17
 1 Zynga Inc. Business Law

Zynga Inc. Business Law

  • Upload
    n3p7un3

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 1/17

  1

Zynga Inc. Business Law

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 2/17

  2

Abstract

The Internet today has grown in to something that not even its creators 40 years ago could have imagined.

No one thought even 20 years ago that so much information would be available to us on devices small

enough to fit in our pocket or that a village without running water or wired telephones would have cell

phones and satellite Internet Cafes. The Internet has create a society that is connected more than in any

other time in history. Along with this opportunity has come an equally great challenge in staying

successful in a world where you may have know idea how far you product might reach and who it might

touch. With the rise of the smart phone and the application market place there has been a boon to many

software developers and out of nowhere many software development companies have quickly and easily

found they were managing a small software empire, but along with this success comes a substantial

number of legal issues and risks. At Zynga Inc. we develop and publish casual video game applications

including FarmVille, CityVille, Empires & Allies and Words With Friends for users of various social

networks such as Facebook, as well as mobile devices such as the iPhone and the Android OS. These

games connect people from across the room to across the world. Residents of every state and many

countries around the world might use our products, thus we must understand the wide variety of laws that

apply to our products and how to comply with those laws. These issues included personal privacy laws,

intellectual property laws, and labor laws. I hope that I will give the reader a glimpse of a company that

produces casual social games is influenced by so many legal ideologies.

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 3/17

  3

Introduction 

The Internet today has grown in to something that not even its creators 40 years ago could have

imagined. No one thought even 20 years ago that so much information would be available to us on

devices small enough to fit in our pocket or that a village without running water or wired telephones

would have cell phones and satellite Internet Cafes. With the rise of the smart phone and the application

market place there has been a boon to many software developers and out of nowhere many software

development companies have quickly and easily found they were managing a small software empire, but

along with this success comes a substantial number of legal issues and risks.

At Zynga Inc. we develop and publish casual video game applications including FarmVille,

CityVille, Empires & Allies and Words With Friends for users of various social networks such as

Facebook, as well as mobile devices such as the iPhone and the Android OS. These games connect

people from across the room to across the world. The games may collect certain information from users

in order to save their game status and connect them with friends. These games are free to play, but users

may purchase virtual items or virtual currency for use in game. (Zynga 2012)

Internet Privacy Law

I will first discuss some to the personal privacy issues an application development company must

face in the complicated environment of the Internet today. Zynga's Privacy Policy is designed to provide

clarity about the information collected from our users and how it is used to provide a better social gaming

experience. By accepting Zynga’s Privacy Policy and Terms of Service in registration or game

installation, the user consents to the collection, storage, use and disclosure of his or her personal

information as described in this the Privacy Policy. (Zynga 2012)

Because, at Zynga we operate in may countries and on many platforms, compliance with

international privacy standards and regulations can be complicated and includes legal risks. Requirements

regarding how users personal information is handled should be formed to ensure that the application not

only meets these privacy and security guidelines but also complies with any regulatory requirements in

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 4/17

  4

the countries where the application is available. In producing applications that will be available in various

 jurisdictions developers are required to comply with all state, federal, and international privacy laws

regarding user data collection, and picture or voice capture. Accordingly, personal information collected

from a user may not be disseminated without the user’s consent; the unauthorized use of a user’s name or 

likeness for gain is prohibited; and a user’s voice may not be recorded absent a conspicuously displayed

noticed indicating that a recording is taking place. (McHale 2010)

If an application collects any personal information, the user must be notified about what is being

collected, why it is being collected and whether the information will be shared with anyone else. The

notice should be easy to find and easy to read. You should obtain affirmative opt-in consent from an

individual before collecting their personal information. This requirement is usually accomplished by

requiring the user to agree to the terms and conditions of the application prior to initialization. Before any

personal information collection, you should clearly define the reason why you need to collect personal

information prior to obtaining it from an individual. (Intel 2011) The application may not use personal

information for any other reason than the purpose specified to the individual at the time of collection

without their prior consent, including secondary uses, like direct marketing purposes.

