Spyware Legislation Needed to Curb Increase in Online Security and Privacy Threats

July 2008
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p16
Trade Publication
The article reports on the legislative bill called The Counter Spy Act, which would help curb the increase in online security and privacy threats in the U.S. Vincent Weafer, vice president of security response at Symantec, called for specific provisions in the bill to ensure that developers of anti-spyware tools can protect their customers, however, he emphasized that the importance of ensuring the said legislation should not prohibit specific technologies.


Related Articles

  • Webroot Spy Sweeper Enterprise. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Apr2005, p44 

    Reviews the SpySweeper Enterprise 2.1 anti-spyware software from Webroot.

  • The Invisible Battleground. SCHNEIER, BRUCE // Ripon Forum;Fall2009, Vol. 43 Issue 4, p12 

    The article discusses the policy recommendations for the need of security on the Internet in the U.S. These recommendations include a cybersecurity coordinator for government networks which should be conducted openly. Government should utilized its huge purchasing power to develop the security...

  • PLAY BY THE RULES. Clark, Lindsay // Computer Weekly;11/8/2005, p46 

    The article presents information about laws and legislations related to the network security. Complying with the current raft of legislation could not only minimize business risk, it could save money. Because networks have become such a powerful tool for businesses to manage and distribute...

  • Keep your PC safe. Bradley, Helen // Australian PC User;Apr2007, Vol. 19 Issue 4, p96 

    The article offers step-by-step instructions for using the Ashampoo AntiSpyWare software.

  • Democratic Senators Introduce New Cyber Legislation. Biesecker, Calvin // Defense Daily;1/23/2013, Vol. 257 Issue 15, p5 

    A summary is presented of the bill Cyber Security and American Cyber Competitiveness Act of 2013, co-sponsored by Senators Jay Rockefeller, Dianne Feinstein, Tom Carper, to be passed in the U.S.

  • Rule One: They're Our Machines. McCracken, Harry // PCWorld;Nov2005, Vol. 23 Issue 11, p17 

    The article reflects on the security problems associated with personal computers usage in the U.S. Various initiatives have been launched to deal with identity crime and cybercrime. Information on a proposed bill that will monitor multiple standard malware techniques is also provided here. This...

  • PRIVACY INALIENABILITY AND THE REGULATION OF SPYWARE. Schwartz, Paul M. // Berkeley Technology Law Journal;Summer2005, Vol. 20 Issue 3, p1269 

    Develops a model for the propertization of personal information that also exhibits sensitivity to attendant threats to personal privacy in the United States. Elements of property in personal information; Evaluation of a federal bill, H.R. 29 or the Securely Protect Yourself Against Cyber...

  • FIRST DO NO HARM: THE PROBLEM OF SPYWARE. Crawford, Susan P. // Berkeley Technology Law Journal;Summer2005, Vol. 20 Issue 3, p1433 

    Explores key issues surrounding spyware in the United States. Overview of spyware; Difficulty in defining spyware; Surveys of the legislative landscape of spyware as of mid-2005; Federal and state bills on the subject of spyware; Concrete suggestions for addressing spyware; Legal status of...

  • BETTER SAFE THAN SORRY. Garr, Robin // Louisville Magazine;Oct2000, Vol. 51 Issue 10, p42 

    Advises the installation of firewall software programs to protect computer networks from hackers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics