Study on Activities Undertaken to Address Threats That Undermine Confidence in the Information Society, Such as Spam, Spyware and Malicious Software

Download Now Date Added: Nov 2009
Format: PDF

Bringing together the technical and investigative expertise of Different government agencies and establishing close cooperation with network operators and ISPs. The Commission further stresses the need to dedicate substantial resources to gather evidence, pursue investigations and mount prosecution in this field. As far as the role of industry is concerned the Communication of 2006 mentions three kinds of possible actions that could be taken in this field: adequate information to the users of software products about the processing of personal data via the installation of software or data on the user's device, companies that have their products advertised online should contractually prohibit and monitor against the illegal use of software Illegal use of software by advertising companies.