{"id":75,"date":"2006-02-20T14:25:58","date_gmt":"2006-02-20T19:25:58","guid":{"rendered":"http:\/\/70.86.87.84\/?p=75"},"modified":"2006-02-20T14:25:58","modified_gmt":"2006-02-20T19:25:58","slug":"anti-spyware-coalition-workshop","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/","title":{"rendered":"Anti-Spyware Coalition Workshop"},"content":{"rendered":"<p class=\"byline\">&#8211;Dave Methvin, Chief Techology Officer, PC Pitstop<\/p>\n<p>On February 8 and 9, I had the opportunity to participate in the <a href=\"http:\/\/www.antispywarecoalition.org\/events\/feb2006agenda.htm\" target=\"_blank\">Anti-Spyware Coalition Public Workshop<\/a>. The event brought together representatives from the software industry and government, including the  <a href=\"http:\/\/ftc.gov\" target=\"_blank\">Federal Trade Commission<\/a> and the  <a href=\"http:\/\/cdt.org\" target=\"_blank\">Center for Democracy and Technology<\/a>. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The <a href=\"http:\/\/www.antispywarecoalition.org\/\" target=\"_blank\">Anti-Spyware Coalition<\/a> has been working to craft  <a href=\"http:\/\/www.antispywarecoalition.org\/documents\/definitions.htm\" target=\"_blank\">clear definitions<\/a> of acceptable software installation behavior.<\/p>\n<p><a href=\"http:\/\/benedelman.org\" target=\"_blank\">Ben Edelman<\/a> and and I participated in  the final panel of the day, intended to be a look ahead at how the problem and solutions might evolve. Ben and I put together screen shots to illustrate a few of the antics that happen every day on the Internet. You can see Ben&#8217;s screen shots <a href=\"http:\/\/www.benedelman.org\/news\/012606-1.html\" target=\"_blank\">here<\/a> and I&#8217;ll show you mine below. The main theme of both presentations was that major ad networks&#8211;including  Google and Yahoo&#8211;are allowing their systems to be exploited by the purveyors of unwanted software, and actually providing a channel to make it profitable.<\/p>\n<h3>Hey Adults, Play Kids Games!<\/h3>\n<p>In late January, I sat down and did a little browsing experiment. I Googled for the search term  <a href=\"http:\/\/www.google.com\/search?hl=en&amp;q=play+kids+games\" target=\"_blank\"><em>play kids games<\/em><\/a> and visited the first page or two of search results. The first site that showed up was (no surprise) <a href=\"http:\/\/www.playkidsgames.com\" target=\"_blank\">playkidsgames.com<\/a>; despite the &#8220;for all ages&#8221; tag, its selection of games and use of a  cartoon frog character clearly seems to be aimed at a younger audience.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"\/images\/news\/p-180-a.jpg\" height=\"442\" width=\"500\" \/><\/p>\n<p>If you click on the Google ad that says &#8220;Free Unlimited Games&#8221;, as a small child might do, you&#8217;re taken to the TotallyFunFreeStuff.com site and given the opportunity to play Bubble Burst, another game that seems aimed at a younger audience.<\/p>\n<p><img decoding=\"async\" src=\"\/images\/news\/p-180-b.jpg\" height=\"362\" width=\"550\" \/><\/p>\n<p>But wait, what&#8217;s that at the bottom of the screen? They&#8217;ve helpfully checked a box that says you&#8217;re 18 or older and agree to their license, although it&#8217;s so far down the screen it&#8217;s unlikey to be seen at all. If you click the Play Now button you will download and install not only the game, but invasive Zango adware from 180Solutions. If that name seems familiar, it may be because the Center for Democracy and Technology has <a href=\"http:\/\/www.cdt.org\/privacy\/spyware\/\" target=\"_blank\">filed a complaint<\/a> against 180Solutions for its long history of questionable practices.<\/p>\n<h3>Ask Jeeves to Leave My Kids Alone<\/h3>\n<p>Here&#8217;s another example from  <a href=\"http:\/\/billybear4kids.com\">billybear4kids.com<\/a>,  whose design certainly seems to be aimed at young children. The ads at the top of the page are delivered by Casale Media, and are for the MyFunCards.com site run by Ask Jeeves.<\/p>\n<p><img decoding=\"async\" src=\"\/images\/news\/p-aj-a.jpg\" height=\"413\" width=\"500\" \/><\/p>\n<p>Just click on the ad with the cute bears and puppies&#8211;as many kids would be tempted to do&#8211;and you&#8217;ll find an even more adorable display:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"\/images\/news\/p-aj-b.jpg\" height=\"345\" width=\"550\" \/><\/p>\n<p>The picture of the bears is a cute animation with the two baby bears greeting daddy as he returns home from work.  