• Mail
  • LinkedIn
  • Twitter
Hire Us
Law and Forensics
  • Home
  • Products
  • Services
    • Cybersecurity Services Group
      • Assessments
      • Automotive Industry
      • Board Consulting
      • Data Governance
      • Defense Industrial Base
      • Due Diligence
      • Financial Institutions
      • Incident Response
      • Pension and Plan Sponsors
      • Privacy
      • Tabletops
    • eDiscovery Services Group
      • Consulting
      • Data Preservation
      • Expert Witness
      • Training Practice
    • Forensic Services Group
      • Cloud Computing
      • Consulting
      • Expert Testimony
      • Internet of Things
      • Investigations
      • Mobile Device
      • Dispute Resolution Services
      • Social Media
      • Server Forensics
    • Digital Banking Services Group
      • Assessments
      • Blockchain
      • Cryptocurrency
      • CSO and CRO Advisory
      • Expert Witness
      • Regulatory Compliance
      • Strategy
      • Training
  • Insights
  • About Us
  • Search
  • Menu Menu
  • The Legal Status of Spyware

    INSIGHTS

Indiana University, Maurer School of Law

The Legal Status of Spyware

December 2006

By Daniel B. Garrie, Alan Blakley, & Matthew Armstrong

Identity theft is lucrative; stealing one’s good name is lucrative. What liability deters the people who steal digital information, even if it might be considered worthless? The Federal Trade Commission logged up to 250,000 identity theft complaints in 2004-100,000 more than in 2002. By and large, the law has been silent; and companies, some legitimate and some not, continue to collect, store, and process consumer information.

The law provides those whose private information is being misused little recourse and provides little protection for those legitimately mining information. Even though large-scale breaches grab the headlines, many victims of identity theft frequently cause the offending disclosure by unwittingly downloading software from the World Wide Web (“Web”) or responding to email “phishing” and other online and offline scams. Although courts find a right to privacy in the United States Constitution, that right generally only protects citizens from invasions by the government, not by corporate America. Today, federal law enables spyware, adware, and phishing businesses to mine consumer data with impunity. This Article demonstrates that although some laws are ineffective, others provide consumers with some minimal relief. In addition, the Article proposes an innovative solution. It also discusses the implications of the “evil-ution” of software developers in the context of the law, analyzing the evolution of the software developer, the impact of the rapidly increasing skill of the developers, and the disastrous outcomes that may occur if governments fail to act.

To read the full article, go to Indiana University. 

Newsletter

Contact Us

Contact Us
Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

CYBERSECURITY PRACTICE

Assessments
Automotive Industry
Board Consulting
Data Governance
Defense Industrial Base
Due Diligence
Financial Institutions
Incident Response
Pension and Plan Sponsors
Privacy
Tabletops

EDISCOVERY PRACTICE

Consulting
Data Preservation
Expert Witness

Training Practice

DIGITAL BANKING

Assessments
Blockchain

Cryptocurrency
CSO and CRO Advisory
Digital Banking Services
Expert Witness
Regulatory Compliance
Strategy
Training

FORENSICS PRACTICE

Cloud Computing
Consulting
Expert Testimony
Internet of Things
Investigations
Mobile Device
Dispute Resolution Services
Social Media
Server Forensics  

ARTICLES

Browse All L&F Articles
Journal of Law & Cyberwarfare
Books & Publications

WEBINARS

Browse All Webinars
Legal Cyber Academy

RESOURCES

About Us
Events
Search

Law & Forensics © 2021. All Rights Reserved
  • Privacy Policy
  • Legal Notices
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more×

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visit to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Other cookies

The following cookies are also needed - You can choose if you want to allow them:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept settingsHide notification only

Subscribe to Our Newsletter!

* indicates required







Please select all the ways you would like to hear from Law and Forensics:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp’s privacy practices here.