Adminstration of E-Business Taxation

The entry by telephone and cable companies into the Internet service provider business within the last few years has given new hope to the congestion problem in that they now have a vested interest in investing in infrastructure. The Internet connection and set-up cost are not inexpensive for every business; however, the competitive cost of not having it probably outweighs the financial cost of connectivity. Even if businesses deal with customers that are domestic or local, reaching the customer is only one aspect of the Internet. It can be used to communicate with suppliers to build supply networks, order materials, sales or other information 24 hours a day, 7 days per week.

Selling on World Wide Web Prior to the contract: The customer enters the merchants web site, views the product and company information and if the vendor and the buyer have established a mechanism that neither of them should be able to repudiate the offer price or the products ordered, and If the customer is convinced that the product will arrive at an approximate specified delivery time, and If the vendor is satisfied that it will be paid Then, the customer will place an order. Settlement of the amount due: the vendor invoices, the customer authorizes/pays.

The post sales warranty, support and customer data gathering there is some debate regarding the formation of an electronic contract over the Internet. One of the differences between contracting over the Internet and contracting by any other electronic means is the on-line Internet Service Provider. The issue is whether the parties are communicating and contracting directly or are they communicating and contracting through a third party. Under the acceptance rule a contract will not be formed until acceptance of the offer by the offeree has been communicated to the offeror. The exception to the rule is called the postal rule, where an offeror or has explicitly or implicitly agreed to the offer being accepted by the post office, once the letter or other communication has been posted. The contract is deemed to have been formed even if the offeror does not receive the letter accepting the offer. In building the web site documentation, it should be made clear in the relevant terms and conditions or by a statement that will be seen by the user before sending their request by email to purchase an item,

Administration of Sales Tax and Central Excise duties

One challenge is presented by continued growth in the volume of Internet sales. To what extent that such growth occurs, it increases remote sales where compliance is already most problematic. Another challenge is that the expanding variety of e-commerce transactions and products may create new types of compliance problems, such as identifying the location and nature of a sale. Although the future growth rate of Internet sales is not known, certain characteristics favor the rapid growth of Internet sales. For example, Commerce has reported that e-commerce not only reduces the cost and time of doing business but also provides alternative shopping sites, expands existing markets, and creates new markets. E-commerce also frees some sellers from the "geographic confines and the costs of running actual stores." These characteristics have the potential to increase the number of remote sellers and purchasers as well as increase the volume of remote sales. To the extent that such sales growth occurs, it will magnify the existing sales and central excise duties compliance problems associated with remote sales, such as the difficulty of enforcing compliance by purchasers in the case of remote sales without nexus. The expanding variety of electronic transactions may also create new compliance challenges. Shifts from traditional forms of sales to Internet sales can make it more difficult to identify the location of the buyer and the seller, the status (business, individual, other) of the buyer or seller, and the nature of the product itself.

In terms of the location, both sellers and purchasers may have multiple locations, and the Internet makes it easier for these firms to conduct their transactions from the location that offers the greatest tax advantages. Businesses may also choose to establish a presence in certain jurisdictions in order to maximize these advantages. As a result, determining the location of buyers and the sellers' activities for nexus purposes, which is important for the collection of sales and central excise duties is more difficult in an environment with Internet sales. A related challenge for the collection of sales and central excise is determining the status of the buyer and seller in Internet transactions. The status of the seller, for example, is relevant since certain sales by individuals are not subject to sales and central excise duties. However, the development of new markets, such as Internet auctions, has created a new opportunity for businesses as well as individuals to avoid sales and central excise duties. To the extent that businesses are using these new markets to make sales, it would be necessary for tax authorities to be able to identify those sellers as businesses rather than as individuals in order to assess the appropriate taxes. Need for legislation The Internet, as we know it today, is no longer a medium limited to nerds and geeks in science labs. It has become a whole new way of life. We have started identifying ourselves with this medium to such an extent that nowadays we take a net connection for granted.

Electronic mail, surfing the World Wide Web, browsing through search engines for that elusive piece of info have all nowadays been woven into the fabric of daily life. In face of this media juggernaut, little do we realize how close we are to being robbed of our credit card numbers by that smart programmer down the road, or that we might be under surveillance with some body stalking our movements on the net or simply still, some body gaining unauthorized access to all the private information on our computers wrecking havoc in our private lives. The era of the Net Economy has also bought with it new approaches to success in business. The Internet and the Web are creating a new economic order-one where people and businesses can exchange information, goods, and services at the speed of light. Many smart companies are rapidly gaining competitive advantage by leveraging the business benefits of these web-based connections, and succeeding in new economic relationships. Today businesses large and small face an unprecedented set of challenges-and an unparalleled set of opportunities. They are interconnecting their customers and business partners with their core business processes. However they are vulnerable. This vulnerability comes from knowledge that they transact in an insecure environment, an environment bereft of legislation. They too face as much uncertainty about a hacker attack on their corporate databases as the common man does. Depending upon their parent country, companies doing business on the Internet have to face varying degrees of ambiguity regarding the laws that not only constraint but also protect them. Global computer-based communications are cutting across territorial borders, creating a new realm of human activity and undermining the feasibility--and legitimacy-of applying laws based on geographic boundaries.

