A loosely defined collection of computer software known as “spyware” has quickly become the subject of considerable public alarm. Recent bills introduced in Congress are a step in the right direction toward curtailing these hidden self-installed computer applications, but such efforts won’t be enough to ward off potential damage, the Center for Democracy and Technology concluded in a new study.

A loosely defined collection of computer software known as “spyware” has quickly become the subject of considerable public alarm. Recent bills introduced in Congress are a step in the right direction toward curtailing these hidden self-installed computer applications, but such efforts won’t be enough to ward off potential damage, the Center for Democracy and Technology concluded in a new study.

The study, “Ghosts In Our Machines: Background and Policy Proposals on the ‘Spyware’ Problem,” identified the range of applications known as spyware, clarified the core problems raised by these applications and provided tips about how to protect information and computers from spyware.

Real estate brokers and agents need to be aware of these potential threats because their computer systems hold the personal information of hundreds of clients and real estate transactions. The study identifies spyware applications as posing a “significant privacy threat” to users’ information and data stored in their computers, as well as larger problems.

“Privacy is one of the major concerns raised by spyware, but the larger issues are transparency and control,” the study noted.

Users lose control over their computers because they typically are unaware that spyware programs are installed and often are unable to uninstall them, according to the study. In some cases, these programs can change the appearance of Web sites or alter low-level system settings, causing poor system performance. This result can place a substantial burden on technical support departments, which can cost time and money.

“Users should have control over what programs are installed on their computers and over how their Internet connections are used,” the study noted. “A growing body of invasive applications takes away this control.”

The study looked at three existing laws that may have relevance to the most extreme cases of spyware, but argued it makes more sense to articulate basic privacy standards to which all programs should be held, rather than try to pin down specific regulations. Many spyware programs obtain user authorization buried deeply within the user agreement so they technically do not break any laws.

“Combating the most invasive of these technologies will require a combination of legislation, anti-spyware tools and self-regulatory policies,” the study noted. “More thought needs to be given to spyware as a problem of trespass in addition to as a privacy issue.”

Technology measures and user education will also be critical to any spyware solution, according to the study.

Technologies to help deal with spyware invasions are in various stages of development, the study noted. Applications that will search a hard drive for spyware applications and attempt to delete them include AdAware, Spybot Search and Destroy, Spyware Eliminator and BPS Spyware/Adware Remover.

Several groups are working on ways to detect and quarantine spyware programs before they are installed.

The National Association of Realtors in November launched Realtor Secure, a program that aims to certify technology security practices used by MLSs and real estate brokers. The trade group wants to raise security consciousness among its members through the program, which uses third-party security consultants to evaluate system security based on industry best practices.

The study identified three categories of spyware. The first category includes programs that collect information from a user’s computer, possibly including such personal information as names and e-mail addresses. An example is nCase, which is produced by 180Solutions. This program is bundled with an array of free products and tracks Web sites viewed once it is installed. The program uses the data it collects to deliver targeted pop-up ads and the vendor sells that data to third parties, according to the study.

“This can compromise both a user’s control over his computer and Internet connection and his privacy,” the study stated.

The second category consists of programs that hijack the user’s computer and Internet connection for their own purposes. An example is Altnet.

The third category includes programs that are used mainly for advertising, but that don’t track users. An example is Aureate/Radiate. This type of spyware is unlikely to take control of the user’s computer, but it can silently and insecurely download updates without user prompting, according to the study.

***

Send a Letter to the Editor for publication.
Send a comment or news tip to our newsroom.
Please include the headline of the story.

Show Comments Hide Comments
Sign up for Inman’s Morning Headlines
What you need to know to start your day with all the latest industry developments
By submitting your email address, you agree to receive marketing emails from Inman.
Success!
Thank you for subscribing to Morning Headlines.
Back to top
Only 3 days left to register for Inman Connect Las Vegas before prices go up! Don't miss the premier event for real estate pros.Register Now ×
Limited Time Offer: Get 1 year of Inman Select for $199SUBSCRIBE×
Log in
If you created your account with Google or Facebook
Don't have an account?
Forgot your password?
No Problem

Simply enter the email address you used to create your account and click "Reset Password". You will receive additional instructions via email.

Forgot your username? If so please contact customer support at (510) 658-9252

Password Reset Confirmation

Password Reset Instructions have been sent to

Subscribe to The Weekender
Get the week's leading headlines delivered straight to your inbox.
Top headlines from around the real estate industry. Breaking news as it happens.
15 stories covering tech, special reports, video and opinion.
Unique features from hacker profiles to portal watch and video interviews.
Unique features from hacker profiles to portal watch and video interviews.
It looks like you’re already a Select Member!
To subscribe to exclusive newsletters, visit your email preferences in the account settings.
Up-to-the-minute news and interviews in your inbox, ticket discounts for Inman events and more
1-Step CheckoutPay with a credit card
By continuing, you agree to Inman’s Terms of Use and Privacy Policy.

You will be charged . Your subscription will automatically renew for on . For more details on our payment terms and how to cancel, click here.

Interested in a group subscription?
Finish setting up your subscription
×