![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Is The Internet Over Regulated
Today's Internet or World Wide Web is being over regulated. But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business? First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. How many people have actually been fined or imprisoned. The same can be said of downloading of music files from the Internet avoiding the music Industry copy rights and Musicians fees. There seems to have been more individuals caught than the sites that illegally provided the music downloads. Search engines have the ability to track anyone who does a search and is also registered for a service at that search engine. If you use the AOL search engine and also use an AOL email account, the tracking cookie could track your surfing online and that information could be sold for commercial gain and be accessed by law enforcement agencies in theory. In Pennsylvania last week there were two separate lawsuits accusing a Florida travel promoter and its telemarketer of ignoring prior warnings and illegally contacting nearly 200 Pennsylvania consumers who had officially registered on the state's "no call" list. The complaints came from consumers located in 13 Pennsylvania counties. The firm of Telemarketers when asked by individuals who had registered their name and phone number on the "No Call" list said: 1. They did not see the consumers name on the "no call" list. 2. They were following up on a package that they had mailed to the consumer when in reality they did not send the consumer a package. 3. They must have dialed the consumer in error, sorry. The "No Call" list must be checked by telemarketers and in theory if a registered individuals name or phone number came up on the computer list that the telemarketer was about to call, it should be easy enough to skip on to the next person. You can learn more and register your cell phone or home phone number with the "Do Not Call" registry for a period of 5 years. There is no fee to register. https://www.donotcall.gov As of January 1, 2005, telemarketers and sellers are required to search the registry at least once every 31 days and drop from their call lists the phone numbers of consumers who have registered. https://telemarketing.donotcall.gov Telemarketers pay a fee to obtain the list of local, State wide or U.S. Do Not Call lists. The list for up to five area codes is free. The annual fee is forty dollars per area code of list data (after five), with a maximum annual fee of eleven thousand dollars for the entire U.S. database. For a telemarketer to phone a person listed on the no call list it is the same as sending unsolicited email. Both are illegal. Registering and purchasing the do not call list is much cheaper and safer than not doing so. If you intend to phone everyone in your local area code to promote your amazing new widget. Don't do it until you have registered as a telemarketer and obtained the list of not to call people in your calling area. If you have purchased Leads which legally have to include time and date stamp, IP address etc to comply with Government email Laws and Acts, you are able to phone them. But do introduce yourself, your company and the product or service in a clear and honest way or you could fall fowl of the many Consumer Acts that are also in place. Since the 911 terrorism incidence, your privacy on the Internet, phone and other forms of communication is being monitored or at least the FBI and other law enforcement agencies can legally tap your phone and intercept your email. One piece of legislation that is being debated both in the Senate and the House of Representatives is "The Patriot Act" as a good part of this Act is due for renewal at the end of this year. Portions up for renewal include those sections regarding computer hackers, sharing information gained through Wire Taping, Internet Service providers to hand over customer information and records in times of possible emergencies and for the Police to listen in on communications as thought necessary and court orders if there is a possibility case of terrorism suspected. The Patriot Act, (great choice of name) was created to give authorities more powers in times of terrorism but goes way further than that! I believe this act is necessary in this day and age when it comes to threats to National Security but, where does this leave your privacy? As consumers, citizens and business owners we all have rights, its just a pity that there are a small number of fanatics and idiots out there that spoil it for the rest of us. May you have a safe and secure week. Peter Green Your Free Weekly Internet Marketing News, Ideas, Resources and Sources Ezine.
MORE RESOURCES: Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times Large Language Models Pose Growing Security Risks The Wall Street Journal UK minister met Chinese turbine company amid security concerns POLITICO Europe Protector app provides on-demand armed security ABC7 Los Angeles Electric infrastructure security measure updated Unicameral Update The Jones Act : A disastrous legacy for the U.S. economy and security Pacific Legal Foundation (PLF) Elon Musk’s Private Security Are Now Special Deputies The Daily Beast Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network HackerOne Debuts New Way to Quantify Security Value Channel Insider Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 The Hacker News Whistleblower lawyer Mark Zaid on the Trump administration's move to revoke security clearances The Record from Recorded Future News Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Rep. Woolford on border security Michigan House Republicans EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Cleared to connect: American Airlines pilots streamlined security program in collaboration with US and UK governments American Airlines Newsroom Texada achieves top security certifications American Rental Association The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English How to secure Notes on iOS and macOS Help Net Security Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire Exabits partners with Phala Network to offer robust AI security with TEE-enabled infrastructure GlobeNewswire Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor TechCrunch OpenText unveils AI-powered threat detection and response capabilities Help Net Security AI app DeepSeek banned on Pennsylvania treasury-issued devices over privacy, security concerns CBS News Topic: Relations with Ukraine NATO HQ Regional peace depends on Iran's security Tehran Times EU seeks to strengthen underwater cable security in Baltic and Mediterranean Kathimerini English Edition ‘Golden ticket to job security’: Trade union partnerships hold promise for high school students Youth Today CISA and FBI issue warning for Ghost ransomware activity Security Magazine Second Take: ‘The Winter Soldier’ tackles American democracy and security The Stanford Daily Tusk proposes 3-point plan to strengthen Ukraine, European security. Kyiv Independent Unarmed, undertrained, at risk: Advocates for Hawaii’s private security guards want change Hawaii News Now ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News Venture capital firm Insight Partners faces security breach Security Magazine ID-Pal, Facephi join influential payments, security groups Biometric Update Apple drops key ADP security feature in UK Mobile World Live Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Retired doctor and courthouse security deputy seeking Belvidere Township 'CEO' job Northern Public Radio (WNIJ) |
![]() |
![]() |
![]() |
RELATED ARTICLES
Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. How to Fight Spyware If you are wondering how to fight spyware for safe web surfing, this Internet privacy article will answer some of your questions. By now you have probably heard about the dangers of spyware. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. ![]() |
home | site map |
© 2006 |