SlideShare ist ein Scribd-Unternehmen logo
1 von 25
PRIVACY IN ESPORTS: MAIN
AREAS OF HIGH RISK
Trilateral Research Ltd.
Crown House
72 Hammersmith Road
W14 8TH, London
+ 44 (0)20 7559 3550
@Trilateral_UK
Dr Jedrzej Czarnota
COMPANY PROFILE
Trilateral Research is a leading London-based multidisciplinary research,
consulting and technology development company.
Our team collaborates across social sciences and technology, to bring insights
from each into supporting data driven innovation.
Small enterprise (SME) ≈ 30 staff members.
Running 20-25 projects at any given time.
Almost all research and technical staff have postdoctoral experience
(≈90% have PhDs).
Extensive publication list and excellent international profile:
http://trilateralresearch.co.uk/full-list-of-publications/
ETHICS, PRIVACY & DATA PROTECTION
SELECT CLIENTS
 A structured approach
 11+ years practitioner experience
 Deep understanding of ICO requirements and GDPR compliance
 Experts in PIA and EIA theory and practice
 Well-versed in research ethics: informed consent, ethics monitoring, regulatory
compliance.
 Contributing to standards in this area: ISO 29134/WD29134 - near final draft
on PIA guidance
ACUTE CASE OF
ONLINE PRIVACY
eSports and data collection
ESPORTS – BRAVE NEW WORLD?
 New field; rapid development driven by strong industry needs,
 Closely linked to advertising and innovative revenue streams,
 Sporting activity itself is proprietary (unlike majority of sports),
 Reported cutthroat practices (Taylor, 2012),
 Audience considerations – many young (at least 13 to use a game) and vulnerable people
(Boellstorff, 2008),
 Player protection – both of professional users (unions) and regular users (low power),
 eSports = first parties (VG devs) + third parties (broadcasters) + second parties (platforms),
 All actors collect information,
 Playing the game means automatic consent.
 Still developing regulations – need for best practices in PIA (TRUSTe too close to the
industry?)
THIRD PARTY INFO USE
 Details of your visits to our site including, but not limited to, transactions, traffic data, location
data, weblogs and other communication data.
 We may collect information about your computer, including where available your IP address,
operating system and browser type.
 We may obtain information about your general internet usage by using a cookies.
 Transactions, IP Address, a unique user ID, device type, device identifiers, browser types and
language, referring and exit page addresses, platform type, version of software installed, system
type, the content and pages accessed, the number of clicks made, the amount of time spent on
pages, the dates and times, and other similar information.
 The data that we collect from you may be transferred to, and stored at, a destination outside
the European Economic Area (“EEA”),
 Accessing social media profiles if linked (account creation or feature use).
FIRST PARTY INFO USE
 Use of personal info to: expand business and measure the effectiveness of operations,
 Players relinquish any expectation of privacy through using forums and in-game chat,
 Personal info shared with subsidiaries and affiliates, vendors and service providers, including
payment info,
 Contact, authentication, payment, including the amount of money player spends,
 Demographic and preference info, computer information including RAM (‘consent to
monitor’),
 Personal info as a transferable asset (merger, sale, joint venture, bankruptcy,…),
 Non personal info (aggregated, anonymized, de-identified) used to manage player
relationship and sharing with second party developers,
 Game websites not responsive to DNT (do not track) signals,
 Partial coverage by TRUSTe program.
TRANSPARENCY
Information privacy
and data surveillance
by corporate actors
MAIN QUESTIONS
 Are the players and viewers made aware of the privacy policies and
practices of the game sponsors in an easily comprehensible way?
 If any personal data is being processed, is the processing secure?
 Is the data protected satisfactorily?
 Do players and viewers have access to their data? Can they amend it if
necessary?
 Do the broadcasters, platforms, sponsors, or developers share or sell
the data they capture?
INFORMATION PRIVACY AND
SURVEILLANCE
 Privacy Protection is a process of finding appropriate balances between
privacy and multiple competing interests (Roger Clarke, 2017).
 Systematic investigation or monitoring of the actions or communications of
one or more persons.
 Dataveillance (gathering of information from personal data systems).
 Personal dataveillance vs. mass dataveillance,
 Profiling of users (for advertising, sales, service use prediction,
development),
 Data gathered by different actors: videogame developers, platform owners,
broadcasting services.
NEW SURVEILLANCE
 Enforced by the game software architecture (server communication),
