If you surf the internet, you are probably familiar with spyware. Millions of dollars are spent annually detecting, fending off and liberating computer systems from various forms of unwanted spyware. Many states have enacted specific statutes criminalizing unlawful spyware activity, while others prohibit the same illegal conduct under more “traditional” statutes, such as theft of services, criminal mischief, computer trespass or similar statutes.1
There are various forms of spyware, but most forms involve the interception and monitoring of certain electronic communications. Some spyware is a type of software that is utilized by vendors with the consent of their customers to learn how their product is being utilized. Other spyware is utilized by parents to monitor their children’s computer usage, while still other spyware is surreptitiously installed on a computer, without the user’s knowledge or consent, to monitor the subject’s electronic communications. This type of spyware may covertly monitor all the user’s electronic activities, including e-mails, passwords, and Web browsing. Every key stroke and every communication may be intercepted, exposing the user to identity theft, as well as the disclosure of their other confidential information.2
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]