Because definitions of personal information may vary in different countries developers should use

a broad interpretation of the term when deciding what should be considered protected. This is to include

any information that is directly or may be associated with a person. Application distributers, such as

Apple with its App Store and the Android App Marketplace, define privacy as an individual's right to

have a private life, to be left alone and to be able to decide when their personal information is collected,

used or disclosed. (Android 2012) Any information that can be used to identify, contact, or locate

someone is considered personal information (e.g. name, address, telephone number, mobile phone

number, e-mail address, social security number, government identification number, etc.). In addition, any

information which is linked to personal information or from which other personal information can easily

be derived is also considered personal information. If any of this information is shared with third parties,

one must obtain the user's permission before the information is transferred, unless it was specified

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 5/17

  5

explicitly in the company’s privacy policy. To ensure individual's privacy is preserved and compliance to

appropriate regulatory standards has been met certain security controls must be employed. In the case

where personal information is stored and transmitted it must be done in a secure manner. Reasonable

measures must be taken to protect personal information from unauthorized access, use, modification,

disclosure or loss. When collecting personal information on the wire, it should not be transmit in clear

text and encryption techniques like https or secure socket layer technology should be implemented.

Completing a code review and/or vulnerability assessment helps to catch possible vulnerabilities

that could lead to a compromise of user data. Application developers should develop security controls

necessary to preserve the individual's personal information and account login information and protect it

from a security breach. Some data elements are considered more sensitive than others (e.g. biometrics

and children's personal information) and may require additional compliance efforts with statutory rules

and regulations. In order to provide a secure environment to store user data developers should create a

secure user profile that requires a unique identifier and password combination to allow the individual to

maintain their personal information. The potential risks of not complying with established privacy

polices and regulations are severe and can go far beyond just civil and criminal penalties.

They can include:

  Damage to the company’s reputation, brand or business relationships

  Legal liability and industry or regulatory sanctions

  Charges of deceptive business practices

  Disruption of international business operations

  Termination of the application distribution

Intellectual Property Law

Copyright Law

Developers of smart phone applications must concern themselves with protecting their works

against misappropriation or infringement by others. In the United States, copyright ownership is

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 6/17

  6

automatically obtained upon the physical creation of a copyrightable work. In order to assert your

copyrights against an alleged infringer in court, you must first obtain a copyright registration. While it is

possible to obtain an expedited registration in the last moment before filing a lawsuit, the process is quite

expensive and certain rights are lost if you do not have a registration in hand prior to the occurrence of an

alleged infringement. Accordingly, it is highly recommended that any software author obtain a copyright

registration for her work. Further, any significant updates to the software should be the subject of new

registrations. (Danielson 2010)

Obtaining a copyright registration for a software work is fairly straightforward, however, if you

are attempting to register an application that is based on a previous work, or if you’re registering an

application that is already several versions deep, questions can arise. It is advised your copyright

registration application completed with the assistance of an expert IP attorney.

Patent Law

Certainly for larger software companies, patent protection is something to which a significant

amount of effort and expense has been devoted. Many developers, however, may not know what is novel

and non-obvious enough to warrant patent protection in the United States or elsewhere. If an application

developer believes that some feature or function of their software is indeed different enough from

anything else in the field, then patent protection may be worth looking into. Searching for prior art in your

field of interest should give someone a basic sense of just how novel the invention is and, accordingly,

whether it would be worth the costs of further searching and/or having a patent application drafted.

(Danielson 2010) The more detailed description, including any relevant drawings, that can be provide to

the patent attorneys, the better the application will be and it will be more likely to stand up in an

infringement court case.

Trademark Law

When we are selecting a name for our application or service it is important to understand what

protections will be afforded to the name. Trademark law generally does not protect words or phrases that

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 7/17

  7

merely describe a product; the theory is that others in the industry should have a fair chance to use such

words to describe their own products. Choosing a unique name that is not descriptive is probably most

important in establishing trademark rights. One must also be careful in choosing a name that is not

similar to any other company’s trademarks. (McHale 2010) Most important among these factors are the

similarity of the marks and the similarity of the goods or services offered in connection with each mark.

If we use a name that is too similar to other trademarks or other products already in use, we may be

infringing on a trademark or we may not be able to get a trademark for our name. (Danielson 2010) The

other important thing to remember is to separate our brand name from the product or service itself. If a

trademark becomes to generic or a household name used to describe the product, we may lose our rights

to the trademark.

