Feeds

House passes anti-spyware bills

Asks Senate to take its pick

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

The House of Representatives approved two anti-spyware bills on Monday. The bills take markedly different approaches to fighting the growing problem of invasive programs that snoop on user's online activities, effectively leaving it up to the Senate to thrash out a solution.

The Internet Spyware (I-SPY) Prevention Act of 2005 makes the unauthorised access of computers using spyware a criminal offence punishable by up to five years in prison. The second bill - called the SPY Act - requires firms to get the informed consent of users before installing programs on their PCs. Both bills have been sent off to Senate for further consideration, after been approved in the House by overwhelming majorities.

Similar anti-spyware legislation was introduced in Congress last year but concerns about how the rules might affect legitimate internet business lead to them running out of time before a consensus could be agreed. ®

Related stories

Spyware wars
Webroot: Spyware is Windows-only
US gov targets spyware outfit
House approves anti-spyware bill

Intelligent flash storage arrays

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.