Adminstration of E-Business Taxation

The entry by telephone and cable companies into the Internet service provider business within the last few years has given new hope to the congestion problem in that they now have a vested interest in investing in infrastructure. The Internet connection and set-up cost are not inexpensive for every business; however, the competitive cost of not having it probably outweighs the financial cost of connectivity. Even if businesses deal with customers that are domestic or local, reaching the customer is only one aspect of the Internet. It can be used to communicate with suppliers to build supply networks, order materials, sales or other information 24 hours a day, 7 days per week.

Selling on World Wide Web Prior to the contract: The customer enters the merchants web site, views the product and company information and if the vendor and the buyer have established a mechanism that neither of them should be able to repudiate the offer price or the products ordered, and If the customer is convinced that the product will arrive at an approximate specified delivery time, and If the vendor is satisfied that it will be paid Then, the customer will place an order. Settlement of the amount due: the vendor invoices, the customer authorizes/pays.

The post sales warranty, support and customer data gathering there is some debate regarding the formation of an electronic contract over the Internet. One of the differences between contracting over the Internet and contracting by any other electronic means is the on-line Internet Service Provider. The issue is whether the parties are communicating and contracting directly or are they communicating and contracting through a third party. Under the acceptance rule a contract will not be formed until acceptance of the offer by the offeree has been communicated to the offeror. The exception to the rule is called the postal rule, where an offeror or has explicitly or implicitly agreed to the offer being accepted by the post office, once the letter or other communication has been posted. The contract is deemed to have been formed even if the offeror does not receive the letter accepting the offer. In building the web site documentation, it should be made clear in the relevant terms and conditions or by a statement that will be seen by the user before sending their request by email to purchase an item,

Administration of Sales Tax and Central Excise duties

One challenge is presented by continued growth in the volume of Internet sales. To what extent that such growth occurs, it increases remote sales where compliance is already most problematic. Another challenge is that the expanding variety of e-commerce transactions and products may create new types of compliance problems, such as identifying the location and nature of a sale. Although the future growth rate of Internet sales is not known, certain characteristics favor the rapid growth of Internet sales. For example, Commerce has reported that e-commerce not only reduces the cost and time of doing business but also provides alternative shopping sites, expands existing markets, and creates new markets. E-commerce also frees some sellers from the "geographic confines and the costs of running actual stores." These characteristics have the potential to increase the number of remote sellers and purchasers as well as increase the volume of remote sales. To the extent that such sales growth occurs, it will magnify the existing sales and central excise duties compliance problems associated with remote sales, such as the difficulty of enforcing compliance by purchasers in the case of remote sales without nexus. The expanding variety of electronic transactions may also create new compliance challenges. Shifts from traditional forms of sales to Internet sales can make it more difficult to identify the location of the buyer and the seller, the status (business, individual, other) of the buyer or seller, and the nature of the product itself.

In terms of the location, both sellers and purchasers may have multiple locations, and the Internet makes it easier for these firms to conduct their transactions from the location that offers the greatest tax advantages. Businesses may also choose to establish a presence in certain jurisdictions in order to maximize these advantages. As a result, determining the location of buyers and the sellers' activities for nexus purposes, which is important for the collection of sales and central excise duties is more difficult in an environment with Internet sales. A related challenge for the collection of sales and central excise is determining the status of the buyer and seller in Internet transactions. The status of the seller, for example, is relevant since certain sales by individuals are not subject to sales and central excise duties. However, the development of new markets, such as Internet auctions, has created a new opportunity for businesses as well as individuals to avoid sales and central excise duties. To the extent that businesses are using these new markets to make sales, it would be necessary for tax authorities to be able to identify those sellers as businesses rather than as individuals in order to assess the appropriate taxes. Need for legislation The Internet, as we know it today, is no longer a medium limited to nerds and geeks in science labs. It has become a whole new way of life. We have started identifying ourselves with this medium to such an extent that nowadays we take a net connection for granted.