Hey kids, click the big red button to get cute, fun, free greeting cards! Junior&#8217;s parents may be unhappy that the software has significantly reconfigured their system by adding several new applications and toolbars and changing the browser&#8217;s search engine choices. It may also modify any outgoing emails so that they spread the word about this great software that is now installed. Some of those details are described on this screen and the <a href=\"http:\/\/www.funwebproducts.com\/eula\/index.html\" target=\"_blank\">end user license agreement<\/a> mentioned there, which also says you must be 18 or you cannot click on  Mister Big Red Button. So why was an ad like this on a child-oriented site at all? As of mid-February, I am still seeing these and several other questionably-targeted ads.<\/p>\n<h3>Government&#8217;s Role?<\/h3>\n<p>The &#8220;adware&#8221; industry has tried self-regulation for years and has come up short. Inadequate disclosure of the purpose of this software is bad enough for adults, but the targeting of children as &#8220;mules&#8221; to install this software is inexcusable. This is where Federal Trade Commission oversight could come into play.<\/p>\n<p>The FTC&#8217;s <a href=\"http:\/\/www.ftc.gov\/bcp\/conline\/pubs\/buspubs\/900number.htm\" target=\"_blank\">900-number rule<\/a> offers a framework that was able to solve a very similar problem. (I have <a href=\"?p=71\">mentioned this rule before<\/a>.) The 900-number rule applies specific requirements for advertising 900-number services in situations where the audience is under the age of 18, and generally prohibits ads targeted to children under age 12. What we need, then, are tools to identify child-oriented sites so that advertisers can easily avoid them&#8211;and be held responsible when they don&#8217;t.<\/p>\n<p>Here is my proposal:<\/p>\n<ol>\n<li> Ad networks should ask each site in their network to fill out a profile indicating the age demographic of their visitors. If no hard data is available, as is often the case, the site operator should give reasonable estimates of the target audience. The site&#8217;s content, for example, often provides a clue about the target audience. (In the two sites above, is there any doubt that most visitors are under 18 and many are under 12?)<\/li>\n<li> Advertisers should indicate whether their ads should be displayed on sites in the ad network that have a majority audience under the age of 18. Immediate software downloads that require acceptance of a license agreement should not be advertised on such sites, since minors cannot enter into such agreements.<\/li>\n<li> The steps above only create a framework for compliance. Given that framework, the FTC can create specific 900-number-like rules that clarify what is acceptable and what is not. That will allow them to judge whether ad networks, web site operators, and advertisers are adequately protecting children and the computers they use.<\/li>\n<\/ol>\n<p>Adware companies often talk about how the user agreed to install their software. Yet ads like the ones showed here demonstrate at least one aspect of the true reality. Children are being tricked into installing this stuff. Adware companies are filled with shrewd businessmen that measure every aspect of their business; the fact that they continue to advertise on these sites says that it&#8217;s a profitable way to spread their software. That needs to stop, now.<\/p>\n<p>I have mixed feelings about these events. Is there any doubt that some companies deceive consumers into installing unwanted software that reconfigures and\/or breaks their computer? Spyware fighters expose these situations month after month,  even as new <a href=\"http:\/\/www.stopbadware.org\" target=\"_blank\">antispyware<\/a> <a href=\"http:\/\/www.antispywarecoalition.org\" target=\"_blank\">organizations<\/a> appear. Although I don&#8217;t have a lot of hope events like this anti-spyware conference will change things in the near term, I attend them to stay in touch with others who are as dedicated to fighting spyware as PC Pitstop has been. This time it included  <a href=\"http:\/\/billpstudios.blogspot.com\/\" target=\"_blank\">Bill Pytlovany<\/a>, <a href=\"http:\/\/www.spywarewarrior.com\" target=\"_blank\">Suzy Turner<\/a>, <a href=\"http:\/\/sunbeltblog.blogspot.com\" target=\"_blank\">Alex Eckelberry<\/a>, <a href=\"http:\/\/www.paperghost.com\" target=\"_blank\">Chris Boyd<\/a>, <a href=\"http:\/\/www.benedelman.org\" target=\"_blank\">Ben Edelman<\/a>, and <a href=\"http:\/\/www.spywarewarrior.com\/uiuc\/main.htm\" target=\"_blank\">Eric Howes<\/a> <a href=\"http:\/\/www.sunbelt-software.com\/Press.cfm?id=138\" target=\"_blank\">(now at Sunbelt)<\/a>. Maybe, just maybe, someone was listening this time.