Developer Terms and conditions

Anyone who wishes to develop applications must agree to the terms and conditions put forth by

the company that will be distributing the applications. One such example is Apple and its App store,

which it considers the only legitimate source of applications for its smart devices. These terms become a

legal agreement governing the manner in which the applications are developed and the functionality of 

the applications themselves. Because Apple itself controls the only legitimate distribution channel for its

 products’ applications, they have taken a fairly heavy handed approach in what they allow and don't allow

developers to do with their applications. (Apple 2012) It is particularly important to understand what the

agreement does and doesn't permit since every application must be reviewed and approved for

compliance before appearing in their store. Non-compliance will mean delays or denial in getting an

application to market. Other application distributors, such as Google with its Android and Research in

Motion with it Blackberry App World, each have their own set of requirements and even though they are

similar it is important to understand the differences.

Many of the best applications rely on third party services, or incorporate adds created by third

parties in to them. This allows us to produce high quality applications that are free to the consumer.

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 8/17

  8

However, anytime one chooses to rely on such third party services or materials, they need to be acutely

aware of their obligation to the end user and the content owner. In general, you cannot use any

copyrighted materials without express permission from the provider or creator of such material. Whether

it is you or a third party that provides the copyrighted material, we may be held liable for any damages

incurred by our application.

Two of the most recent features available to developers are push notification and in-app

purchasing. If a developer misused these features it could result in a diminished user experience or

worse, so it has been made clear that only specific uses of these features are allowed could easily abuse

these features. Developers wishing to push the envelope of creativity with either of these features should

carefully read the additional restrictions contained the user’s agreement before venturing to far over the

edge of commonly accepted practices. On the other hand the restrictions over in-app purchase are quite

exacting. You cannot use in-app purchasing to purchase stored value (gift certificates or other types of 

currency), to obtain content for a limited period of time, or to trigger newly downloaded updates.

However, you may use in-app purchasing to unlock content already in your application, provided it does

not initiate a new download.

End User License Agreements

Most application distributers, such as Apple, have standard End User License Agreement (EULA)

that applies to all applications provided by the App Store. This allows developers to utilize the standard

EULA, add a supplement to it, or create their own from scratch provided it meets the minimum

requirements of the governing body, in this case that would be Apple’s App Store . (Apple 2012) For

those utilizing third party services, they should be sure that any notices that are required are contained in

the EULA as well as a description of what is collected from the user and what will be provided to any

third party. This needs to be uploaded during the application submission process so it can be reviewed for

compliance before the application can make its way to the market place. Also, the developer may wish to

place limitations on how, where, or when your application is used, which should be reflected in the end

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 9/17

  9

user’s agreement. Always be sure that the software license accurately reflects the functionality of the

application and its intended use. Not specifying this could leave the developer open to liability if it is use

in a way not specific that causes harm. Forcing users to acknowledge the license upon first running the

app is always preferred, as is keeping a log of when and who made such assent. If the user is not required

to accept the user agreement, even if it is available in the application, it will weaken the enforceability of 

such agreement.

An important element of a user agreement is disclaimer of warranty. This provision states that

the application is being provided “as is” without any express or implied warranties regarding the

a pplication’s quality, performance, effectiveness or reliability. In those jurisdictions where disclaimers of 

warranty are enforceable, such a provision protects the entity providing the end user’s license from

potential legal claims arising from the use of the application, as the licensor makes no promises of any

kind. Another important aspect is a limitation of liability. This provision protects the developer from

liability for personal injury, loss of profits, loss of data, or other direct and indirect damages arising from

the use of, or the inability to use, the application. This provision additionally places an upper dollar limit

on the total damages for which the developer may be liable, excluding damages for personal injury in

those states where such a limitation would not be enforceable.

Liability

 DCMA - Section 512

The Digital Millennium Copyright Act provides recourse to copyright owners who believe that

their rights under the United States Copyright Act have been infringed by acts of third parties over the

Internet. One important section of this act that is particularly important to developer creating application

that utilize third party content or provide social networking services. (Fayle 2010)

Section 512(c) attempts to remove liability for copyright infringement from websites or

applications that allow users to post content, as long as the entity in charge of the site or app has a

mechanism in place whereby the copyright owner can request the removal of infringing content. It is

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 10/17

  10

however important to mention that the content provider must also not receive a financial benefit directly

attributable to the infringing activity. This creates an interesting problem for most social applications that

allow users to post music, photos or video. For instance, several content owners have sued YouTube, the

video-sharing site, for copyright infringement, and YouTube has claimed a 512(c) defense. Since

