SlideShare uma empresa Scribd logo
1 de 28
Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
When you registered to play EVONY,  did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
 If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009)  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process.  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In America the Children’s Online Privacy and Protection Act  does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In fact if  the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor?  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy.   Privacy (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997).  Security (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If the Terms of Use Agreement was not read you  would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October  15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October  5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf.  Reference List

Mais conteúdo relacionado

Semelhante a Net 213 Online Policy Primer

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditionstheextraaedge
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Naji El Kotob
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.nephthysnile
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesKimigory
 
Domain names
Domain namesDomain names
Domain namessngd0306
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launchSqueeze Mobi
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sitesSteve Smith
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme referenceSiva Prasad K V
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecretsPaul Counts
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in CoimbatoreSolubilis
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policygolferboy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docxtheextraaedge
 
The Business Pitch
The Business PitchThe Business Pitch
The Business PitchEdith Yeung
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Dr Saim Ali soomro
 

Semelhante a Net 213 Online Policy Primer (20)

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditions
 
Document 2
Document 2Document 2
Document 2
 
Website terms of use sample
Website terms of use sampleWebsite terms of use sample
Website terms of use sample
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc Sites
 
Domain names
Domain namesDomain names
Domain names
 
Unity terms
Unity termsUnity terms
Unity terms
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launch
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sites
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme reference
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecrets
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in Coimbatore
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx
 
Copan ppc
Copan ppcCopan ppc
Copan ppc
 
The Business Pitch
The Business PitchThe Business Pitch
The Business Pitch
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)
 

Último

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Último (20)

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Net 213 Online Policy Primer

  • 1. Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
  • 2. When you registered to play EVONY, did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
  • 3. If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
  • 4. Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
  • 5. To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
  • 6. The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 7. In America the Children’s Online Privacy and Protection Act does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 8. The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 9. In fact if the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 10. “REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 11. While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 12. The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 13. As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 14. As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor? Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 15. As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 16. “WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 17. The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 18. It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 19. “WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 20. How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 21. While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997). Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 22. “REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 23. While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 24. If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 25. While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 26. If the Terms of Use Agreement was not read you would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 27. I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
  • 28. COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October 15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October 5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf. Reference List

Notas do Editor

  1. Terms of Use Agreement.