{"id":1433,"date":"2014-09-21T09:03:12","date_gmt":"2014-09-21T01:03:12","guid":{"rendered":"http:\/\/localhost\/portal\/2014\/09\/21\/verizon-penalty\/"},"modified":"2014-09-21T09:03:12","modified_gmt":"2014-09-21T01:03:12","slug":"verizon-penalty","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1433","title":{"rendered":"\u7f8e\u570b\u53f2\u4e0a\u6700\u5927\u5b97\u96fb\u4fe1\u500b\u8cc7\u5224\u4f8b\uff0cVerizon\u906d\u7f70700\u842c\u7f8e\u5143\u4ee5\u4e0a"},"content":{"rendered":"<p>&nbsp;<a target=\"_blank\" href=\"http:\/\/www.bnext.com.tw\/article\/view\/id\/33661\" rel=\"noopener\">\u6578\u4f4d\u6642\u4ee3<\/a>\u64b0\u6587\u8005\uff1a\u66fe\u7b71\u5a9b \u3000\u767c\u8868\u65e5\u671f\uff1a2014\/09\/04<\/p>\n<div>&nbsp;<\/div>\n<div>&nbsp;<\/div>\n<div>\u7f8e\u570b\u56db\u5927\u96fb\u4fe1\u5546\u4e4b\u4e00Verizon\u65e5\u524d\u56e0\u9055\u6cd5\u4f7f\u7528\u9867\u5ba2\u500b\u8cc7\uff0c\u906d\u7f8e\u570b\u806f\u90a6\u901a\u8a0a\u59d4\u54e1\u6703FCC\uff08Federal Communications Commission\uff09\u7f70\u6b3e\u8d85\u904e700\u842c\u7f8e\u5143\uff08\u76f8\u7576\u65bc\u53f0\u5e632,000\u842c\u5143\uff09\u3002FCC\u8868\u793a\uff0c\u9019\u662f\u7f8e\u570b\u53f2\u4e0a\u6700\u5927\u5b97\u96fb\u4fe1\u5546\u9055\u6cd5\u4f7f\u7528\u500b\u8cc7\u6848\u4f8b\uff0c\u8d85\u904e2\u767e\u842c\u7528\u6236\u53d7\u5230\u5f71\u97ff\u3002Verizon\u5728\u89f8\u6cd5\u5e74\u9593\u5229\u7528\u9867\u5ba2\u500b\u8cc7\u9055\u6cd5\u9032\u884c\u4e0a\u5343\u5834\u884c\u92b7\u6d3b\u52d5\u3002<\/div>\n<div>&nbsp;<\/div>\n<div><img loading=\"lazy\" decoding=\"async\" width=\"480\" height=\"251\" alt=\"\" src=\"https:\/\/3.bp.blogspot.com\/-bu1aVt2u-uc\/VAgBSQ2BZKI\/AAAAAAAAASc\/PEBkaDo6d6g\/s480\/FCC%E5%88%A4Verizon%E4%BD%BF%E7%94%A8%E5%80%8B%E8%B3%87_09042014.png\" \/><\/div>\n<div>&nbsp;<\/div>\n<div>\uff08\u5716\u8aaa\uff1a\u7f8e\u570b\u56db\u5927\u96fb\u4fe1\u5546\u4e4b\u4e00Verizon\u56e0\u9055\u6cd5\u4f7f\u7528\u9867\u5ba2\u500b\u4eba\u8cc7\u6599\u906d\u7f8e\u570b\u806f\u90a6\u901a\u8a0a\u59d4\u54e1\u6703FCC\u7f70\u6b3e\u8d85\u904e700\u842c\u7f8e\u5143\u3002\u5716\u7247\u4f86\u6e90\uff1a\u7f8e\u570b\u806f\u90a6\u901a\u8a0a\u59d4\u54e1\u6703\uff09<\/div>\n<div>&nbsp;<\/div>\n<div>FCC\u8abf\u67e5\uff0cVerizon\u5f9e2012\u5e749\u6708\u8d77\uff0c\u5728\u65b0\u9867\u5ba2\u7533\u8fa6\u670d\u52d9\u7684\u7533\u8acb\u66f8\u6536\u64da\u6216\u6b61\u8fce\u8a3b\u518a\u4fe1\u4e0a\u672a\u8a3b\u660e\u500b\u8cc7\u4f7f\u7528\u689d\u6b3e\uff0c\u4e5f\u672a\u63d0\u4f9b\u300c\u4e0d\u540c\u610f\u4f7f\u7528\u500b\u8cc7\u300d\u9078\u9805\uff0c\u5f37\u8feb\u7533\u8fa6\u8005\u63a5\u53d7\u884c\u92b7\u8a0a\u606f\u3002<\/div>\n<div>&nbsp;<\/div>\n<div>\u96d6\u7136Verizon\u96a8\u5373\u57282013\u5e74\u4fee\u6539\u65b0\u5ba2\u6236\u7684\u500b\u8cc7\u689d\u6b3e\uff0c\u4f46FCC\u8a8d\u70baVerizon\u5df2\u7d93\u89f8\u6cd5\u3002Verizon\u5c07\u56e0\u6b64\u4ed8\u51fa\u7f70\u6b3e\uff0c\u4e5f\u5fc5\u9808\u63a5\u53d7\u8abf\u67e5\uff0c\u5728\u672a\u4f863\u5e74\u5167\u56b4\u683c\u52a0\u5f37\u5167\u90e8\u4f7f\u7528\u9867\u5ba2\u500b\u8cc7\u898f\u5b9a\uff0c\u4e26\u589e\u52a0\u5141\u8afe\u9867\u5ba2\u53d6\u6d88\u4f7f\u7528\u500b\u8cc7\u7684\u9078\u9805\u3002<\/div>\n<div>&nbsp;<\/div>\n<div>FCC\u57f7\u884c\u9577\u8868\u793aTravis LeBlanc\u8868\u793a\uff0c\u901a\u8a0a\u6642\u4ee3\uff0c\u96fb\u4fe1\u5546\u8b93\u9867\u5ba2\u81ea\u884c\u6c7a\u5b9a\u4f7f\u7528\u500b\u8cc7\u8207\u5426\uff0c\u5df2\u662f\u901a\u8a0a\u6642\u4ee3\u5fc5\u9808\u9075\u5b88\u7684\u6cd5\u5247\u3002\u800c\u53f0\u7063\u570b\u5bb6\u901a\u8a0a\u50b3\u64ad\u59d4\u54e1\u6703NCC\u4e5f\u81ea\u6c11\u570b99\u5e74\u8d77\u4fee\u8a02\u96fb\u4fe1\u696d\u53ca\u50b3\u64ad\u696d\u96fb\u8166\u8655\u7406\u500b\u4eba\u8cc7\u6599\u7ba1\u7406\u8fa6\u6cd5\u3002<\/div>\n<div>&nbsp;<\/div>\n<div>\u8cc7\u6599\u4f86\u6e90\uff1a<a target=\"_blank\" href=\"http:\/\/www.computerworld.com\/article\/2601435\/networking-hardware\/verizon-settles-fcc-consumer-privacy-investigation.html\" rel=\"noopener\">Computerworld\u3001FCC<\/a><\/div>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script> <script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script> <br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;\u6578\u4f4d\u6642\u4ee3\u64b0\u6587\u8005\uff1a\u66fe\u7b71\u5a9b \u3000\u767c\u8868\u65e5\u671f\uff1a2014\/09\/04 &nbsp; &nbsp; \u7f8e\u570b\u56db\u5927\u96fb\u4fe1 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1433","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1433"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1433\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}