Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.

But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?

First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned.

The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads.

Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory.

In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties.

The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said:

1. They did not see the consumers name on the "no call" list.

2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package.

3. They must have dialed the consumer in error, sorry.

The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person.

You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register.

https://www.donotcall.gov

As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists.

The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database.

For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal.

Registering and purchasing the do not call list is much cheaper and safer than not doing so.

If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area.

If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place.

Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email.

One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year.

Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected.

The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that!

I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy?

As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us.

May you have a safe and secure week.

Peter Green
Editor of ~ The INDEX ~ ezine.
Editor@Internet-income-index.com
http://www.Internet-Income-Index.com

Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.

In The News:


pen paper and inkwell


cat break through


Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More