SlideShare une entreprise Scribd logo
1  sur  28
Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
When you registered to play EVONY,  did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
 If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009)  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process.  Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In America the Children’s Online Privacy and Protection Act  does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
In fact if  the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to.  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor?  Privacy (EVONY Logo, 2009) Terms of Use Agreement.
As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy.   Privacy (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
“WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997).  Security (EVONY Logo, 2009) Terms of Use Agreement.
“REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
If the Terms of Use Agreement was not read you  would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October  15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October  5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf.  Reference List

Contenu connexe

Similaire à Net 213 Online Policy Primer

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditionstheextraaedge
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Naji El Kotob
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.nephthysnile
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesKimigory
 
Domain names
Domain namesDomain names
Domain namessngd0306
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaBrian Miller, Solicitor
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launchSqueeze Mobi
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sitesSteve Smith
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme referenceSiva Prasad K V
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecretsPaul Counts
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in CoimbatoreSolubilis
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policygolferboy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docxtheextraaedge
 
The Business Pitch
The Business PitchThe Business Pitch
The Business PitchEdith Yeung
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Dr Saim Ali soomro
 

Similaire à Net 213 Online Policy Primer (20)

terms+%26+conditions
terms+%26+conditionsterms+%26+conditions
terms+%26+conditions
 
Document 2
Document 2Document 2
Document 2
 
Website terms of use sample
Website terms of use sampleWebsite terms of use sample
Website terms of use sample
 
Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0Odoo - Educational Account for Students and Teachers Ver. 2.0
Odoo - Educational Account for Students and Teachers Ver. 2.0
 
Net303 Klout Policy Primer.
Net303 Klout Policy Primer.Net303 Klout Policy Primer.
Net303 Klout Policy Primer.
 
How To Make Money Online With Ptc Sites
How To Make Money Online With Ptc SitesHow To Make Money Online With Ptc Sites
How To Make Money Online With Ptc Sites
 
Domain names
Domain namesDomain names
Domain names
 
Unity terms
Unity termsUnity terms
Unity terms
 
Protecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social MediaProtecting Your Name and Brand from Abuse on Social Media
Protecting Your Name and Brand from Abuse on Social Media
 
Mobi video leads launch
Mobi video leads launchMobi video leads launch
Mobi video leads launch
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
How to create membership porn sites
How to create membership porn sitesHow to create membership porn sites
How to create membership porn sites
 
Apple url scheme reference
Apple url scheme referenceApple url scheme reference
Apple url scheme reference
 
Killer profitsecrets
Killer profitsecretsKiller profitsecrets
Killer profitsecrets
 
Logo Registration in Coimbatore
Logo Registration in CoimbatoreLogo Registration in Coimbatore
Logo Registration in Coimbatore
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx103-Terms+%26+Conditions.docx
103-Terms+%26+Conditions.docx
 
Copan ppc
Copan ppcCopan ppc
Copan ppc
 
The Business Pitch
The Business PitchThe Business Pitch
The Business Pitch
 
Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)Keyword spy fast-start-guide (1)
Keyword spy fast-start-guide (1)
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Net 213 Online Policy Primer

