Internet Spyware Prevention Act

Internet Spyware Prevention Act

The Internet Spyware Prevention Act, also known as I-SPY, is an act by the United States Congress to impose penalties and punishments on creators of computer spyware. The act was first introduced in the House of Representatives in 2004 and passed in 2005. [http://www.infoworld.com/article/07/03/16/HNspywarebill_1.html US lawmakers introduce I-Spy bill (accessed March 24 2007)] The bill was reintroduced in March 2007 to further prosecute makers of spyware.

History

On June 23, 2004, Representatives Bob Goodlatte, Zoe Lofgren, and Lamar S. Smith introduced the Internet Spyware Prevention Act as an amendment to Title 18 of the United States Code.

Criticisms

Members of the Interactive Advertising Bureau claim that the provisions of the act would prohibit all but one form of data collection on computers, cookies. They say that advanced programs (involving Javascript) in the future that utilize data collection would be criminalized under this act.

ee also

* Spyware
* United States Congress

References

External links

# [http://thomas.loc.gov/cgi-bin/query/z?c108:H.R.4661:|The Library of Congress Search on HR 4661]


Wikimedia Foundation. 2010.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… …   Wikipedia

  • Internet fraud — refers to the use of Internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet …   Wikipedia

  • Cybercrime and Countermeasures — Cyber crime, or computer crime, refers to any crime that involves a computer and a network.[1] The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the …   Wikipedia

  • Sony BMG CD copy prevention scandal — The Sony BMG CD copy prevention scandal concerns the copy prevention measures included by Sony BMG on compact discs in 2005. Sony BMG included the Extended Copy Protection (XCP) and MediaMax CD 3 software on music CDs. XCP was put on 52 titles [… …   Wikipedia

  • I Spy (disambiguation) — I Spy may refer to:In culture: * I spy, a guessing game usually played in families with young children * I Spy , an American television secret agent adventure series that ran on NBC from 1965 to 1968 ** I Spy (film) , a 2002 film based on the… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… …   Wikipedia

  • United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… …   Universalium

  • Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… …   Wikipedia

  • Denial-of-service attack — DoS redirects here. For other uses, see DOS (disambiguation). DDoS Stacheldraht Attack diagram. A denial of service attack (DoS attack) or distributed denial of service attack (DDoS attack) is an attempt to make a computer resource unavailable to …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”