• FreeAdvice has a new Terms of Service and Privacy Policy, effective May 25, 2018.
    By continuing to use this site, you are consenting to our Terms of Service and use of cookies.

Privacy Laws for Applications

Accident - Bankruptcy - Criminal Law / DUI - Business - Consumer - Employment - Family - Immigration - Real Estate - Tax - Traffic - Wills   Please click a topic or scroll down for more.

SilverOrange

Junior Member
What is the name of your state (only U.S. law)? Colorado

Hello all!
I have a complicated question. I am in college for Computer Networking\Programming, and I want to learn a bit more about the LEGAL side of programming, such as privacy laws. Now, a debate has come up between me and a friend about what companies can access on your computer legally. The argument is about a video game, we are trying to find a better way to ban people from the game that cheat or break the rules. Now, as of now there are a bunch of methods of doing this, but none of them are fool proof. What I want to know, where would I be able to read up on these laws, is there a distinguishable line between accessing amounts\certain areas of your computer for company use before it gets illegal. Right now, Sony and other top video game creators mostly use MAC or Hardware ID banning. This accesses the hardware ID of certain parts of your computer, mostly the hard drive and network interface card, and gets the unique ID.

So what I want to know, would an application or game be able to legally create a hidden file(s) on a user's PC, without their knowledge, in order to distinguish people apart even if they change other data such as Hardware ID's. I am saying no, because you didn't give them consent to do it, since it can't be in the Terms and Conditions otherwise it would negate the whole point of doing it in the first place.

I am sorry if I posted this in the wrong forum, this is the closest I could find to what I was talking about.
 


tranquility

Senior Member
No one really knows. We know that such a scheme by Sony with the rootkit when you played certain CD's cost them a bunch, but it is still not clear what the law is on such matters. As well, what it "is" is not what it will be. Such matters are still in flux. Read the following for a discussion on similar matters. Sure, they involve unauthorized access and you may be able to get around the "authorized" problem--maybe. Read the comments as well as a lot of the contributors are attorneys and law professors.

http://www.volokh.com/2013/01/27/aarons-law-drafting-the-best-limits-of-the-cfaa-and-a-reader-poll-on-a-few-examples-part-i/
http://www.volokh.com/2013/01/28/more-thoughts-on-the-six-cfaa-scenarios-about-authorized-access-vs-unauthorized-access/
http://www.volokh.com/2013/01/28/a-dubious-proposal-for-amending-the-computer-fraud-and-abuse-act/
 

Find the Right Lawyer for Your Legal Issue!

Fast, Free, and Confidential
data-ad-format="auto">
Top