Title :
Combating spam, spyware, and other desktop intrusions: legal considerations in operating trusted intermediary technologies
Author :
Curran, Charles D.
Abstract :
To prevent spam, spyware, and other intrusions, network operators and software providers deploy trusted intermediary technologies to protect their end users and networks. These technologies can be designed to anticipate legal challenges that may be raised by the companies and other actors whose behaviors they inhibit
Keywords :
legislation; security of data; unsolicited e-mail; desktop intrusion prevention; legal considerations; network operations; spam prevention; spyware prevention; trusted intermediary technologies; Computer security; Costs; Filtering; Filters; Intelligent networks; Law; Legal factors; Postal services; Privacy; Unsolicited electronic mail; network operations; spam; spyware;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2006.60