Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Is The Internet Over Regulated > NetSparsh - Viral Content you Love & Share

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.

But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?

First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned.

The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads.

Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory.

In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties.

The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said:

1. They did not see the consumers name on the "no call" list.

2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package.

3. They must have dialed the consumer in error, sorry.

The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person.

You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register.

https://www.donotcall.gov

As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists.

The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database.

For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal.

Registering and purchasing the do not call list is much cheaper and safer than not doing so.

If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area.

If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place.

Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email.

One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year.

Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected.

The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that!

I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy?

As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us.

May you have a safe and secure week.

Peter Green
Editor of ~ The INDEX ~ ezine.
[email protected]
http://www.Internet-Income-Index.com

Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

No Passport or Ticket: How a Woman Evaded Airport Security and Flew to London
New York Times
After Ms. Hartman joined the security line and was screened by the T.S.A., she tried to board a flight to Connecticut around 2 p.m., attempting to conceal herself behind a passenger who was waiting in line, Ms. Simonton said. As Ms. Hartman tried to ...
How Marilyn Hartman Got Past O'Hare SecurityCBS Chicago
'Serial stowaway' arrested for 10th time after slipping past airport security, flies to LondonFox 2 Detroit
Notorious 'serial stowaway' pensioner evades airport security and flies from Chicago to London without a ticketEvening Standard

all 29 news articles »

Google's Advanced Protection Program Offers Security Options For High-Risk Users
EFF
Security is not a one-size-fits-all proposition, and features that are prohibitively inconvenient for some could be critical for others. For most users, standard account security settings options are sufficient protection against common threats. But ...


BBC News

Syria offensive: US seeks to address Turkey's 'legitimate' security concerns
BBC News
The US is willing to work with Turkey to address its "legitimate" security concerns in northern Syria, Secretary of State Rex Tillerson has said. He was speaking after Turkey's military incursion into northern Syria to fight the Kurdish YPG militia at ...
US Hopes to Work With Turkey on 'Security Zone' in SyriaU.S. News & World Report
US hopes to work with Turkey to create 'security zone' in Syria: TillersonDaily Sabah
Turkey has legitimate security concerns: MattisHurriyet Daily News

all 452 news articles »

ZDNet

After ignoring for months, Uber fixes two-factor bypass bug after all
ZDNet
Uber has fixed a security bug that could've allowed an attacker to hack into user accounts by bypassing two-factor authentication, after the ride-sharing company initially said the flaw wasn't a "particularly severe" issue. The company quietly issued a ...


Engadget

Uber security flaw compromised two-factor authentication
Engadget
Two-factor authentication only works if it's strictly enforced in software, and it sounds like Uber might have fallen short of that goal for a while. In a chat with ZDNet, security researcher Karan Saini has revealed a flaw in Uber's two-factor ...

and more »

NBCNews.com

Report: Afghan security forces committed 75 rights abuses, including child sex assault
NBCNews.com
The report from the Special Inspector General for Afghanistan Reconstruction (SIGAR), which was first released to Congress last year but made public Tuesday, says that at least seven of the violations were child sexual assault, but also says "the full ...

and more »

CNBC

Soldiers, snipers and security at Davos: Protecting the world's rich and powerful
CNBC
Ensuring the safety of more than 2,500 high-profile political, economic and business guests at an event is never easy; ensuring the safety of more than 70 heads of state and government is a nightmare. The World Economic Forum (WEF) has said security is ...

and more »

New York Times

Prison Guards in France Continue Strike Over Security and Pay
New York Times
PARIS — A labor strike by prison guards around France entered its second week on Monday, as the guards vented anger over their pay and dangerous working conditions, an issue that erupted into the open this month after a string of violent assaults by ...

and more »

Sun Sentinel

Security guard shot colleague in Hollywood in fight over gate lock, police say
Sun Sentinel
Andres Aviles, 26, drove to Mexico and flew to El Salvador where he was detained while trying to reach Nicaragua, police said. Tonya AlanezContact Reporter · Privacy Policy. The security guard accused of shooting his colleague during a shift change at ...
Security guard accused of shooting colleague gets caught in El SalvadorWPLG Local 10
Fugitive security guard fled Florida. His crime caught up with him in El Salvador.Miami Herald

all 5 news articles »

Fox News

US says it wants to help Indonesia provide maritime security
Fox News
JAKARTA, Indonesia – U.S. Defense Secretary Jim Mattis says the Trump administration wants to help Indonesia play a central role in maritime security in the Asia-Pacific region. Mattis spoke briefly to reporters Tuesday after meeting with his ...
US to work with Indonesia on maritime security, counter-terrorismThe Straits Times

all 168 news articles »
Google News

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More