SlideShare una empresa de Scribd logo
1 de 28
Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
When you registered to play EVONY,  did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
 If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009)  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process.  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In America the Children’s Online Privacy and Protection Act  does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In fact if  the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor?  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy.   Privacy (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997).  Security (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If the Terms of Use Agreement was not read you  would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October  15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October  5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf.  Reference List

Más contenido relacionado

Similar a Net 213 Online Policy Primer

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditionstheextraaedge
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Naji El Kotob
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.nephthysnile
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesKimigory
 
Domain names
Domain namesDomain names
Domain namessngd0306
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launchSqueeze Mobi
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sitesSteve Smith
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme referenceSiva Prasad K V
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecretsPaul Counts
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in CoimbatoreSolubilis
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policygolferboy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docxtheextraaedge
 
The Business Pitch
The Business PitchThe Business Pitch
The Business PitchEdith Yeung
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Dr Saim Ali soomro
 

Similar a Net 213 Online Policy Primer (20)

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditions
 
Document 2
Document 2Document 2
Document 2
 
Website terms of use sample
Website terms of use sampleWebsite terms of use sample
Website terms of use sample
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc Sites
 
Domain names
Domain namesDomain names
Domain names
 
Unity terms
Unity termsUnity terms
Unity terms
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launch
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sites
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme reference
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecrets
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in Coimbatore
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx
 
Copan ppc
Copan ppcCopan ppc
Copan ppc
 
The Business Pitch
The Business PitchThe Business Pitch
The Business Pitch
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Net 213 Online Policy Primer

  • 1. Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
  • 2. When you registered to play EVONY, did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
  • 3. If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
  • 4. Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
  • 5. To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
  • 6. The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 7. In America the Children’s Online Privacy and Protection Act does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 8. The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 9. In fact if the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 10. “REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 11. While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 12. The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 13. As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 14. As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor? Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 15. As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 16. “WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 17. The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 18. It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 19. “WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 20. How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 21. While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997). Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 22. “REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 23. While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 24. If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 25. While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 26. If the Terms of Use Agreement was not read you would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 27. I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
  • 28. COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October 15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October 5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf. Reference List

Notas del editor

  1. Terms of Use Agreement.