YouTube is a subsidiary of Google, its future business plan most likely involves serving advertisements

according to the kind of video that users view or search for. If the site does this, however, it could

amount to a financial benefit directly attributable to the sharing of copyrighted materials. Those cases are

currently before federal district courts, and their resolution will greatly impact the services that social

networks offer, as well as their business models. (U. S. C. Title 17)

Communications Decency Act - Section 230

There is also another act that has become important to developers that allow users to interact with

each other through their applications. The most pertinent part of this act is section 230 of the

Communications Decency Act. It immunizes website from any liability resulting from the publication of 

information provided by another. (Fayle 2010) This usually arises in the context of defamation, but

several courts have expanded it to cover other sorts of claims as well. So if a user posts defamatory or

otherwise illegal content, Section 230 shields the social application provider from any liability arising out

of the publication. Applications or websites that, in whole or in part, create or develop contested

information, on the other hand, are deemed content providers that do not benefit from the protections of 

Section 230. A recent 9th Circuit opinion has called the section's broad coverage into question, and

created uncertainty for social networking sites that have relied on Section 230 to protect them from claims

relating to the content that their users create and post. (U. S. C. Title 47)

State Laws

Several states have enacted or proposed laws that would create requirements for social gaming or

networking sites and applications, particularly in regards to monitoring the presence and activities of 

sexual predators using the application. Because our applications seek to connect people and we often

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 11/17

  11

operate on such social networking site these laws are very important for us to understand. Virginia, for

example, has enacted a law requiring sexual offenders to register their email addresses and instant

messaging screen names, and allows police officers to create mechanisms for web sites to check user

information against the resulting database. The North Carolina state senate recently passed a bill

requiring that parents and guardians register with a social networking site and verify their ages before

their children can sign up for an account. This is to counter the difficulty in verifying the ages of minors,

who usually lack credit cards or other sources of information concerning their ages. That bill still requires

approval from the North Carolina House of Representatives. Connecticut legislators have also proposed a

bill that would require social networking sites to verify the ages of their users and obtain parental

permission for users under 18. Under the proposed law, sites that failed to comply would be subject to

fines of $5,000 per day.

Employment and Labor Law

The next set of laws that are important are the ones that apply to businesses that employ 50 or

more people, generate more than $500,000 in revenue per year, or are publicly traded. They laws are very

important because noncompliance can create a myriad of legal issues.

Fair Labor Standards Act

The Wage and Hour Division of the Department of Labor administers the Fair Labor Standards

Act. The Act establishes standards for minimum wages, overtime pay, recordkeeping, and child labor.

The Act applies to enterprises with employees who engage in interstate commerce, produce goods for

interstate commerce, or handle, sell, or work on goods or materials that have been moved in or produced

for interstate commerce. The Act requires employers of covered employees who are not otherwise

exempt to pay these employees a minimum wage of not less than $7.25 per hour. Youths under 20 years

of age may be paid a minimum wage of not less than $4.25 an hour during the first 90 consecutive

calendar days of employment with an employer. Employers may not displace any employee to hire

someone at the youth minimum wage. The Act does not limit either the number of hours in a day or the

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 12/17

  12

number of days in a week that an employer may require an employee to work, as long as the employee is

at least 16 years old. Similarly, the Act does not limit the number of hours of overtime that may be

scheduled. However, the Act requires employers to pay covered employees not less than one and

one-half times their regular rate of pay for all hours worked in excess of 40 in a workweek, unless the

employees are otherwise exempt. (DOL 2012)

Occupational Safety and Health Act

The Act assigns Occupational Safety and Health Administration two regulatory functions: setting

standards and conducting inspections to ensure that employers are providing safe and healthful

workplaces. OSHA standards may require that employers adopt certain practices, means, methods, or

processes reasonably necessary and appropriate to protect workers on the job. Employers must become

familiar with the standards applicable to their establishments and eliminate hazards. (OSHA 2012)

Compliance with standards may include implementing engineering controls to limit exposures to physical

hazards and toxic substances, implementing administrative controls, as well as ensuring that employees

have been provided with, have been effectively trained on, and use personal protective equipment when

required for safety and health, where the former controls cannot be feasibly implemented. Employees

must comply with all rules and regulations that apply to their own actions and conduct. Even in areas

where the Occupational Safety and Health Administration has not set forth a standard addressing a

specific hazard, employers are responsible for complying with the Occupational Safety and Health Act's

general duty clause. The general duty clause states that each employer shall furnish a place of 

employment that is free from recognized hazards that are causing or are likely to cause death or serious

physical harm to his employees. (OSHA 2012)

