10 Things You Didn't Know You Signed
4. Facebook: Give advertisers information about me
Since its inception Facebook has been a lightning rod for controversy, often related to the terms users must abide by. One notable example was when many users were angered to learn about Beacon, an advertising initiative that would mine user data and publicly post online purchases they made. In 2009, the site was prompted to amend its privacy agreement when existing language was deemed open ended enough to allow it the ability to collect and repurpose posted content in any way it desired.
His concern is that "when you sign up, you're giving Amazon a license to do virtually whatever it wants with your blog's content."
"This includes modifying your content, or even turning it into a book without additional permission from you," he adds.The specific text Young refers to reads: "You hereby grant to each Amazon party, throughout the term of this agreement, a nonexclusive, worldwide right and license to distribute publications as described herein, directly and through third-party distributors, in all digital formats by all digital distribution means available, such right to include, without limitation, the right to: use, reproduce, adapt, modify, and create derivative works of and use and distribute, as we determine appropriate, in our sole discretion." 6. Kodak: I'll pay annually for free storage
How you behave yourself online is also defined, albeit with some gray areas, in many user agreements. Video game networks, for example, ban offensive language, including obscenities and slurs. Time Warner Cable's (TWC) Internet connections "may not be used to upload, post, transmit or otherwise make available any materials or content that violate or infringe on the rights or dignity of others." Does a YouTube video of getting hit in the crotch by a baseball bat count as an affront to your dignity? Failing to read before you click can also lead to ongoing charges, unwanted downloads, the monitoring of what sites you visit (and for how long) and even hijack your CPU. 8. Digsby: My computer is yours to use as you wish
There was considerable outcry a couple of years ago when users of the instant-messaging client and aggregator Digsby discovered that signing off on the user agreement gave the software the right to collect data and install additional programs derided by users as "malware" and "spamware." Agreeing to the terms meant you also gave permission for the software to "use the processing power of your computer when it is idle to run downloaded algorithms (mathematical equations) and code within a process. You understand that when the software uses your computer, it likewise uses your CPU, bandwidth and electrical power. The software will use your computer to solve distributed computing problems, such as but not limited to, accelerating medical research projects, analyzing the stock market, searching the Web and finding the largest known prime number." 9. E-cards: Please send me spam
E-cards, those cute and glittery holiday messages relatives love to send, often require you to approve a user agreement. Doing so can open the floodgates for spyware and pop-up programs. 10: McAfee/Microsoft: I won't tell anyone what I think of your product
To the dismay and ongoing disregard of hackers, many software packages prohibit modification or reverse engineering. Other software also tries to suppress users who might want to critique their purchase. "Hidden within the terms of many EULAs are often serious demands asking consumers to sign away fundamental rights," the Electronic Frontier Foundation says on its website. "Many agreements on database and middleware programs forbid the consumer from comparing his or her product with another and publicly criticizing the product. This obviously curtails free speech and makes it more difficult for consumers to get accurate information about what they're buying by inhibiting professional watchdog groups like Consumer Reports from conducting independent reviews." This is commonly done by forbidding "benchmarking," measuring the performance of hardware or software in a controlled and defined environment. EFF cites anti-virus giant McAfee (now owned by Intel (INTC)) and Microsoft (MSFT) for having included such language in past agreements. -- Written by Joe Mont in Boston.
>To contact the writer of this article, click here: Joe Mont. >To follow the writer on Twitter, go to http://twitter.com/josephmont. >To submit a news tip, send an email to: firstname.lastname@example.org.
Select the service that is right for you!COMPARE ALL SERVICES
Jim Cramer and Stephanie Link actively manage a real portfolio and reveal their money management tactics while giving advanced notice before every trade.
- $2.5+ million portfolio
- Large-cap and dividend focus
- Intraday trade alerts from Cramer
- Weekly roundups
Access the tool that DOMINATES the Russell 2000 and the S&P 500.
- Buy, hold, or sell recommendations for over 4,300 stocks
- Unlimited research reports on your favorite stocks
- A custom stock screener
- Upgrade/downgrade alerts
Jim Cramer's protege, David Peltier, identifies the best of breed dividend stocks that will pay a reliable AND significant income stream.
- Diversified model portfolio of dividend stocks
- Alerts when market news affect the portfolio
- Bi-weekly updates with exact steps to take - BUY, HOLD, SELL
All of Real Money, plus 15 more of Wall Street's sharpest minds delivering actionable trading ideas, a comprehensive look at the market, and fundamental and technical analysis.
- Real Money + Doug Kass Plus 15 more Wall Street Pros
- Intraday commentary & news
- Ultra-actionable trading ideas
Our options trading pros provide daily market commentary and over 100 monthly option trading ideas and strategies to help you become a well-seasoned trader.
- 100+ monthly options trading ideas
- Actionable options commentary & news
- Real-time trading community
- Options TV