 Automatic monitoring software to prevent and detect disruptive behaviour
(cheating),
 Negative form of dataveiilance (Fuchs, 2011) and panopticon dynamic
(Gandy, 2012, Clarke, 2017),
 Downplaying of the negative sides of dataveillance by the industry.
 Emergent surveillant assemblage – non-human elements (code, legal docs)
are connected to human elements (players, moderators).
INFORMED CONSENT
Power imbalances between games and
players
BUSINESS-DRIVEN
DYNAMICS
 Do players agree to a record of their play, their personal details,
their key logging?
 Is any personal data captured from the viewers?
 Incentive for VG companies to invest in governance structures –
establishment of a transparent and fair sport,
 Low power of a player as the cost of moving to another game is
high (Castronova, 2005),
 Early days: the community decides which game becomes an
esport game (Kerr et al., 2013),
 Today: influenced by sponsorship money and broadcasters.
LONG-TERM TRENDS
 Privacy as contextual integrity (Nissenbaum, 2004).
 Privacy breach - when information is supplied in one context and then
extracted from it and used in another context, i.e., disrupting the integrity
of context.
 Example: RAM scanning in search of cheaters. Anti-cheating tools are
intrusive technologies as they collect information from all players’
computers.
 Example: lack of transparency and visibility of the surveillance mechanisms
in the eSports scene.
 Shift towards hierarchical surveillance (as opposed to lateral).
 This is opposite to the general trend on the Internet (Kerr et al., 2013).
HUMAN
IDENTIFICATION
Social interactions
and community
dynamics
KEY PROBLEMS
 Toxic social environments, cheating – in many online games,
 Need to establish and enforce social norms,
 Companies free to set their own rules within a game as long as they conform to broader
legal frameworks:
 protection of minors, data protection, general privacy, and intellectual property.
 Balance between right to privacy and the right to property (IP),
 Consent to record & broadcast from all players in a session – is gameplay public?
 Players’ identity – players may wish to remain anonymous,
 Shoutcasting – when private and sensitive data becomes public,
 Professional shoutcasters vs. amateur YouTube or Twitch users,
 Underage users (13 year old),
 Information disclosure: social media and related networks.
CONCLUSIONS
AND SUMMARY
Technology,
dataveillance and
power
POWER, TECHNOLOGY,
ETHICS
 Increasing surveillance power is enabled by big data
technologies,
 Panspectron – information gathered about everything (Braman,
2006),
 Ethical issues of discrimination against some players (i.e.,
Tribunal monitoring, change of behaviour, and conformity),
 Deviant behaviour constantly monitored – justified by economic
goals and a limited view of quality of service and community.
 Companies move towards more hierarchical and legalistic forms
of governance and less transparent forms of automated
dataveillance (Kerr et al., 2013).
ENFORCEMENT OF SURVEILLANCE
 Hierarchical surveillance
 Game architecture, software code, and game rules,
 Policy documents (PEGI, ISFE, ICDP, EULAs, TOS)
 Company community management practices,
 Company-produced paratexts,
 Lateral surveillance
 Community management,
 Peer and participatory surveillance, and player-produced paratexts,
 Driven by business model considerations: monetization, business expansion,
 Ensuring cheating-free environment (thus confirming the status as an eSport).
IN-BUILT BIASES AND SHORTCOMINGS
 Automated code is a designed agent and bears the biases of its
designers – an example of algorithmic surveillance (Gillespie, 2014),
 ISFE and ICDP concerned that GDPR might impose new restrictions on
what game companies can do with player data,
 Prioritizing values: punishing cheaters, but also tension between paying
players and banning them from community,
 Certain actions taken by game companies are not transparent and
infringe on the consumer rights of the players (i.e., the right of appeal).
GDPR
 General Data Protection Regulation will come into effect on 25 May 2018.
 Replacing Directive 95/46/EC and patchwork of national regulations.
 Includes (among others):
 Data Protection Officers to monitor large scale data gathering,
 Data Protection Impact Assessment for data gathering “likely to result in a high risk to the rights
and freedoms of natural persons” (Article 35(1, 3, 4)):
 Criteria examples: data transfer across the borders of EU, systematic monitoring, automated
decision-making with legal or similar effect, sensitive data, and others.
CONTACT US
 E-mail:
Jedrzej.Czarnota@trilateralresearch.com
 Website: http://trilateralresearch.co.uk
 Twitter: @Trilateral_UK @Jedczar
 Phone: +44 (0)7447 429 757
 Address: Crown House
72 Hammersmith Road
W14 8TH, London
United Kingdom