Electronic mail, surfing the World Wide Web, browsing through search engines for that elusive piece of info have all nowadays been woven into the fabric of daily life. In face of this media juggernaut, little do we realize how close we are to being robbed of our credit card numbers by that smart programmer down the road, or that we might be under surveillance with some body stalking our movements on the net or simply still, some body gaining unauthorized access to all the private information on our computers wrecking havoc in our private lives. The era of the Net Economy has also bought with it new approaches to success in business. The Internet and the Web are creating a new economic order-one where people and businesses can exchange information, goods, and services at the speed of light. Many smart companies are rapidly gaining competitive advantage by leveraging the business benefits of these web-based connections, and succeeding in new economic relationships. Today businesses large and small face an unprecedented set of challenges-and an unparalleled set of opportunities. They are interconnecting their customers and business partners with their core business processes. However they are vulnerable. This vulnerability comes from knowledge that they transact in an insecure environment, an environment bereft of legislation. They too face as much uncertainty about a hacker attack on their corporate databases as the common man does. Depending upon their parent country, companies doing business on the Internet have to face varying degrees of ambiguity regarding the laws that not only constraint but also protect them. Global computer-based communications are cutting across territorial borders, creating a new realm of human activity and undermining the feasibility--and legitimacy-of applying laws based on geographic boundaries.

While these electronic communications play havoc with geographic boundaries, a new boundary, made up of the screens and passwords that separate the virtual world from the "real world" of atoms, emerges. This new boundary defines a distinct Cyberspace that needs and can create new law and legal institutions of its own. Territorially based law-making and law-enforcing authorities find this new environment deeply threatening. But established territorial authorities may yet learn to defer to the self-regulatory efforts of Cyberspace participants who care most deeply about this new digital trade in ideas, information, and services. Separated from doctrine and tied to territorial jurisdictions, new rules will emerge, in a variety of online spaces, to govern a wide range of new phenomena that have no clear parallel in the non-virtual world. Clearly, the shift from a physically oriented commercial environment to a knowledge based electronic environment presents some very serious and substantial issues that must be addressed. Existing regulatory frameworks are likely incapable of adequately taxing electronic transactions, and must be adapted. Otherwise, governments may face a significant decrease in their tax revenues, as more and more commerce takes place over the Internet. The task for government then is to attempt to fit Internet transactions into existing rules of taxation. Where this is impossible, it may be necessary to adapt and amend the rules in order to catch Internet transactions.

Adil Waseem

best cleaning company Highland Park ..
In The News:

Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.

Responding to Article: Logic Class 101 Applied to the Minuteman Project

In response to Douglas Bower's article; Logic Class 101 Applied... Read More

The Macedonian Lottery

Every conflict has its economic moments and dimensions. The current... Read More

Anglo-Israelism and the Flesh

Recently a friend insisted that I read a book by... Read More

Business: ?Where Is America Headed To??, New York Millionaire Wonders

Hello! Happy new year. May you live a long healthy... Read More

Joseph Campbell - Permanent Human Values

At the start of the US involvement in WWII Joseph... Read More

Wartime Prisoners and the Will to Fight; War is Hell, Let?s Win Alright?

We learned some lessons in these last few wars. For... Read More

I am Not an African American

I am not an African-American. Don't call me an African... Read More

WiMax Election Strategy

So you are ready to run for public office are... Read More

Genetically Modified Plants Could Become Sentinels for the Military

As concerns grow over the threat of bioterrorism and weapons... Read More

Free Markets, Farmers, and GM Crops

Many are condemning the latest GM Terminator seeds. Yet there... Read More

The Dragons

I hope to provide a starting point for the serious... Read More

How Small Business Benefits From Supporting Labor Unions

For a short time I worked as a union officer... Read More

Fury and Sound as GM Seeds Abound

We have all heard of the huge debates surrounding genetically... Read More

Using More Trees to Reduce Atmospheric CO2

As global warming continues to escalate the concerns of today's... Read More

Fundamentalist: Fascist or Common-Sense?

Is the only way to fight Fundamentalist Extremists becoming one... Read More

So How Far Have We Come? Here are some of the 2001 Anti Terrorist Projects

An article in Information Week in January 14, 2002 discussed... Read More

Thune Republicans: Sudden Friends of the Working Person?

The Right's defense of John Thune in the Dan Nelson/MetaBank... Read More

The Federal Trade Commission, reality check

Federal Trade Commission Owes Industry and Entrepreneurs an Apology. The... Read More

High Speed Trains and The Future of Transportation

Where are all the high-speed trains we were promised? Where... Read More

Corruption and Transparency

I. The FactsJust days before a much-awaited donor conference, the... Read More

Bio Attack Nation Unready

We are told by out leadership that we risk loss... Read More

Stopping a Nuclear Bomb on a Hydrofoil

The US Homeland Security is worried about Hydrofoil or Skimmer... Read More

When Political Correctness in NOT a Virtue

The other day I was sucker punched, hoodwinked, bamboozled, had... Read More

Public Notaries

We are having a problem in America with Public Notaries,... Read More

Thinking on Energy

Regarding the de-regulation of energy, this is not such a... Read More

high-end home cleaning Winnetka ..