Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is The Internet Over Regulated > NetSparsh - Viral Content you Love & Share

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.

But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?

First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned.

The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads.

Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory.

In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties.

The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said:

1. They did not see the consumers name on the "no call" list.

2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package.

3. They must have dialed the consumer in error, sorry.

The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person.

You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register.

https://www.donotcall.gov

As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists.

The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database.

For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal.

Registering and purchasing the do not call list is much cheaper and safer than not doing so.

If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area.

If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place.

Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email.

One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year.

Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected.

The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that!

I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy?

As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us.

May you have a safe and secure week.

Peter Green
Editor of ~ The INDEX ~ ezine.
[email protected]
http://www.Internet-Income-Index.com

Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

New York Post

Mandalay Bay adds elevator security after Las Vegas shooting
Las Vegas Review-Journal
To that end, we have determined that positioning 24-hour security at the elevator banks improves our surveillance capabilities and enhances security for all of our guests and facilities,” MGM Resorts said in the statement. People seeking to get on the ...
Mandalay Bay adds 24/7 elevator security after gunman's rampageNew York Post

all 4 news articles »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...


New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
The Grio -New York Daily News -CNN -FEMA.gov
all 68 news articles »

Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...
The iOS 11 privacy and security settings you need to know aboutWired.co.uk

all 147 news articles »

UN News Centre

Security Council fails at fresh attempt to renew panel investigating chemical weapons use in Syria
UN News Centre
17 November 2017 – For the third time in two days, the United Nations Security Council on Friday failed to adopt a resolution on the mandate of an international panel investigating use of chemical weapons in Syria due to a negative vote by permanent ...
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME
Security Council Fails for Fourth Time to Renew Mandate of Joint Mechanism Investigating Chemical Weapons Attacks ...ReliefWeb

all 521 news articles »

WFTV Orlando

Investigators testify in downtown Orlando security guard's murder trial
WFTV Orlando
ORLANDO, Fla. - Crime scene investigators testified Friday in the murder trial of a man accused of raping and killing a 27-year-old woman at her downtown Orlando apartment. Police said Stephen Duxbury strangled Sasha Samsudean in October 2015 at the ...
Jurors hear from print experts in security guard's murder trialOrlando Sentinel

all 5 news articles »

Houston Chronicle

Ex-Homeland Security secretary recovering from heart attack
Houston Chronicle
Ridge was the nation's first homeland security secretary, serving under Republican President George W. Bush until February 2005. He left the governorship after the terrorist attacks of Sept. 11, 2001, to join the Bush administration. Since leaving ...
Ex-Homeland Security Czar Ridge Hospitalized After Heart AttackVoice of America
Former Pennsylvania Governor and U.S. Homeland Security ...WTAE Pittsburgh
Former Head of US Homeland Security Ridge in Critical ConditionU.S. News & World Report
Fox News -Austin American-Statesman
all 105 news articles »

Tampabay.com

Cyber firm accesses CentCom cloud information, gives command low security score
Tampabay.com
Vickery said he notified the military about the security loophole as soon as it was discovered. He said he would "not be surprised" if someone besides him accessed the information, but Army Maj. Josh Jacques, a command spokesman, said it appears no one ...

and more »
Google News

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Internet Small Business and Fraud

Be careful of sites that promise to send you "instant... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More