• DocumentCode
    950610
  • Title

    Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies

  • Author

    Curran, Charles D.

  • Volume
    4
  • Issue
    3
  • fYear
    2006
  • Firstpage
    45
  • Lastpage
    51
  • Abstract
    To prevent spam, spyware, and other intrusions, network operators and software providers deploy trusted intermediary technologies to protect their end users and networks. These technologies can be designed to anticipate legal challenges that may be raised by the companies and other actors whose behaviors they inhibit
  • Keywords
    legislation; security of data; unsolicited e-mail; desktop intrusion prevention; legal considerations; network operations; spam prevention; spyware prevention; trusted intermediary technologies; Computer security; Costs; Filtering; Filters; Intelligent networks; Law; Legal factors; Postal services; Privacy; Unsolicited electronic mail; network operations; spam; spyware;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2006.60
  • Filename
    1637380