Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Anti-Spyware Bills Pass House, Move to Senate

    By
    Caron Carlson
    -
    May 27, 2005
    Share
    Facebook
    Twitter
    Linkedin

      The U.S. House of Representatives last week overwhelmingly passed two separate anti-spyware bills, but as the measures now move to the Senate, legislators will find most of the hard questions unresolved—a familiar scenario in Congress, where similar House bills withered last year following Senate inaction.

      The SPY ACT (Securely Protect Yourself Against Cyber Trespass), authored by Rep. Mary Bono, R-Calif., takes the more active approach, requiring a conspicuous notice to users before transmitting spyware.

      The SPY ACT largely resembles the Senates SPYBLOCK (Software Principles Yielding Better Levels of Consumer Knowledge) bill, sponsored by Sens. Conrad Burns, R-Mont.; Ron Wyden, D-Ore.; and Barbara Boxer, D-Calif. The sponsors are awaiting a date for a committee hearing on the bill and hope to have one before the end of the summer, an aide to Burns said.

      Alternatively, the Internet Spyware Prevention Act, authored by Rep. Bob Goodlatte, R-Va., focuses on penalties for fraudulent or deceptive behavior without targeting any particular technology—an approach favored by the IT industry.

      Goodlattes bill, which passed the House 395-1, makes it a crime to intentionally access a computer without authorization by causing code to be copied onto the computer and using it for malicious purposes.

      From the industrys perspective, the Goodlatte approach avoids the possibility of ensnaring legitimate software downloads, such as security patches.

      IT managers, who are employing a growing array of technologies to combat spyware themselves, widely applaud the legislative initiatives as a supplement to their own efforts.

      Jeff Smestuen, network manager at Blue Bell Creameries L.P., in Brenham, Texas, said spyware and other unwelcome traffic have increased exponentially on his network in the past 18 months.

      “Most of [the data mining programs] are crap software. They take up a lot of resources on your machine, and they can take a machine down to a crawl,” Smestuen said.

      As for the legislative approach to reducing spyware, Smestuen said he supports both a notice requirement and tough criminal penalties.

      Click here

      to read more about attempts to outlaw spyware.

      “The only way you should get those kinds of programs is if you agree,” Smestuen said. “I think of spyware and spam as theft and an intrusion. Its costing me money and productivity. The laws need to be strict, and the penalties have to be severe.”

      Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Caron Carlson

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×