Weitere ähnliche Inhalte

Was ist angesagt?

Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform Operators
YogeshIJTSRD
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 

Was ist angesagt? (20)

Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
INFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL securityINFOMAGAZINE 8 by REAL security
INFOMAGAZINE 8 by REAL security
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform Operators
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon2017: Privacy Issues on the Horizon
2017: Privacy Issues on the Horizon
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Data breach at sony
Data breach at sonyData breach at sony
Data breach at sony
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 

Ähnlich wie Esports in the UK - privacy risks

ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
gcharlesj
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 

Ähnlich wie Esports in the UK - privacy risks (20)

Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in CybersecurityUnveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
Unveiling the Threat: The Impact of Spooling Attacks in Cybersecurity
 
5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance5 key steps for SMBs for reaching GDPR Compliance
5 key steps for SMBs for reaching GDPR Compliance
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
apidays LIVE Paris 2021 - The GDPR Developer Guide by Jerome Gorin, CNIL
 
Ist curriculum
Ist curriculumIst curriculum
Ist curriculum
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Ethical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptxEthical hacking - Footprinting.pptx
Ethical hacking - Footprinting.pptx
 
Bridging the physical and digital
Bridging the physical and digitalBridging the physical and digital
Bridging the physical and digital
 
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 

Mehr von Trilateral Research

Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Trilateral Research
 

Mehr von Trilateral Research (20)

Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
Designing Security Across Boundaries: mapping disperse data to collaborative...
Designing Security Across Boundaries:  mapping disperse data to collaborative...Designing Security Across Boundaries:  mapping disperse data to collaborative...
Designing Security Across Boundaries: mapping disperse data to collaborative...
 
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
Privacy and Data Protection: Limits and Opportunities for Unmanned Aerial Pla...
 
Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...Risky Borders: Designing togetherness using information technology for intero...
Risky Borders: Designing togetherness using information technology for intero...
 
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
DroneRules Pro: Supporting GDPR compliance through privacy culture among dron...
 
Ethics and technology in humanitarian setting
Ethics and technology in humanitarian settingEthics and technology in humanitarian setting
Ethics and technology in humanitarian setting
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
Technology for Human Trafficking and sexual exploitation - Trace Projects Fin...
 
Overview of CLARITY project
Overview of CLARITY projectOverview of CLARITY project
Overview of CLARITY project
 
CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.CRISP project: overview of findings and lessons learned.
CRISP project: overview of findings and lessons learned.
 
Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis Legal and ethical issues in social capital analysis
Legal and ethical issues in social capital analysis
 
Examining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster ResilienceExamining End-User Standardisation Needs for Disaster Resilience
Examining End-User Standardisation Needs for Disaster Resilience
 
A stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilienceA stakeholder based approach to standardisation for disaster resilience
A stakeholder based approach to standardisation for disaster resilience
 
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforceEvolving Technology - Delivering Neighbourhood Policing with a smaller workforce
Evolving Technology - Delivering Neighbourhood Policing with a smaller workforce
 
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and ChallangesSocial Media and ICT in Neighbourhood Policing - Opportunities and Challanges
Social Media and ICT in Neighbourhood Policing - Opportunities and Challanges
 
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
Social Media Analysis Tools for Preparedness and Disaster Risk Reduction
 
ENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentationENERGIC-OD @ GEO Business 2017 presentation
ENERGIC-OD @ GEO Business 2017 presentation
 
Enhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national levelEnhancing ethics assessment in R&I at the national level
Enhancing ethics assessment in R&I at the national level
 
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
Methodologies for Addressing Privacy and Social Issues in Health Data: A Case...
 

Kürzlich hochgeladen

Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
HyderabadDolls
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
HyderabadDolls
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
SayantanBiswas37
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 

Kürzlich hochgeladen (20)

Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
Gulbai Tekra * Cheap Call Girls In Ahmedabad Phone No 8005736733 Elite Escort...
 
