Microsoft this week defended its Windows Genuine Advantage (WGA) tool against charges that it acts like spyware because it constantly checks in with Microsoft when a user boots a PC with the tool installed.When first introduced last year, the WGA, which checks a user’s copy of Windows XP to ensure it is not counterfeit or pirated, ran only on Windows PCs when a user would install automatic updates. Microsoft updated the tool, which is still in pilots, in April with a WGA Notifications feature that checks the legitimacy of Windows on a machine regardless of whether update services are being used.In a statement through its public relations firm Waggener Edstrom, Microsoft said that when the WGA Notifications checks in with Microsoft when a PC is booted, it is not providing any information to the vendor if a PC’s copy of Windows has already been validated. Instead, it is checking with a “server-side configuration setting to determine if WGA should run or not.” The check-in also gives Microsoft the ability to disable the WGA program, if necessary.Microsoft’s defense of WGA came after Lauren Weinstein, cofounder of People For Internet Responsibility, International Open Internet Coalition, and the Electronic Entertainment Policy Initiative, noticed that even on Windows XP systems that WGA already had verified as legitimate, the tool will repeatedly attempt to contact Microsoft every time the PC is booted. He wrote a posting on his blog about the behavior of the tool and suggested it may be acting like spyware, which is software that gathers user information through his or her Internet connection without the user’s knowledge.“I fail to see where Microsoft has a ‘need to know’ for this data after a system’s validity has already been established, and there may clearly be organizations with security concerns regarding the communication of boot-time information,” he wrote on his blog. Weinstein posted another blog entry after he spoke with Microsoft to get the company’s side of the story, and said he is still not convinced the behavior of WGA Notifications is above board. More importantly, he said the issue raises privacy concerns about how companies going forward will control software that increasingly is being delivered over the Internet as a rented service, as well as how they control and disseminate information by communicating with the renters of those services. Today, most users purchase software and maintain control over it themselves because they own it outright, and their communication with vendors is limited, Weinstein wrote. But that will change when more software is delivered as services, and companies may exploit the relationship they have with customers as well as their ability to make users authenticate themselves to use services.“The old models are dying, and if we don’t get ahead of the curve by understanding and properly framing the new models, we are likely to be very sorry after the fact,” Weinstein wrote.-Elizabeth Montalbano, IDG News Service (San Francisco Bureau)This article is posted on our Microsoft Informer page. For more news on the Redmond, Wash.-based powerhouse, keep checking in. Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content opinion Cisco debuts bold portfolio of network, security, and observability solutions and previews generative AI capabilities for Webex and Security Cloud Cisco’s innovative technologies help connect the dots of its network- and cloud-based ecosystem. By Pete Bartolik Jun 07, 2023 4 mins Cloud Security brandpost A guide to hybrid cloud deployment for innovation without disruption How do organizations balance their on-premises preferences and requisites with the crucial need to innovate? By Ahmed Helmy, Global Vice President, Avaya Experience Platform Product Management Jun 07, 2023 3 mins Hybrid Cloud brandpost Bringing AI to your organization? Better bring the right database Why Apache Cassandra offers the scalability, reliability, and speed required for building artificial intelligence applications. By Patrick McFadin Jun 07, 2023 7 mins Machine Learning Artificial Intelligence feature 7 ways to spot hidden IT talent within your ranks Your organization has hidden IT superstars in the making — both within and outside IT. Here’s how to find and elevate them for maximum impact. By John Edwards Jun 07, 2023 8 mins Staff Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe