Spyware Legislation Needed to Curb Increase in Online Security and Privacy Threats
- Webroot Spy Sweeper Enterprise. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p44
Reviews the SpySweeper Enterprise 2.1 anti-spyware software from Webroot.
- The Invisible Battleground. SCHNEIER, BRUCE // Ripon Forum;Fall2009, Vol. 43 Issue 4, p12
The article discusses the policy recommendations for the need of security on the Internet in the U.S. These recommendations include a cybersecurity coordinator for government networks which should be conducted openly. Government should utilized its huge purchasing power to develop the security...
- PLAY BY THE RULES. Clark, Lindsay // Computer Weekly;11/8/2005, p46
The article presents information about laws and legislations related to the network security. Complying with the current raft of legislation could not only minimize business risk, it could save money. Because networks have become such a powerful tool for businesses to manage and distribute...
- Keep your PC safe. Bradley, Helen // Australian PC User;Apr2007, Vol. 19 Issue 4, p96
The article offers step-by-step instructions for using the Ashampoo AntiSpyWare software.
- Democratic Senators Introduce New Cyber Legislation. Biesecker, Calvin // Defense Daily;1/23/2013, Vol. 257 Issue 15, p5
A summary is presented of the bill Cyber Security and American Cyber Competitiveness Act of 2013, co-sponsored by Senators Jay Rockefeller, Dianne Feinstein, Tom Carper, to be passed in the U.S.
- Rule One: They're Our Machines. McCracken, Harry // PCWorld;Nov2005, Vol. 23 Issue 11, p17
The article reflects on the security problems associated with personal computers usage in the U.S. Various initiatives have been launched to deal with identity crime and cybercrime. Information on a proposed bill that will monitor multiple standard malware techniques is also provided here. This...
- PRIVACY INALIENABILITY AND THE REGULATION OF SPYWARE. Schwartz, Paul M. // Berkeley Technology Law Journal;Summer2005, Vol. 20 Issue 3, p1269
Develops a model for the propertization of personal information that also exhibits sensitivity to attendant threats to personal privacy in the United States. Elements of property in personal information; Evaluation of a federal bill, H.R. 29 or the Securely Protect Yourself Against Cyber...
- FIRST DO NO HARM: THE PROBLEM OF SPYWARE. Crawford, Susan P. // Berkeley Technology Law Journal;Summer2005, Vol. 20 Issue 3, p1433
Explores key issues surrounding spyware in the United States. Overview of spyware; Difficulty in defining spyware; Surveys of the legislative landscape of spyware as of mid-2005; Federal and state bills on the subject of spyware; Concrete suggestions for addressing spyware; Legal status of...
- BETTER SAFE THAN SORRY. Garr, Robin // Louisville Magazine;Oct2000, Vol. 51 Issue 10, p42
Advises the installation of firewall software programs to protect computer networks from hackers.