Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Big Tech Antitrust Bills to Have an Effect

Big Tech Antitrust Bills to Have an Effect

Recently five bipartisan bills are being considered in the United States House of Representatives that intend to add additional oversight on the power of modern tech giants. Let’s take a look at these bills and why they are deemed necessary by many lawmakers. 

The House’s antitrust subcommittee conducted a lengthy investigation into the anticompetitive behaviors of some of the major technology companies in business today. This investigation has bred several new bills that, if signed into law, would be some of the most robust antitrust laws passed in recent history. Here is some of the proposed legislation.

The American Innovation and Choice Online Act

This bill is designed to limit the ability of technology companies to push their own products and services on their users. For years these major technology companies have been able to peddle their own products by using information collected from users. This act would effectively eliminate the monopoly that these companies currently enjoy with the use of user data, providing an avenue for third-party companies to utilize this data as well.

The Ending Platform Monopolies Act

One of the core considerations with all of this proposed legislation is to address what is considered monopolistic behavior. The Ending Platform Monopolies Act is targeting the major technology companies such as Amazon, Apple, Google, and Facebook by removing any company with 50 million active users and a market capitalization rate of over $600 billion’s ability to run corresponding businesses that create a conflict of interest. Amazon and Apple are the inspiration for this bill as both sell devices and services that create anti-competitive situations for other companies.

The Platform Competition and Opportunity Act

The Platform Competition and Opportunity Act would effectively limit a company’s ability to acquire companies that are in direct competition with them. Most of the technology companies in question have been very aggressive in acquiring companies they may be in competition with. For example, under the new bill, Facebook’s relatively cheap acquisition of Instagram would have more legal issues, as they operate as direct competitors. 

The Merger Filing Fee Modernization Act

This bill is basically a bill that states that filing fees would be significantly increased and it would take those proceeds and use them to fund further oversight of anti-competitive business practices in the technology industry.

The Augmenting Compatibility and Competition by Enabling Service Switching (ACCESS) Act

ACCESS would give businesses the ability to streamline the transfer of a person’s private information. Several bills like it have been proposed over the years, but effectively it would make major technology companies provide access for integration to competing companies; a right they can deny currently. 

You Know, and Likely Depend On, the Major Targets

We listed them before and they completely dominate online life. They are Amazon, Apple, Facebook, and Google. Colorado Representative Ken Buck went so far as to call them out by name in a statement: “Apple, Amazon, Facebook, and Google have prioritized power over innovation and harmed American businesses and consumers in the process. These companies have maintained monopoly power in the online marketplace by using a variety of anticompetitive behaviors to stifle competition.”

Some are saying it is about time, while many others don’t understand why they would change the rules for successful companies. The fact is that something has to be done to allow for more competition in the online marketplace. The four companies that are mentioned have a market valuation of $6 trillion combined—about ⅖ the value of the entire United States’ Gross Domestic Product for 2020.

Some changes you may see include Amazon losing the right to sell Amazon-branded items or Google—that owns YouTube—not being allowed to feature YouTube videos in their search results. Technology companies have enjoyed little oversight until now, but these proposed pieces of legislation, and the bipartisan support some are getting, are an indicator that something is going to be done to stem this anti-competitive behavior. 

With only around four percent of bills that are proposed adopted as law, you may see none of these bills pass, but it is interesting, and kind of refreshing, to see so many people coming together.

What do you think? Should there be additional regulations on these major Internet monopolies or should the Government leave them alone? Leave your thoughts in the comments section below, and return to our blog for more technology-based content.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade Data Recovery VoIP Business Management Smartphones AI Disaster Recovery communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Miscellaneous Information Automation Gadgets Cloud Computing Holiday Training Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Mobile Office Data Security Apps Two-factor Authentication Vendor Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking Managed Services Voice over Internet Protocol App BYOD Employer-Employee Relationship Applications Avoiding Downtime Marketing How To Conferencing BDR WiFi Computing Information Technology HIPAA Access Control Hacker Office 365 Analytics Office Tips Website Augmented Reality Retail 2FA Storage Help Desk Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Computers Health Router Document Management Windows 11 Monitoring Scam Firewall Excel Data loss Remote Workers The Internet of Things Telephone Going Green Patch Management Save Money Social Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Free Resource Cybercrime Project Management Windows 7 Physical Security Display Microsoft 365 Printer Customer Service Paperless Office Solutions Infrastructure Outlook User Tip Machine Learning Modem Money Processor Mobile Security Humor Holidays Word Maintenance Data Storage Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Administration Safety Managed IT Service Downloads Robot iPhone Licensing Settings Printing Entertainment Wireless Vulnerabilities Content Filtering Data Privacy IT Management VPN Images 101 YouTube Meetings Customer Relationship Management Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Computer Repair Hacking Virtual Desktop Presentation Data storage LiFi Employees Wireless Technology Integration Managing Costs Amazon SharePoint Username IP Address Electronic Medical Records Halloween eCommerce Black Friday SSID Lenovo Database Surveillance Writing Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Recovery Media Virtual Reality Proxy Server Reviews Scary Stories Private Cloud Cookies Hard Drives Cyber Monday Medical IT Hacks Server Management Superfish Identity Theft Tactics Development Domains Fun Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Deep Learning Twitter Shopping Error Nanotechnology Optimization Refrigeration PowerPoint Education Addiction Public Speaking Social Engineering Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Lithium-ion battery Remote Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Entrepreneur Mobile Computing Tablet Service Level Agreement Internet Service Provider Search Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Best Practice Regulations Compliance Alert Bookmark Buisness File Sharing Smart Tech Memes Undo Dark Data Co-managed IT Managed IT Legal IT solutions Download Net Neutrality How To Alerts SQL Server Technology Care History Business Communications Business Growth Financial Data Notifications Browsers Smartwatch Travel Connectivity IT Break Fix Scams Techology Google Maps Upload Procurement Cortana Azure Hybrid Work Cyber security Application Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework CES Downtime Unified Threat Management IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management IBM Regulations Google Calendar Term Google Apps Typing Customer Resource management FinTech Data Analysis Star Wars IT Assessment Network Congestion Microsoft Excel IT Maintenance Google Drive User Error Gamification Flexibility Knowledge Staff Value Business Intelligence Social Networking Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Point of Sale Smart Devices Competition 5G Ransmoware Google Docs Unified Communications Content Remote Working Experience Wearable Technology Memory Vendors Health IT Running Cable Tech Support Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Google Wallet Directions Videos Assessment Electronic Health Records Monitors Permissions Workforce Wasting Time Threats User Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 Drones Microchip Internet Exlporer Software as a Service Fraud Meta

Blog Archive