<\/p>\n<p>Comments? Questions? Please make a post in the Site Feedback section of our  <a href=\"http:\/\/support.pcpitstop.com\/\">forums<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"byline\">&#8211;Dave Methvin, Chief Techology Officer, PC Pitstop<\/p>\n<p>On February 8 and 9, I had the opportunity to participate in the <a href=\"http:\/\/www.antispywarecoalition.org\/events\/feb2006agenda.htm\" target=\"_blank\">Anti-Spyware Coalition Public Workshop<\/a>. The event brought together representatives from the software industry and government, including the  <a href=\"http:\/\/ftc.gov\" target=\"_blank\">Federal Trade Commission<\/a> and the  <a href=\"http:\/\/cdt.org\" target=\"_blank\">Center for Democracy and Technology<\/a>. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The <a href=\"http:\/\/www.antispywarecoalition.org\/\" target=\"_blank\">Anti-Spyware Coalition<\/a> has been working to craft  <a href=\"http:\/\/www.antispywarecoalition.org\/documents\/definitions.htm\" target=\"_blank\">clear definitions<\/a> of acceptable software installation behavior.<\/p>\n","protected":false},"author":3,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2867,12],"tags":[3160,3557],"class_list":["post-75","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spyware","category-the-pit-blog","tag-adware","tag-anti-spyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anti-Spyware Coalition Workshop<\/title>\n<meta name=\"description\" content=\"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anti-Spyware Coalition Workshop\" \/>\n<meta property=\"og:description\" content=\"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2006-02-20T19:25:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dave\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/\"},\"author\":{\"name\":\"Dave\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/410cb009e8536b3c2bd1f16efe1718bf\"},\"headline\":\"Anti-Spyware Coalition Workshop\",\"datePublished\":\"2006-02-20T19:25:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/\"},\"wordCount\":1131,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Adware\",\"anti-spyware\"],\"articleSection\":[\"Spyware\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/\",\"name\":\"Anti-Spyware Coalition Workshop\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2006-02-20T19:25:58+00:00\",\"description\":\"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/anti-spyware-coalition-workshop\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anti-Spyware Coalition Workshop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/410cb009e8536b3c2bd1f16efe1718bf\",\"name\":\"Dave\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/dave\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anti-Spyware Coalition Workshop","description":"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/","og_locale":"en_US","og_type":"article","og_title":"Anti-Spyware Coalition Workshop","og_description":"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.","og_url":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2006-02-20T19:25:58+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Dave","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Dave","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/"},"author":{"name":"Dave","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/410cb009e8536b3c2bd1f16efe1718bf"},"headline":"Anti-Spyware Coalition Workshop","datePublished":"2006-02-20T19:25:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/"},"wordCount":1131,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Adware","anti-spyware"],"articleSection":["Spyware","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/","url":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/","name":"Anti-Spyware Coalition Workshop","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2006-02-20T19:25:58+00:00","description":"--Dave Methvin, Chief Techology Officer, PC Pitstop On February 8 and 9, I had the opportunity to participate in the Anti-Spyware Coalition Public Workshop. The event brought together representatives from the software industry and government, including the Federal Trade Commission and the Center for Democracy and Technology. In the past year the FTC has filed suit against several of the worst spyware offenders including Enternet Media, and the CDT recently filed an FTC complaint against 180Solutions for its practices. The Anti-Spyware Coalition has been working to craft clear definitions of acceptable software installation behavior.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/anti-spyware-coalition-workshop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Anti-Spyware Coalition Workshop"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/410cb009e8536b3c2bd1f16efe1718bf","name":"Dave","url":"https:\/\/www.pcmatic.com\/blog\/author\/dave\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/75\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}