{ "id": "RL32706", "type": "CRS Report", "typeId": "REPORTS", "number": "RL32706", "active": false, "source": "EveryCRSReport.com, University of North Texas Libraries Government Documents Department", "versions": [ { "source": "EveryCRSReport.com", "id": 377014, "date": "2011-01-12", "retrieved": "2016-04-07T01:11:49.744540", "title": "Spyware: Background and Policy Issues for Congress", "summary": "The term \u201cspyware\u201d generally refers to any software that is downloaded onto a computer without the owner\u2019s or user\u2019s knowledge. Spyware may collect information about a computer user\u2019s activities and transmit that information to someone else. It may change computer settings, or cause \u201cpop-up\u201d advertisements to appear (in that context, it is called \u201cadware\u201d). Spyware may redirect a web browser to a site different from what the user intended to visit, or change the user\u2019s home page. A type of spyware called \u201ckeylogging\u201d software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients.\nSome of these software programs have legitimate applications the computer user wants. They obtain the moniker \u201cspyware\u201d when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realize that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software.\nThe Federal Trade Commission (FTC) has produced a consumer alert on spyware. The alert provides a list of warning signs that indicate that a computer might be infected with spyware and advice on what to do if it is. Additionally, the FTC has consumer information on spyware that includes a link to file a complaint with the commission through its \u201cOnGuard Online\u201d website.\nSeveral states have passed spyware laws, but there was no specific federal law and no legislation introduced in the 111th Congress.", "type": "CRS Report", "typeId": "REPORTS", "active": false, "formats": [ { "format": "HTML", "encoding": "utf-8", "url": "http://www.crs.gov/Reports/RL32706", "sha1": "54632ecb3bac39f6003ea85f3bd6057ba2480fe5", "filename": "files/20110112_RL32706_54632ecb3bac39f6003ea85f3bd6057ba2480fe5.html", "images": null }, { "format": "PDF", "encoding": null, "url": "http://www.crs.gov/Reports/pdf/RL32706", "sha1": "2a311780a364e728486be71239cf2d2a1b921e65", "filename": "files/20110112_RL32706_2a311780a364e728486be71239cf2d2a1b921e65.pdf", "images": null } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc31406/", "id": "RL32706_2010Sep08", "date": "2010-09-08", "retrieved": "2011-03-09T09:26:47", "title": "Spyware: Background and Policy Issues for Congress", "summary": "The Anti-Spyware Coalition (ASC) defines spyware as \"technologies deployed without appropriate user consent and/or implemented in ways that impair user control over (1) material changes that affect their user experience, privacy, or system security; (2) use of their system resources, including what programs are installed on their computers; and/or (3) collection, use, and distribution of their personal or other sensitive information. The main issue for Congress over spyware is whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law. This report discusses this issue, as well as the opinions of both the opponents and the supporters of industry self-regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20100908_RL32706_78745bc87856ebd03e6b7a434634a1cb61ffe7ac.pdf" }, { "format": "HTML", "filename": "files/20100908_RL32706_78745bc87856ebd03e6b7a434634a1cb61ffe7ac.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer software", "name": "Computer software" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "Computers", "name": "Computers" }, { "source": "LIV", "id": "Right of privacy", "name": "Right of privacy" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc491235/", "id": "RL32706_2010Jul20", "date": "2010-07-20", "retrieved": "2015-01-27T19:40:46", "title": "Spyware: Background and Policy Issues for Congress", "summary": "This report discusses whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law, as well as the opinions of both the opponents and the supporters of industry self-regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20100720_RL32706_23ce98bd13a13e798ec1a15a15313127fd27c13a.pdf" }, { "format": "HTML", "filename": "files/20100720_RL32706_23ce98bd13a13e798ec1a15a15313127fd27c13a.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer software", "name": "Computer software" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "Computers", "name": "Computers" }, { "source": "LIV", "id": "Right of privacy", "name": "Right of privacy" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc626974/", "id": "RL32706_2009Dec09", "date": "2009-12-09", "retrieved": "2015-06-15T14:46:40", "title": "Spyware: Background and Policy Issues for Congress", "summary": "This report discusses whether to enact new legislation specifically addressing spyware, or to rely on industry self-regulation and enforcement actions by the Federal Trade Commission (FTC) and the Department of Justice under existing law, as well as the opinions of both the opponents and the supporters of industry self-regulation.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20091209_RL32706_0e78d2fabc13d054a32400856a1f6306989d4d6c.pdf" }, { "format": "HTML", "filename": "files/20091209_RL32706_0e78d2fabc13d054a32400856a1f6306989d4d6c.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Computer software", "name": "Computer software" }, { "source": "LIV", "id": "Computer security measures", "name": "Computer security measures" }, { "source": "LIV", "id": "Computers", "name": "Computers" }, { "source": "LIV", "id": "Right of privacy", "name": "Right of privacy" }, { "source": "LIV", "id": "Computer crimes", "name": "Computer crimes" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc816885/", "id": "RL32706_2009May19", "date": "2009-05-19", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20090519_RL32706_645ad676b1f2c91696693d64212b4a7bea3ce654.pdf" }, { "format": "HTML", "filename": "files/20090519_RL32706_645ad676b1f2c91696693d64212b4a7bea3ce654.