call us today: +61755907739
Detecting Adware Spyware
  • Home
  • About
  • Contact
    • External Linking Policy
    • Commenting Policy
    • Terms Of Service
  • Sitemap
  • Search
  • Menu Menu

Three Types Of Non Malicious Spyware

August 29, 2011/0 Comments/in Spyware /by admin

In the last few years, spyware has been targeted in a lot of ways.

The law in many countries, including the United States, have passed laws that definitively outlaw some of its uses. There is also the constant updating and distribution of anti-spyware software that runs alongside or as a part of antivirus programs.

Lastly, one of the biggest ways spyware has been targeted is through informative media campaigns.

As a result people are all pretty much in fear of spyware. This is fair and expected, and actually for pretty much obvious reasons it’s encouraged. The thing is though that not everything that often gets classified as spyware is malicious, or at least not illegal.

There are forms of software that are designed to run undetected on a computer and record and report that aren’t necessarily breaking any laws. Whether or not these programs should still be considered spyware is up for a lot of debate.

Some adware companies have utilized the so-called spying strategy in the past, and many still do. When described as spyware though they have been known to get upset and lawsuits have been filed for defamation just because of the use of that word.

The more politically correct term used a lot in its place is “potentially unwanted software.” A few examples of (arguable) non malicious spyware are listed below.

Some Companies Use Non Malicious Spyware

A lot of employers track the work that their employees do and there is nothing wrong with that at all. The types of tracking used once included things such as casual observation, end of day reviews or checking back to see when and how long they were logged into their computers.

Nowadays employers are able to go the spyware route as well as or instead of doing those other things. The more common types of spyware that employers use are key logging applications. These run on the computer undetected and actually keep track of every key that’s pressed on the keyboard, thereby allowing the employer to easily look back over the amount of work being done.

Non Malicious Spyware Can Be Used For Spying On A Cheating Spouse

When one spouse suspects the other of cheating, or doing anything else undesirable, they can do all sorts of things. Short of actually having a conversation, they can hire detectives, follow them around, or catch them in a lie. Now there’s a more high-tech option that can be used.

Just like in the case of an office, key logging applications can be used to spy on a spouse. In a situation where the computer is mutually owned property, this has been argued as being a legal practice. The result is the ability to see if they are scheduling dates, writing love emails, etc.

Non Malicious Spyware Can Also Be Found In Some Forms Of Advertising

Advertising used to be put together as a result of lengthy market research campaigns. People were interviewed, surveyed and given products to test. The more modern alternative is to simply have a computer send back all the important tidbits. This is also sometimes referred to as adware.

Spyware is often installed on computers with user consent in exchange for getting free software. The spyware tracks what websites are visited so as to build a good understanding of what products that computer user would like. That way the advertisements that show up in their free software application will be targeted right at them.

Have you been spied on at work or maybe had a spouse use non malicious spyware to track your internet activities, if you have we would really like to here your story…

Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Reddit
  • Share by Mail
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Paid Ads

Recent Posts

  • What To Look For In Internet Security Software
  • How To Use Your Antivirus Software Correctly
  • What Are The Most Suitable Internet Security Systems
  • Antivirus Software FAQs
  • Warnings About Antivirus Software

Recent Comments

  • Michaelsen on Regcure Windows Cleaner, Clean, Repair And Optimize Your Computer
  • Jacob Koshy on Preventing PC Errors and Problems
  • Marry Smith on Preventing PC Errors and Problems
  • Subodh Gupta on Tips To Protect Yourself From A Computer Virus
  • Sam Hunt on RegGenie Is It The Best Registry Cleaner

More Paid Ads

© Copyright - Detecting Adware Spyware - powered by Enfold WordPress Theme
  • No Spam
  • Copyright
  • Disclaimer
  • DMCA
  • Links
  • FTC
  • Privacy
  • Sitemap
  • Social Media
  • TOS
Spyware The Top Five Threats You Should Be Aware Of Online Identity Theft, Don’t Be A Victim
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy
Accept settingsHide notification only