While these electronic communications play havoc with geographic boundaries, a new boundary, made up of the screens and passwords that separate the virtual world from the "real world" of atoms, emerges. This new boundary defines a distinct Cyberspace that needs and can create new law and legal institutions of its own. Territorially based law-making and law-enforcing authorities find this new environment deeply threatening. But established territorial authorities may yet learn to defer to the self-regulatory efforts of Cyberspace participants who care most deeply about this new digital trade in ideas, information, and services. Separated from doctrine and tied to territorial jurisdictions, new rules will emerge, in a variety of online spaces, to govern a wide range of new phenomena that have no clear parallel in the non-virtual world. Clearly, the shift from a physically oriented commercial environment to a knowledge based electronic environment presents some very serious and substantial issues that must be addressed. Existing regulatory frameworks are likely incapable of adequately taxing electronic transactions, and must be adapted. Otherwise, governments may face a significant decrease in their tax revenues, as more and more commerce takes place over the Internet. The task for government then is to attempt to fit Internet transactions into existing rules of taxation. Where this is impossible, it may be necessary to adapt and amend the rules in order to catch Internet transactions.

Adil Waseem

affordable house cleaning Park Ridge ..
In The News:

Scammers are sending fake Facebook settlement payout emails that mimic legitimate notices from the privacy settlement administrator to deceive users.
Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.

What could Macedonia Learn from a Tiger? Asian Tigers and Uninterrupted Economic Growth

The first reaction of economies in transition is a sharp... Read More

Will They Sterilize Vagabonds and Drunkards in Belarus?

In Belarus parliament is going to struggle with degeneration of... Read More

A Look Ahead to 2008 (Part II)

Last week, I began my look ahead to the 2008... Read More

Suicide Prevention in Prisons

Prison guards and corrections professionals are hard at work insuring... Read More

Population Control and Water Supply Issues

As we increase our populations every new soul will require... Read More

Federal Trade Commission Will Not Monitor MLM Companies

Having been to every city in the country over the... Read More

When Will the World Wake Up?

How can any human being today, anywhere in this world,... Read More

Workaholism, Leisure and Pleasure

The official working week is being reduced to 35 hours... Read More

WiMax Election Strategy

So you are ready to run for public office are... Read More

Fraud From FTC Insiders, Who Can You Trust?

The FTC franchising division purports their law enforcement experience in... Read More

John Roberts ? Supreme Court Nominee

President Bush's selection of the Hon. John Roberts is an... Read More

A Component of Liberty is a Strong Social Contract with Governing Body

Recently I got to talking with a gentleman at a... Read More

So How Far Have We Come? Here are some of the 2001 Anti Terrorist Projects

An article in Information Week in January 14, 2002 discussed... Read More

Experts?

ACCREDITATION: - Scholastic regimentation from the post WWII period has... Read More

Let us Disband The FTC?s Franchising Division

Previously Senator Dick Armey and his staff in 2000 to... Read More

French NON to Europe Might be Engrained in Their History

Many of the problems that the members of the European... Read More

Bosnia - An Economy in Search of a State

Bosnia-Herzegovina (heretofore "Bosnia") is an artificial polity with four, tangentially... Read More

All There is, is dust in the wind; Dust Particulate Traveling The Globe

Dust from Deserts and Particulate ControlThe greatest contributor to particulate... Read More

An ROI on National Security

Do you find it interesting that people complain about the... Read More

Are We Really Getting Along?

When you look at the news, immigrants are dying trying... Read More

How Does the US Congress Really Work?

Many people do not understand politics very well. They often... Read More

Workmens Compensation Lawyers, Lets Raise Minimum Wage; No Lets Not, Say We Did, We Have

The debate to raise minimum wage in California is totally... Read More

Canada Tries to Stop Flow of Drugs into the US

As more and more cities and states set up websites... Read More

Emminent Domain May Hit Close to Home

IN A DAY AND AGE where one voice screaming among... Read More

Responding to Article: Logic Class 101 Applied to the Minuteman Project

In response to Douglas Bower's article; Logic Class 101 Applied... Read More

affordable house cleaning Mundelein ..