The IT Law Wiki
No edit summary
No edit summary
 
(12 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Definition ==
+
== Definitions ==
   
 
'''Spyware''' is
 
'''Spyware''' is
   
 
{{Quote|technologies deployed without appropriate [[user]] [[consent]] and/or [[implement]]ed in ways that [[impair]] [[user]] control over (1) material changes that affect their [[user]] experience, [[privacy]], or [[system security]]; (2) use of their [[system resources]], including what [[program]]s are [[install]]ed on their [[computer]]s; and/or (3) [[data collection|collection]], use, and distribution of their [[PII|personal]] or other [[sensitive information]].<ref>''See'' Anti-Spyware Coalition Definitions Document (June 2006).[http://www.antispywarecoalition.org/documents/DefinitionsJune292006.htm]</ref>}}
 
{{Quote|technologies deployed without appropriate [[user]] [[consent]] and/or [[implement]]ed in ways that [[impair]] [[user]] control over (1) material changes that affect their [[user]] experience, [[privacy]], or [[system security]]; (2) use of their [[system resources]], including what [[program]]s are [[install]]ed on their [[computer]]s; and/or (3) [[data collection|collection]], use, and distribution of their [[PII|personal]] or other [[sensitive information]].<ref>''See'' Anti-Spyware Coalition Definitions Document (June 2006).[http://www.antispywarecoalition.org/documents/DefinitionsJune292006.htm]</ref>}}
  +
 
{{Quote|includ[ing] "[[adware]]" and other [[program]]s that "secretly [[install]] on your [[computer]] without your permission or knowledge" and may cause "[[Pop-up ad|pop-ups]]," [[banner advertisement]]s, and other extraneous ads, send "[[spam]]" [[e-mail message]]s, hijack [[search engine]] [[link]]s or [[home page]]s, [[trace]] [[online]] activity, allow others to [[remote access|remotely access]] a [[computer]], record [[private information]] or steal [[password]]s. It also includes "[[adware]], [[keylogger]]s, [[Trojan horse|Trojans]], [[hijacker]]s, [[dialer program|dialers]], [[virus]]es, [[spam]], and general ad serving."<ref>[[FTC v. MaxTheater|Federal Trade Comm’n v. MaxTheater, Inc.]], 2005 WL 3724918, at *2 (E.D. Wash. Dec. 6, 2005).</ref>}}
   
 
== Overview ==
 
== Overview ==
Line 10: Line 12:
   
 
[[Software]] that include spyware may be sold or available for free (“[[freeware]]”). They may be on a [[disk]] or other media, [[download]]ed from the [[Internet]], or [[download]]ed when opening an attachment to an [[electronic mail]] ([[e-mail]]) message.
 
[[Software]] that include spyware may be sold or available for free (“[[freeware]]”). They may be on a [[disk]] or other media, [[download]]ed from the [[Internet]], or [[download]]ed when opening an attachment to an [[electronic mail]] ([[e-mail]]) message.
 
One federal court has defined spyware as “includ[ing] [[adware]] and other [[program]]s that ‘secretly [[install]] on your [[computer]] without your permission or knowledge’ and may cause [[Pop-up ad|pop-ups]], [[banner advertisement]]s, and other extraneous ads, send [[spam]] [[e-mail message]]s, hijack [[search engine]] [[link]]s or [[home page]]s, trace [[online]] activity, allow others to [[remote access|remotely access]] a [[computer]], record private information or steal [[password]]s. It also includes [[adware]], [[keylogger]]s, [[Trojan horse|Trojans]], [[hijacker]]s, [[dialer program|dialers]], [[virus]]es, [[spam]], and general ad serving.’”<ref>[[FTC v. MaxTheater|Federal Trade Comm’n v. MaxTheater, Inc.]], 2005 WL 3724918, at *2 (E.D. Wash. Dec. 6, 2005).</ref>
 
   
 
Spyware functionality often includes
 
Spyware functionality often includes
Line 27: Line 27:
 
Some of these products may collect [[personally identifiable information]] ([[PII]]). When the [[computer]] is connected to the [[Internet]], the [[software]] periodically relays the [[information]] back to another party, such as the [[software]] manufacturer or a marketing company.
 
Some of these products may collect [[personally identifiable information]] ([[PII]]). When the [[computer]] is connected to the [[Internet]], the [[software]] periodically relays the [[information]] back to another party, such as the [[software]] manufacturer or a marketing company.
   
