedure named insert_category. First, code a statement that creates a procedure that adds a new row to the Categories table. To do that, this procedure should have one parameter for the category name.

  Write a program that reads three whole numbers

Write a program that reads three whole numbers and displays the average of the three numbers.

  Presentation slide plan

1. Create and save a document named PresentationPlan.pdf 2. Use the document formatting outlined in the syllabus and create a heading called Presentation Plan

  What happens to time out

After a packet is eventually received, we resume with Time Out initialized to the last exponentially backed-off value used for the timeout interval.

  Service (iaas) from a cloud service provider

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..

  Describe ease of finding information on internet

Explain main elements of assignment in the substantive way. Describe the ease of finding information on the Internet.

  Computing time complexity of algorithm

Suppose an algorithm consists of two stages. The time complexity of Stage 1 is O(nlog2n) and that of Stage 2 is O(n2). By using the definition of Big-Oh, show that the overall time complexity is O(n2).

  What is a plausible explanation of what may have happened

Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be ins..

  Develop the logic for a program that allows a user

The exact number of household records has not yet been determined, but you know that Marengo has 7 households. Develop the logic for a program that allows a user to enter each household size and determine the mean and median household size in Mare..

  Which of the following input technologies has been

1. telewire a mobile manufacturer offers free connections to customers who buy its mobile phones. this cost of

  What is the server IP address

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet.

  Problem and accompanying excel windows

Jones Furniture Company produces beds and desks for college students. The production process requires carpentry and varnishing. Each bed requires 6 hours of carpentry and 4 hour of varnishing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd