Adminstration of E-Business Taxation

The entry by telephone and cable companies into the Internet service provider business within the last few years has given new hope to the congestion problem in that they now have a vested interest in investing in infrastructure. The Internet connection and set-up cost are not inexpensive for every business; however, the competitive cost of not having it probably outweighs the financial cost of connectivity. Even if businesses deal with customers that are domestic or local, reaching the customer is only one aspect of the Internet. It can be used to communicate with suppliers to build supply networks, order materials, sales or other information 24 hours a day, 7 days per week.

Selling on World Wide Web Prior to the contract: The customer enters the merchants web site, views the product and company information and if the vendor and the buyer have established a mechanism that neither of them should be able to repudiate the offer price or the products ordered, and If the customer is convinced that the product will arrive at an approximate specified delivery time, and If the vendor is satisfied that it will be paid Then, the customer will place an order. Settlement of the amount due: the vendor invoices, the customer authorizes/pays.

The post sales warranty, support and customer data gathering there is some debate regarding the formation of an electronic contract over the Internet. One of the differences between contracting over the Internet and contracting by any other electronic means is the on-line Internet Service Provider. The issue is whether the parties are communicating and contracting directly or are they communicating and contracting through a third party. Under the acceptance rule a contract will not be formed until acceptance of the offer by the offeree has been communicated to the offeror. The exception to the rule is called the postal rule, where an offeror or has explicitly or implicitly agreed to the offer being accepted by the post office, once the letter or other communication has been posted. The contract is deemed to have been formed even if the offeror does not receive the letter accepting the offer. In building the web site documentation, it should be made clear in the relevant terms and conditions or by a statement that will be seen by the user before sending their request by email to purchase an item,

Administration of Sales Tax and Central Excise duties

One challenge is presented by continued growth in the volume of Internet sales. To what extent that such growth occurs, it increases remote sales where compliance is already most problematic. Another challenge is that the expanding variety of e-commerce transactions and products may create new types of compliance problems, such as identifying the location and nature of a sale. Although the future growth rate of Internet sales is not known, certain characteristics favor the rapid growth of Internet sales. For example, Commerce has reported that e-commerce not only reduces the cost and time of doing business but also provides alternative shopping sites, expands existing markets, and creates new markets. E-commerce also frees some sellers from the "geographic confines and the costs of running actual stores." These characteristics have the potential to increase the number of remote sellers and purchasers as well as increase the volume of remote sales. To the extent that such sales growth occurs, it will magnify the existing sales and central excise duties compliance problems associated with remote sales, such as the difficulty of enforcing compliance by purchasers in the case of remote sales without nexus. The expanding variety of electronic transactions may also create new compliance challenges. Shifts from traditional forms of sales to Internet sales can make it more difficult to identify the location of the buyer and the seller, the status (business, individual, other) of the buyer or seller, and the nature of the product itself.

In terms of the location, both sellers and purchasers may have multiple locations, and the Internet makes it easier for these firms to conduct their transactions from the location that offers the greatest tax advantages. Businesses may also choose to establish a presence in certain jurisdictions in order to maximize these advantages. As a result, determining the location of buyers and the sellers' activities for nexus purposes, which is important for the collection of sales and central excise duties is more difficult in an environment with Internet sales. A related challenge for the collection of sales and central excise is determining the status of the buyer and seller in Internet transactions. The status of the seller, for example, is relevant since certain sales by individuals are not subject to sales and central excise duties. However, the development of new markets, such as Internet auctions, has created a new opportunity for businesses as well as individuals to avoid sales and central excise duties. To the extent that businesses are using these new markets to make sales, it would be necessary for tax authorities to be able to identify those sellers as businesses rather than as individuals in order to assess the appropriate taxes. Need for legislation The Internet, as we know it today, is no longer a medium limited to nerds and geeks in science labs. It has become a whole new way of life. We have started identifying ourselves with this medium to such an extent that nowadays we take a net connection for granted.

Electronic mail, surfing the World Wide Web, browsing through search engines for that elusive piece of info have all nowadays been woven into the fabric of daily life. In face of this media juggernaut, little do we realize how close we are to being robbed of our credit card numbers by that smart programmer down the road, or that we might be under surveillance with some body stalking our movements on the net or simply still, some body gaining unauthorized access to all the private information on our computers wrecking havoc in our private lives. The era of the Net Economy has also bought with it new approaches to success in business. The Internet and the Web are creating a new economic order-one where people and businesses can exchange information, goods, and services at the speed of light. Many smart companies are rapidly gaining competitive advantage by leveraging the business benefits of these web-based connections, and succeeding in new economic relationships. Today businesses large and small face an unprecedented set of challenges-and an unparalleled set of opportunities. They are interconnecting their customers and business partners with their core business processes. However they are vulnerable. This vulnerability comes from knowledge that they transact in an insecure environment, an environment bereft of legislation. They too face as much uncertainty about a hacker attack on their corporate databases as the common man does. Depending upon their parent country, companies doing business on the Internet have to face varying degrees of ambiguity regarding the laws that not only constraint but also protect them. Global computer-based communications are cutting across territorial borders, creating a new realm of human activity and undermining the feasibility--and legitimacy-of applying laws based on geographic boundaries.

While these electronic communications play havoc with geographic boundaries, a new boundary, made up of the screens and passwords that separate the virtual world from the "real world" of atoms, emerges. This new boundary defines a distinct Cyberspace that needs and can create new law and legal institutions of its own. Territorially based law-making and law-enforcing authorities find this new environment deeply threatening. But established territorial authorities may yet learn to defer to the self-regulatory efforts of Cyberspace participants who care most deeply about this new digital trade in ideas, information, and services. Separated from doctrine and tied to territorial jurisdictions, new rules will emerge, in a variety of online spaces, to govern a wide range of new phenomena that have no clear parallel in the non-virtual world. Clearly, the shift from a physically oriented commercial environment to a knowledge based electronic environment presents some very serious and substantial issues that must be addressed. Existing regulatory frameworks are likely incapable of adequately taxing electronic transactions, and must be adapted. Otherwise, governments may face a significant decrease in their tax revenues, as more and more commerce takes place over the Internet. The task for government then is to attempt to fit Internet transactions into existing rules of taxation. Where this is impossible, it may be necessary to adapt and amend the rules in order to catch Internet transactions.

Adil Waseem

weekly home cleaning Highland Park ..
In The News:

Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.

The Fed and Other Garbage

"The Jesuit priest John H. Surratt, proven to be the... Read More

The Will To Fight for Islam

The more I study the dynamics of WWII the more... Read More

America Needs an Education Reinvention Bill NOW!

In order to build a stronger, more self-sufficient America, America... Read More

Dealing with Massive Prisoners of War

In the last Gulf War we saw thousands of enemy... Read More

Should Judgeships Be a Political Event?

Thought of the day; Questions about the judicial system. If... Read More

The Ugly American Returns!

Originally published in 1958, "The Ugly American" (Lederer & Burdick)... Read More

Public Sector Economies in Transition

In the previous article, we described the various methods developed... Read More

A Look Ahead to 2008 (Part II)

Last week, I began my look ahead to the 2008... Read More

A Viewpoint Not Represented in the Mainstream Media

The news media will regularly present views from Democratic (liberal),... Read More

Voters are to Blame for Bad Politics

When I was growing up, I actually considered a career... Read More

MORAL ARMORS Counterfeit 911: Refuting Michael Moore

Michael Moore asserts the following in his political film Fahrenheit... Read More

A Few Quick Thoughts on Freedom and Technology

We have known of the innate characteristic need of members... Read More

Netanyahu: Too Late For A Fight-back?

The resignation from cabinet yesterday, Sunday, by the Israeli minister... Read More

A Component of Liberty is a Strong Social Contract with Governing Body

Recently I got to talking with a gentleman at a... Read More

Government Overregulation of Broadcast Content Could Backfire

Rush is right! The government's stepped up bid to regulate... Read More

California Car Wash Fundraisers and Environmental Law

Many non-profit groups are feeling upset that they are allowed... Read More

The Economics of Cloning Armies or Super Families

Let's put the religious part of the debate for a... Read More

Just War

In an age of terrorism, guerilla and total warfare the... Read More

International Terrorists Have US Partners; The Federal Trade Commission

The Federal Trade Commission in their latest move to increase... Read More

Global/Israeli Corruption!

What depth of blind insanity has inflicted itself upon Israel's... Read More

The Fabric of Economic Trust

Economy is called the dismal science because it pretends to... Read More

Recycling The Mentally Ill

30 years ago, California, later followed by other states, decided... Read More

How To Date Ann Coulter (If You Must)

I've decided to go public with my intentions: I will... Read More

Army recovers terrorists? bodies from avalanche-hit areas in South Kashmir

As the death toll in the avalanche-hit Jammu and Kashmir... Read More

Franchising Democracy and Creating Cohesive World Government

There are so many problems with our perceived perfect checks... Read More

whole house cleaning Park Ridge ..