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc808097/", "id": "RL32706_2008Nov25", "date": "2008-11-25", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20081125_RL32706_1c5b1005afae5e2aeffbc6265bbe5154957b05f6.pdf" }, { "format": "HTML", "filename": "files/20081125_RL32706_1c5b1005afae5e2aeffbc6265bbe5154957b05f6.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc817135/", "id": "RL32706_2008Mar28", "date": "2008-03-28", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20080328_RL32706_c95d7d9316896d729d3ec0b91cb9ee1b7c4a4ab3.pdf" }, { "format": "HTML", "filename": "files/20080328_RL32706_c95d7d9316896d729d3ec0b91cb9ee1b7c4a4ab3.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc805391/", "id": "RL32706_2007Sep26", "date": "2007-09-26", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20070926_RL32706_9be75e7d085960214957de4a6094ab5c052ca284.pdf" }, { "format": "HTML", "filename": "files/20070926_RL32706_9be75e7d085960214957de4a6094ab5c052ca284.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs10401/", "id": "RL32706_2006Jul17", "date": "2006-07-17", "retrieved": "2008-12-11T20:26:50", "title": "Spyware: Background and Policy Issues for Congress", "summary": "The term \"spyware\" is not well defined. Generally, it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit their information to someone else. Most spyware is installed surreptitiously, and most users are therefore unaware that spyware exists on their computers. A central point of the spyware debate in Congress is whether new laws are needed, or if industry self-regulation, coupled with enforcement actions under existing laws, such as the Trade Commission Act, is sufficient.", "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060717_RL32706_118d471edd486181bf91e2de8d759c30bb44e009.pdf" }, { "format": "HTML", "filename": "files/20060717_RL32706_118d471edd486181bf91e2de8d759c30bb44e009.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Consumers", "name": "Consumers" }, { "source": "LIV", "id": "Consumer protection - Law and legislation", "name": "Consumer protection - Law and legislation" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc808821/", "id": "RL32706_2006Jan31", "date": "2006-01-31", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20060131_RL32706_70c705c4f1dbd859371537d00cbcb14266e463ce.pdf" }, { "format": "HTML", "filename": "files/20060131_RL32706_70c705c4f1dbd859371537d00cbcb14266e463ce.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs8732/", "id": "RL32706 2005-10-25", "date": "2005-10-25", "retrieved": "2006-06-01T13:40:34", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20051025_RL32706_48c82e3bed610bef4d3899aa77fa104a2af10cae.pdf" }, { "format": "HTML", "filename": "files/20051025_RL32706_48c82e3bed610bef4d3899aa77fa104a2af10cae.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Consumer protection - Law and legislation", "name": "Consumer protection - Law and legislation" }, { "source": "LIV", "id": "Computer software - Law and legislation", "name": "Computer software - Law and legislation" }, { "source": "LIV", "id": "Consumers", "name": "Consumers" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc818283/", "id": "RL32706_2005Aug30", "date": "2005-08-30", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050830_RL32706_72941528d293b1a5ab4418a1f1fea9132798f38c.pdf" }, { "format": "HTML", "filename": "files/20050830_RL32706_72941528d293b1a5ab4418a1f1fea9132798f38c.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc815412/", "id": "RL32706_2005May24", "date": "2005-05-24", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050524_RL32706_8b97f88ee237a7420209949888ea7e97bc8b3884.pdf" }, { "format": "HTML", "filename": "files/20050524_RL32706_8b97f88ee237a7420209949888ea7e97bc8b3884.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc811719/", "id": "RL32706_2005May18", "date": "2005-05-18", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050518_RL32706_0f50f06fe72035197e9c9d9105166ba6c2d733c5.pdf" }, { "format": "HTML", "filename": "files/20050518_RL32706_0f50f06fe72035197e9c9d9105166ba6c2d733c5.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc817567/", "id": "RL32706_2005Apr04", "date": "2005-04-04", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050404_RL32706_402a21af3e774667164b601391c4be93648642d5.pdf" }, { "format": "HTML", "filename": "files/20050404_RL32706_402a21af3e774667164b601391c4be93648642d5.html" } ], "topics": [] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metacrs6776/", "id": "RL32706 2005-01-26", "date": "2005-01-26", "retrieved": "2005-08-10T09:07:51", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20050126_RL32706_ee0e3be6d658353e2f9f960f2587b4f5720fb8ef.pdf" }, { "format": "HTML", "filename": "files/20050126_RL32706_ee0e3be6d658353e2f9f960f2587b4f5720fb8ef.html" } ], "topics": [ { "source": "LIV", "id": "Technology", "name": "Technology" }, { "source": "LIV", "id": "Consumer protection - Law and legislation", "name": "Consumer protection - Law and legislation" }, { "source": "LIV", "id": "Computer software - Law and legislation", "name": "Computer software - Law and legislation" }, { "source": "LIV", "id": "Consumers", "name": "Consumers" } ] }, { "source": "University of North Texas Libraries Government Documents Department", "sourceLink": "https://digital.library.unt.edu/ark:/67531/metadc812833/", "id": "RL32706_2004Dec21", "date": "2004-12-21", "retrieved": "2016-03-19T13:57:26", "title": "Spyware: Background and Policy Issues for Congress", "summary": null, "type": "CRS Report", "typeId": "REPORT", "active": false, "formats": [ { "format": "PDF", "filename": "files/20041221_RL32706_72e905f0cf86f86dad7021da35ec4055ce5cea76.pdf" }, { "format": "HTML", "filename": "files/20041221_RL32706_72e905f0cf86f86dad7021da35ec4055ce5cea76.html" } ], "topics": [] } ], "topics": [ "Intelligence and National Security" ] }