BOSTON (TheStreet) -- If you have ever installed software, you are probably a liar.Any program you add to your hard drive, or Web service you use, will come with a set of rules, detailed in the Terms of Service or End User License Agreement. These are the pages and pages of text the majority of folks might, at best, skim the first few paragraphs of before clicking "I Agree" and getting on with life.
|You may get an unpleasant surprise if you click "agree" without reading software and Web user agreements.|
If you use Apple's ( AAPL) iTunes software and happen to be an international terrorist, don't be surprised if you someday find yourself shut off from your playlists. In its user agreement, Apple bans use of the software by those in "U.S.-embargoed countries" and "anyone on the U.S. Treasury Department's list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person's List or Entity." "You also agree that you will not use these products for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of missiles, or nuclear, chemical or biological weapons," it adds, reducing the likelihood Lady Gaga will work detailed instructions for a plutonium-based neutron trigger into a song. In another paragraph, Apple warns that the iTunes software "is not intended or suitable for use in situations or environments where the failure of, or errors or inaccuracies in the content, data or information provided by, the apple software could lead to death, personal injury or severe physical or environmental damage, including without limitation the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, life support or weapons systems." Any content you create or post via a Web portal or social media site could become the property of your host. 2. Google: Do what you want with my stuff
The 2008 launch of Google's ( GOOG) Chrome browser was met with controversy when a scan of its user agreement uncovered that users "give Google a perpetual, irrevocable, worldwide, royalty-free and nonexclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any content which you submit, post or display on or through, the services." Amid objections, Google added: "You retain copyright and any other rights you already hold in content which you submit, post or display on or through, the services." 3. Yahoo: Own my stuff
Before that, in 1999, Yahoo ( YHOO) bought the free website hosting service Geocities and amended the user agreement so it would exclusively own any content hosted on these sites. Bad publicity and a boycott led Yahoo to abandon that plan.
Since its inception Facebook has been a lightning rod for controversy, often related to the terms users must abide by. One notable example was when many users were angered to learn about Beacon, an advertising initiative that would mine user data and publicly post online purchases they made. In 2009, the site was prompted to amend its privacy agreement when existing language was deemed open ended enough to allow it the ability to collect and repurpose posted content in any way it desired. 5. Amazon Kindle: My blog belongs to you
Internet law blogger Mike Young recently cautioned against using Amazon's ( AMZN) Kindle as an outlet for blogs. His concern is that "when you sign up, you're giving Amazon a license to do virtually whatever it wants with your blog's content." "This includes modifying your content, or even turning it into a book without additional permission from you," he adds. The specific text Young refers to reads: "You hereby grant to each Amazon party, throughout the term of this agreement, a nonexclusive, worldwide right and license to distribute publications as described herein, directly and through third-party distributors, in all digital formats by all digital distribution means available, such right to include, without limitation, the right to: use, reproduce, adapt, modify, and create derivative works of and use and distribute, as we determine appropriate, in our sole discretion." 6. Kodak: I'll pay annually for free storage
How you behave yourself online is also defined, albeit with some gray areas, in many user agreements. Video game networks, for example, ban offensive language, including obscenities and slurs. Time Warner Cable's ( TWC) Internet connections "may not be used to upload, post, transmit or otherwise make available any materials or content that violate or infringe on the rights or dignity of others." Does a YouTube video of getting hit in the crotch by a baseball bat count as an affront to your dignity? Failing to read before you click can also lead to ongoing charges, unwanted downloads, the monitoring of what sites you visit (and for how long) and even hijack your CPU. 8. Digsby: My computer is yours to use as you wish
There was considerable outcry a couple of years ago when users of the instant-messaging client and aggregator Digsby discovered that signing off on the user agreement gave the software the right to collect data and install additional programs derided by users as "malware" and "spamware." Agreeing to the terms meant you also gave permission for the software to "use the processing power of your computer when it is idle to run downloaded algorithms (mathematical equations) and code within a process. You understand that when the software uses your computer, it likewise uses your CPU, bandwidth and electrical power. The software will use your computer to solve distributed computing problems, such as but not limited to, accelerating medical research projects, analyzing the stock market, searching the Web and finding the largest known prime number." 9. E-cards: Please send me spam
E-cards, those cute and glittery holiday messages relatives love to send, often require you to approve a user agreement. Doing so can open the floodgates for spyware and pop-up programs. 10: McAfee/Microsoft: I won't tell anyone what I think of your product
To the dismay and ongoing disregard of hackers, many software packages prohibit modification or reverse engineering. Other software also tries to suppress users who might want to critique their purchase. "Hidden within the terms of many EULAs are often serious demands asking consumers to sign away fundamental rights," the Electronic Frontier Foundation says on its website. "Many agreements on database and middleware programs forbid the consumer from comparing his or her product with another and publicly criticizing the product. This obviously curtails free speech and makes it more difficult for consumers to get accurate information about what they're buying by inhibiting professional watchdog groups like Consumer Reports from conducting independent reviews." This is commonly done by forbidding "benchmarking," measuring the performance of hardware or software in a controlled and defined environment. EFF cites anti-virus giant McAfee (now owned by Intel ( INTC)) and Microsoft ( MSFT) for having included such language in past agreements. -- Written by Joe Mont in Boston. >To contact the writer of this article, click here: Joe Mont. >To follow the writer on Twitter, go to http://twitter.com/josephmont. >To submit a news tip, send an email to: email@example.com.