Today's Internet or World Wide Web is being over regulated.
But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?
First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned.
The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads.
Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory.
In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties.
The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said:
1. They did not see the consumers name on the "no call" list.
2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package.
3. They must have dialed the consumer in error, sorry.
The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person.
You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register.
https://www.donotcall.gov
As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists.
The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database.
For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal.
Registering and purchasing the do not call list is much cheaper and safer than not doing so.
If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area.
If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place.
Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email.
One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year.
Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected.
The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that!
I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy?
As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us.
May you have a safe and secure week.
Peter Green
Editor of ~ The INDEX ~ ezine.
Editor@Internet-income-index.com
http://www.Internet-Income-Index.com
Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.
No longer are viruses the only threat on the internet.... Read More
Have you ever got an email asking you to confirm... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
At this point, if you've got the whole "turning the... Read More
Computer security for most can be described in 2 words,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
There has not been a time in the history of... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
A couple of years back, I paid my dues the... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Nowadays more and more people are using a computer. A... Read More
Millions of people make purchases online, but many people are... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Computer infections can be broken up into 4 main categories... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Well, this is an article I never thought I would... Read More
If you use emails actively in your communication, you must... Read More
In 1997, I decided after 15 years as a practicing... Read More
There you are busily typing away on your PC or... Read More
You've seen it in the news - 40 million credit... Read More
If you constantly deal with bank or electronic accounts, it... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
If spyware were a person and he set himself up... Read More
First off I should explain what phishing is. Phishing is... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
In a word, no - an email message has always... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Much has been said on the theory of password protection... Read More
Today,on most internet user's computers, we have the ability to... Read More
As soon as almost all computer users already got used... Read More
When the Internet first came about, it was realized it... Read More
Ok, you've got a computer, and you get online. You... Read More
Is your data secure? Think again. Securing data is unlike... Read More
If you use the internet, you have probably been infected... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Phishing is the act of some individual sending an email... Read More
Identity Theft is one of the most serious problems facing... Read More
Ebay is a great site and is used by many... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
If you are wondering how to fight spyware for safe... Read More
At this point, if you've got the whole "turning the... Read More
Spyware is software or hardware installed on a computer without... Read More
Spyware protection software is the easiest way of removing spyware... Read More
If you are a parent, as am I, I think... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Have you ever had to call Symantec or McAfee to... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
With the advent of the World Wide Web, a whole... Read More
There is no doubt that "how-to articles" have become a... Read More
Every day millions of people go online to find information,... Read More
Today,on most internet user's computers, we have the ability to... Read More
If you know what is the 'Fishing' then it's very... Read More
History and BackgroundThe virus was one of the first ever... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The words Corporate Security may conjure up images of a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
In the past I've never really paid much attention to... Read More
Millions of people make purchases online, but many people are... Read More
Internet Security |