Today's Internet or World Wide Web is being over regulated.
But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?
First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned.
The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads.
Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory.
In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties.
The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said:
1. They did not see the consumers name on the "no call" list.
2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package.
3. They must have dialed the consumer in error, sorry.
The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person.
You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register.
https://www.donotcall.gov
As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists.
The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database.
For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal.
Registering and purchasing the do not call list is much cheaper and safer than not doing so.
If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area.
If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place.
Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email.
One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year.
Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected.
The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that!
I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy?
As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us.
May you have a safe and secure week.
Peter Green
Editor of ~ The INDEX ~ ezine.
Editor@Internet-income-index.com
http://www.Internet-Income-Index.com
Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.
![]() |
|
![]() |
|
![]() |
|
![]() |
Over £5 billion pounds was spent on online shopping in... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Identity theft rates one of the fastest growing crimes in... Read More
These six ways to prevent identity theft offer you valuable... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
The average computer is packed with hidden software that can... Read More
Phishing is a relatively new form of online fraud that... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
A few nights ago I received an email from "2CO"... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
You may not realize it, but as you are surfing... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
File sharing on p2p is soaring despite the music and... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Despite the current wave of identity theft and corporate security... Read More
If you use emails actively in your communication, you must... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
This is not some new fangled techno-speak, it is a... Read More
If you are a parent, as am I, I think... Read More
Let us take the example of scrambling an egg. First,... Read More
During the release of a new software product specialized to... Read More
If you have used a Windows machine for a while,... Read More
What is computer security? Computer security is the process of... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Imagine this ? you open up your email box and... Read More
Working from home has its advantages, including no commute, a... Read More
If you run any type of Internet business, Adware and... Read More
The average computer is packed with hidden software that can... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
While clicking from site to site on the internet you... Read More
When it comes to a secure website and passwords it... Read More
If you are a parent, you have probably wondered at... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
First, let's do a little recap'. As I stated in... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The top five online scams on the Internet hit nearly... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Well, if that would have been said to me by... Read More
Over £5 billion pounds was spent on online shopping in... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Imagine my surprise when I received a phone call from... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Someone recently told me, "You would have to be a... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
When surfing the Internet you probably take your anonymity for... Read More
There you are busily typing away on your PC or... Read More
As you know, this time the virus under the name... Read More
Did you know...? 1 in 5 children who use computer... Read More
Spyware and adware are becoming major problems for online surfers... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Only the top spyware removers are successful at detecting and... Read More
Nowadays more and more people are using a computer. A... Read More
This really chapped my lips...I recently bought a new computer.... Read More
As soon as almost all computer users already got used... Read More
Internet Security |