At What Point Does a Service Become Spyware?