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 

Esports in the UK - privacy risks

  • 1. PRIVACY IN ESPORTS: MAIN AREAS OF HIGH RISK Trilateral Research Ltd. Crown House 72 Hammersmith Road W14 8TH, London + 44 (0)20 7559 3550 @Trilateral_UK Dr Jedrzej Czarnota
  • 2. COMPANY PROFILE Trilateral Research is a leading London-based multidisciplinary research, consulting and technology development company. Our team collaborates across social sciences and technology, to bring insights from each into supporting data driven innovation. Small enterprise (SME) ≈ 30 staff members. Running 20-25 projects at any given time. Almost all research and technical staff have postdoctoral experience (≈90% have PhDs). Extensive publication list and excellent international profile: http://trilateralresearch.co.uk/full-list-of-publications/
  • 3. ETHICS, PRIVACY & DATA PROTECTION SELECT CLIENTS  A structured approach  11+ years practitioner experience  Deep understanding of ICO requirements and GDPR compliance  Experts in PIA and EIA theory and practice  Well-versed in research ethics: informed consent, ethics monitoring, regulatory compliance.  Contributing to standards in this area: ISO 29134/WD29134 - near final draft on PIA guidance
  • 4.
  • 5. ACUTE CASE OF ONLINE PRIVACY eSports and data collection
  • 6. ESPORTS – BRAVE NEW WORLD?  New field; rapid development driven by strong industry needs,  Closely linked to advertising and innovative revenue streams,  Sporting activity itself is proprietary (unlike majority of sports),  Reported cutthroat practices (Taylor, 2012),  Audience considerations – many young (at least 13 to use a game) and vulnerable people (Boellstorff, 2008),  Player protection – both of professional users (unions) and regular users (low power),  eSports = first parties (VG devs) + third parties (broadcasters) + second parties (platforms),  All actors collect information,  Playing the game means automatic consent.  Still developing regulations – need for best practices in PIA (TRUSTe too close to the industry?)
  • 7. THIRD PARTY INFO USE  Details of your visits to our site including, but not limited to, transactions, traffic data, location data, weblogs and other communication data.  We may collect information about your computer, including where available your IP address, operating system and browser type.  We may obtain information about your general internet usage by using a cookies.  Transactions, IP Address, a unique user ID, device type, device identifiers, browser types and language, referring and exit page addresses, platform type, version of software installed, system type, the content and pages accessed, the number of clicks made, the amount of time spent on pages, the dates and times, and other similar information.  The data that we collect from you may be transferred to, and stored at, a destination outside the European Economic Area (“EEA”),  Accessing social media profiles if linked (account creation or feature use).
  • 8. FIRST PARTY INFO USE  Use of personal info to: expand business and measure the effectiveness of operations,  Players relinquish any expectation of privacy through using forums and in-game chat,  Personal info shared with subsidiaries and affiliates, vendors and service providers, including payment info,  Contact, authentication, payment, including the amount of money player spends,  Demographic and preference info, computer information including RAM (‘consent to monitor’),  Personal info as a transferable asset (merger, sale, joint venture, bankruptcy,…),  Non personal info (aggregated, anonymized, de-identified) used to manage player relationship and sharing with second party developers,  Game websites not responsive to DNT (do not track) signals,  Partial coverage by TRUSTe program.
  • 9.
  • 10.
  • 11. TRANSPARENCY Information privacy and data surveillance by corporate actors
  • 12. MAIN QUESTIONS  Are the players and viewers made aware of the privacy policies and practices of the game sponsors in an easily comprehensible way?  If any personal data is being processed, is the processing secure?  Is the data protected satisfactorily?  Do players and viewers have access to their data? Can they amend it if necessary?  Do the broadcasters, platforms, sponsors, or developers share or sell the data they capture?
  • 13. INFORMATION PRIVACY AND SURVEILLANCE  Privacy Protection is a process of finding appropriate balances between privacy and multiple competing interests (Roger Clarke, 2017).  Systematic investigation or monitoring of the actions or communications of one or more persons.  Dataveillance (gathering of information from personal data systems).  Personal dataveillance vs. mass dataveillance,  Profiling of users (for advertising, sales, service use prediction, development),  Data gathered by different actors: videogame developers, platform owners, broadcasting services.
  • 14. NEW SURVEILLANCE  Enforced by the game software architecture (server communication),  Automatic monitoring software to prevent and detect disruptive behaviour (cheating),  Negative form of dataveiilance (Fuchs, 2011) and panopticon dynamic (Gandy, 2012, Clarke, 2017),  Downplaying of the negative sides of dataveillance by the industry.  Emergent surveillant assemblage – non-human elements (code, legal docs) are connected to human elements (players, moderators).
  • 15. INFORMED CONSENT Power imbalances between games and players
  • 16. BUSINESS-DRIVEN DYNAMICS  Do players agree to a record of their play, their personal details, their key logging?  Is any personal data captured from the viewers?  Incentive for VG companies to invest in governance structures – establishment of a transparent and fair sport,  Low power of a player as the cost of moving to another game is high (Castronova, 2005),  Early days: the community decides which game becomes an esport game (Kerr et al., 2013),  Today: influenced by sponsorship money and broadcasters.
  • 17. LONG-TERM TRENDS  Privacy as contextual integrity (Nissenbaum, 2004).  Privacy breach - when information is supplied in one context and then extracted from it and used in another context, i.e., disrupting the integrity of context.  Example: RAM scanning in search of cheaters. Anti-cheating tools are intrusive technologies as they collect information from all players’ computers.  Example: lack of transparency and visibility of the surveillance mechanisms in the eSports scene.  Shift towards hierarchical surveillance (as opposed to lateral).  This is opposite to the general trend on the Internet (Kerr et al., 2013).
  • 19. KEY PROBLEMS  Toxic social environments, cheating – in many online games,  Need to establish and enforce social norms,  Companies free to set their own rules within a game as long as they conform to broader legal frameworks:  protection of minors, data protection, general privacy, and intellectual property.  Balance between right to privacy and the right to property (IP),  Consent to record & broadcast from all players in a session – is gameplay public?  Players’ identity – players may wish to remain anonymous,  Shoutcasting – when private and sensitive data becomes public,  Professional shoutcasters vs. amateur YouTube or Twitch users,  Underage users (13 year old),  Information disclosure: social media and related networks.
  • 21. POWER, TECHNOLOGY, ETHICS  Increasing surveillance power is enabled by big data technologies,  Panspectron – information gathered about everything (Braman, 2006),  Ethical issues of discrimination against some players (i.e., Tribunal monitoring, change of behaviour, and conformity),  Deviant behaviour constantly monitored – justified by economic goals and a limited view of quality of service and community.  Companies move towards more hierarchical and legalistic forms of governance and less transparent forms of automated dataveillance (Kerr et al., 2013).
  • 22. ENFORCEMENT OF SURVEILLANCE  Hierarchical surveillance  Game architecture, software code, and game rules,  Policy documents (PEGI, ISFE, ICDP, EULAs, TOS)  Company community management practices,  Company-produced paratexts,  Lateral surveillance  Community management,  Peer and participatory surveillance, and player-produced paratexts,  Driven by business model considerations: monetization, business expansion,  Ensuring cheating-free environment (thus confirming the status as an eSport).
  • 23. IN-BUILT BIASES AND SHORTCOMINGS  Automated code is a designed agent and bears the biases of its designers – an example of algorithmic surveillance (Gillespie, 2014),  ISFE and ICDP concerned that GDPR might impose new restrictions on what game companies can do with player data,  Prioritizing values: punishing cheaters, but also tension between paying players and banning them from community,  Certain actions taken by game companies are not transparent and infringe on the consumer rights of the players (i.e., the right of appeal).
  • 24. GDPR  General Data Protection Regulation will come into effect on 25 May 2018.  Replacing Directive 95/46/EC and patchwork of national regulations.  Includes (among others):  Data Protection Officers to monitor large scale data gathering,  Data Protection Impact Assessment for data gathering “likely to result in a high risk to the rights and freedoms of natural persons” (Article 35(1, 3, 4)):  Criteria examples: data transfer across the borders of EU, systematic monitoring, automated decision-making with legal or similar effect, sensitive data, and others.
  • 25. CONTACT US  E-mail: Jedrzej.Czarnota@trilateralresearch.com  Website: http://trilateralresearch.co.uk  Twitter: @Trilateral_UK @Jedczar  Phone: +44 (0)7447 429 757  Address: Crown House 72 Hammersmith Road W14 8TH, London United Kingdom

Hinweis der Redaktion

  1. Customise animation throughout the presentation to your style
  2. Our foundation is in privacy, data protection and ethics, and what we bring is technology development that uses our expertise in this area to deliver privacy-compliant services or develop tools with an awareness of the potential impacts of that data collection and analysis processes.
  3. ISFE – interactive software federation of Europe PEGI – pan European game information ICDP – industry coalition for data protection