{"id":1686,"date":"2007-06-06T00:00:00","date_gmt":"2007-06-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/06\/house-passes-restrictive-anti-spyware-bill\/"},"modified":"2021-12-30T11:39:48","modified_gmt":"2021-12-30T11:39:48","slug":"house-passes-restrictive-anti-spyware-bill","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/06\/house-passes-restrictive-anti-spyware-bill\/","title":{"rendered":"House passes restrictive anti-spyware bill"},"content":{"rendered":"<p>The U.S. House of Representatives passed on Wednesday a second bill aimed at restricting the actions of spyware purveyors and online data thieves, but many government and industry executives have argued that more regulations are not necessary.  The act is the second piece of anti-spyware legislation to pass the House in the last month &#8212; in late May, legislators gave the go-ahead to the Internet Spyware Prevention (I-SPY) Act.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A group of Web sites, including Google and CNET Networks, that rely on interactive advertising have lobbied for nearly a dozen changes (PDF) to the bill.<\/p>\n<p>The Information Technology Association of America, the American Bankers Association and the Interactive Advertising Bureau have all favored the I-SPY Act over the SPY Act, stated an CNET News.com article.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/519?ref=rss<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1686","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1686"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1686\/revisions"}],"predecessor-version":[{"id":4173,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1686\/revisions\/4173"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}