Another oft-cited example of spyware is “[[adware]],” which may cause [[advertisement]]s to suddenly appear on the [[user]]’s monitor &mdash; called [[pop-up ad]]s. In some cases, the [[adware]] uses [[information]] that the [[software]] obtained by tracking a [[user]]’s [[Web browsing]] habits to determine shopping preferences, for example. Some [[adware]] companies, however, insist [[adware]] is not necessarily spyware, because the user may have permitted it to be [[download]]ed onto the [[computer]] because it provides desirable benefits.
+
Another oft-cited example of spyware is “[[adware]],” which may cause [[advertisement]]s to suddenly appear on the [[user]]’s monitor &mdash; called [[pop-up ad]]s. In some cases, the [[adware]] uses [[information]] that the [[software]] obtained by tracking a [[user]]’s [[Web browsing]] habits to determine shopping preferences, for example. Some [[adware]] companies, however, insist [[adware]] is not necessarily spyware, because the user may have permitted it to be [[download]]ed onto the [[computer]] because it provides desirable benefits.
   
 
==References==
 
==References==
 
<references />
 
<references />
  +
  +
== Source ==
  +
  +
* [[Spyware: Background and Policy Issues for Congress]], at 1-2.
  +
  +
== See also ==
  +
  +
* [[Coordinating Virus and Spyware Defense]]
  +
* [[FTC Spyware Workshop]]
  +
* [[Recognizing and Avoiding Spyware]]
  +
* [[State spyware laws]]
  +
  +
== External links ==
  +
  +
* [[Center for Democracy and Technology]] ([[CDT]]), Spyware Enforcement (2007) ([http://www.cdt.org/privacy/spyware/20071015SpywareEnforcement.pdf full-text]).
 
[[Category:Technology]]
 
[[Category:Technology]]
 
[[Category:Software]]
 
[[Category:Software]]
Line 38: Line 53:
 
[[Category:Definition]]
 
[[Category:Definition]]
 
[[Category:Malware]]
 
[[Category:Malware]]
  +
[[Category:Surveillance]]

Latest revision as of 19:23, 28 January 2013

Definitions[]

Spyware is

technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information.[1]
includ[ing] "adware" and other programs that "secretly install on your computer without your permission or knowledge" and may cause "pop-ups," banner advertisements, and other extraneous ads, send "spam" e-mail messages, hijack search engine links or home pages, trace online activity, allow others to remotely access a computer, record private information or steal passwords. It also includes "adware, keyloggers, Trojans, hijackers, dialers, viruses, spam, and general ad serving."[2]

Overview[]

When the computer is connected to the Internet, the software periodically relays the information back to the software manufacturer or a marketing company. Some spyware traces a user’s Web activity and causes advertisements to suddenly appear on the user’s computer screen — called “pop-up ads” — in response. Typically, users have no knowledge that the software they obtained included spyware and that it is now resident on their computers.

Software that include spyware may be sold or available for free (“freeware”). They may be on a disk or other media, downloaded from the Internet, or downloaded when opening an attachment to an electronic mail (e-mail) message.

Spyware functionality often includes

Armed with spyware, bots can be used to steal valuable personal information and deliver it to attackers for use or sale.

Typically, users have no knowledge that spyware is on their computers. Because the spyware is resident on the computer’s hard drive, it can generate pop-up ads, for example, even when the computer is not connected to the Internet. One example of spyware is software products that include, as part of the software itself, a method by which information is collected about the use of the computer on which the software is installed, such as Web browsing habits.

Some of these products may collect personally identifiable information (PII). When the computer is connected to the Internet, the software periodically relays the information back to another party, such as the software manufacturer or a marketing company.

Another oft-cited example of spyware is “adware,” which may cause advertisements to suddenly appear on the user’s monitor — called pop-up ads. In some cases, the adware uses information that the software obtained by tracking a user’s Web browsing habits to determine shopping preferences, for example. Some adware companies, however, insist adware is not necessarily spyware, because the user may have permitted it to be downloaded onto the computer because it provides desirable benefits.

References[]

  1. See Anti-Spyware Coalition Definitions Document (June 2006).[1]
  2. Federal Trade Comm’n v. MaxTheater, Inc., 2005 WL 3724918, at *2 (E.D. Wash. Dec. 6, 2005).

Source[]

See also[]

External links[]