Security Information |
Is The Internet Over Regulated
Today's Internet or World Wide Web is being over regulated. But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business? First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned. The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads. Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory. In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties. The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said: 1. They did not see the consumers name on the "no call" list. 2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package. 3. They must have dialed the consumer in error, sorry. The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person. You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register. https://www.donotcall.gov As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists. The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database. For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal. Registering and purchasing the do not call list is much cheaper and safer than not doing so. If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area. If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place. Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email. One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year. Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected. The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that! I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy? As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us. May you have a safe and secure week. Peter Green Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. The Bad Guys Are Phishing For Your Personal Information Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Protection for Your PC - Painless and Free! Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. A Painless Plagiarism Solution A crowded marketplace can lead to unethical webmasters using underhand techniques to get ahead of their competitors and online plagiarism is one of the easiest.I had worked hard on the copy for my sales page at Watch Live Football (http://www. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. |
home | site map | contact us |