  • 1. Renee Bird Net 213 Online Policy Primer (EVONY Logo, 2009) Terms of Use Agreement.
  • 2. When you registered to play EVONY, did you read the Terms of Use Agreement? http://www.evony.com/index.do?PageModule=Static&type=TandC (EVONY Logo, 2009) Terms of Use Agreement.
  • 3. If not you missed out on some really important information. (EVONY Logo, 2009) Terms of Use Agreement.
  • 4. Sections of the Agreement discussed in this presentation will deal with: Registration eligibility Privacy Security Account suspension or termination. Topics Discussed. (EVONY Logo, 2009) Terms of Use Agreement.
  • 5. To be eligible to register for EVONY you must be over 13 years old. You can agree to the Terms of Use for yourself and up to 3 children under your care that use the same account. (EVONY Terms of Use Agreement, 2009) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement. (EVONY Logo, 2009) Terms of Use Agreement.
  • 6. The reason that an adult is required to register is because EVONY is an American website and a valid email address is required as part of the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 7. In America the Children’s Online Privacy and Protection Act does not permit personally identifiable information to be collected from a child under 13 years old. This includes an email address. (COPPA -Children’s Online Privacy Protection Act, 1998) Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 8. The problem with this condition is that age is not validated in any way during the registration process. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 9. In fact if the Terms of Use Agreement was not read you would not even know that you needed to be an adult to register. Registration Eligibility (EVONY Logo, 2009) Terms of Use Agreement.
  • 10. “REGAN MERCANTILE US, LLC MAY MONITOR, RECORD, REVIEW, MODIFY AND/OR DISCLOSE YOUR CHAT SESSIONS, WHETHER VOICE OR TEXT, WITHOUT NOTICE TO YOU, AND YOU HEREBY CONSENT TO SUCH MONITORING, RECORDING, REVIEW, MODIFICATION AND/OR DISCLOSURE.” (EVONY Terms of Use Agreement, 2009) Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 11. While the Terms of Use Agreement admits to recording chat sessions it does not disclose how long this information is retained for. In fact the chat sessions could be stored indefinitely. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 12. The Terms of Use Agreement also does not declare the reasons for monitoring chat sessions, or who they release this information to. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 13. As a child is able to play on an account that a parent has registered, it is possible that personally identifiable information could be collected from a minor when monitoring chat. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 14. As collecting personal information from a minor is not permitted. (COPPA -Children’s Online Privacy Protection Act, 1998) How does Regan Mercantile US, LLC determine that they have recorded information from a minor? Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 15. As chat information in EVONY is collected and kept for an indeterminate time this data could become both searchable and permanent (Lessing ,1998). This constitutes a risk to personal privacy. Privacy (EVONY Logo, 2009) Terms of Use Agreement.
  • 16. “WHEN RUNNING, THE GAME MAY MONITOR YOUR COMPUTER'S RANDOM ACCESS MEMORY (RAM) AND/OR CPU PROCESSES FOR UNAUTHORIZED THIRD PARTY PROGRAMS RUNNING CONCURRENTLY WITH EVONY” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 17. The Terms of Use Agreement does not identify what Third Party programs are unauthorised. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 18. It also does not reveal what happens if an unauthorised third party product is discovered. Is the unauthorised program disabled? Does use of an unauthorised third party product result in account termination? Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 19. “WHEN THE GAME IS RUNNING, REGAN MERCANTILE US, LLC MAY OBTAIN CERTAIN IDENTIFICATION INFORMATION ABOUT YOUR COMPUTER AND ITS OPERATING SYSTEM, INCLUDING WITHOUT LIMITATION YOUR HARD DRIVES, CENTRAL PROCESSING UNIT, IP ADDRESS(ES) AND OPERATING SYSTEM(S), FOR PURPOSES OF IMPROVING THE GAME AND/OR THE SERVICE,” (EVONY Terms of Use Agreement, 2009) Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 20. How is this information used? How long is this information stored for? The Terms of Use Agreement does not clarify this. Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 21. While Regan Mercantile US, LLC claim that they are obtaining identifiable information to improve the game or service. It may in fact be a beneficial and efficient way of achieving social control (Introna, 1997). Security (EVONY Logo, 2009) Terms of Use Agreement.
  • 22. “REGAN MERCANTILE US, LLC MAY SUSPEND, TERMINATE, MODIFY, OR DELETE ACCOUNTS AT ANY TIME FOR ANY REASON OR FOR NO REASON, WITH OR WITHOUT NOTICE TO YOU.” (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 23. While playing EVONY a user can choose to purchase in game items with real money to accelerate their progress. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 24. If an account is suspended or terminated the virtual items that cost real money would be lost. Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 25. While this section of the Terms of Use Agreement does go on to explain that most account suspensions or terminations are due to violating the Terms of Use Agreement. (EVONY Terms of Use Agreement, 2009) Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 26. If the Terms of Use Agreement was not read you would not know what would constitute a violation of these terms. You would also be unaware that your account could be terminated at any time causing you to lose any purchased items . Account Suspension or Termination. (EVONY Logo, 2009) Terms of Use Agreement.
  • 27. I hope that this presentation has helped you to understand the EVONY Terms of Use Agreement and has allowed you to consider how this relates to your privacy and security. Thankyou for watching. Conclusion (EVONY Logo, 2009) Terms of Use Agreement.
  • 28. COPPA – Children’s Online Privacy Protection Act (1998). Retrieved October 15, 2009 from http://www.coppa.org/coppa.htm EVONY Logo [Image], (2009). Retrieved October 5, 2009, from http://fr.wikipedia.org/wiki/Fichier:Evony_logo.jpg EVONY Terms of Use Agreement (2009). Retrieved October 5, 2009 from http://www.evony.com/index.do?PageModule=Static&type=TandC Introna, L. D, (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28 (3), 259-275. Retrieved October 10, 2009 from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/119168173/PDFSTART Lessing , L. (1998). The Architecture of Privacy. Retrieved October 12, 2009 from http://cyber.law.harvard.edu/works/lessig/architecture_priv.pdf. Reference List

Notes de l'éditeur

  1. Terms of Use Agreement.