Family and Medical Leave Act

The Wage and Hour Division also administers the Family and Medical Leave Act. The FMLA

provides a means for employees to balance their work and family responsibilities by taking unpaid leave

for certain reasons. The Act is intended to promote the stability and economic security of families as well

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 13/17

  13

as the nation's interest in preserving the integrity of families. The FMLA applies to any employer in the

private sector who engages in commerce, or in any industry or activity affecting commerce, and who has

50 or more employees each working day during at least 20 calendar weeks in the current or preceding

calendar year. (FMLA 2012) To be eligible for FMLA leave, an individual must meet the following

criteria:

  Be employed by a covered employer and work at a worksite within 75 miles of which that

employer employs at least 50 people;

  Have worked at least 12 months for the employer; and

  Have worked at least 1,250 hours during the 12 months immediately before the date FMLA leave

begins.

An employer need not count employment prior to a break in service of seven years or more unless

there was a written agreement between the employer and employee to rehire the employee, or the break in

service was due to fulfillment of military service in the National Guard or Reserves. (FMLA 2012)

The FMLA entitles eligible employees of covered employers to take job-protected, unpaid leave for

specified family and medical reasons. Eligible employees are entitled to:

  Twelve workweeks of leave in any 12-month period for (FMLA 2012):

o  Birth and care of the employee's child, within one year of birth

o  Placement with the employee of a child for adoption or foster care, within one year of the

placement

o  Care of an immediate family member who has a serious health condition

o  For the employee's own serious health condition that makes the employee unable to

perform the essential functions of his or her job

o  Any qualifying exigency arising out of the fact that the employee’s spouse, son, daughter,

or parent is on active duty or has been notified of an impending call or order to active

duty in the U.S. National Guard or Reserves in support of a contingency operation

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 14/17

  14

  Twenty-six workweeks of leave during a single 12-month period to care for a covered service

member with a serious injury or illness if the employee is the spouse, son, daughter, parent, or

next of kin of the service member (Military Caregiver Leave)

If an employee was receiving group health benefits when leave began, an employer must

maintain them at the same level and in the same manner during periods of FMLA leave as if the employee

had continued to work. An employee may elect the substitution of any accrued paid leave for periods of 

unpaid FMLA leave. (FMLA 2012) Substitution means the accrued paid leave runs concurrently with the

FMLA leave period. An employee’s ability to substitute accrued paid leave is determined by the terms

and conditions of the employer’s normal leave policy. Employees may take FMLA leave intermittently

or on a reduced leave schedule when medically necessary or when the leave is due to a qualifying

exigency. However, employer approval is not required for intermittent or reduced schedule leave that is

medically necessary due to pregnancy, a serious health condition, or the serious illness or injury of a

covered service member. Employer approval also is not required when intermittent or reduced schedule

leave is necessary due to a qualifying exigency. (FMLA 2012)

When the need for leave is foreseeable, an employee must give the employer at least 30 days

notice, or as much notice as is practicable. When the leave is not foreseeable, the employee must provide

notice as soon as practicable in the particular circumstances. An employee must comply with the

employer’s usual and customary notice and procedural requirements for requesting leave, absent unusual

circumstances. In requesting leave an employee must provide sufficient information for the employer to

reasonably determine whether the FMLA may apply to the leave request. When the employee seeks leave

for a qualifying reason for which the employer has previously provided the employee FMLA protected

leave, the employee must specifically reference the qualifying reason for the leave or the need for FMLA

leave. An employer may require that a serious health condition, or a serious illness or injury of a covered

service member, be supported by a certification from the employee's health care provider, the employee’s

family member’s health care provider, or an authorized health care provider of the covered service  

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 15/17

  15

member. An employer may also require periodic reports of the employee's status and intent to return to

work during the leave. (FMLA 2012)

Additionally, under certain conditions, an employer may require that an employee who takes

FMLA leave for his or her own serious health condition submit a certification from the employee’s health

care provider that the employee is able to return to work. An employee who returns from FMLA leave is

entitled to be restored to the same or an equivalent job with equivalent pay, benefits, and other terms and

conditions of employment. The employee may, but is not entitled to, accrue additional benefits during

periods of unpaid FMLA leave. However, the employer must return him or her to employment with the

same benefits at the same levels as existed when leave began. (FMLA 2012)

Workers Compensation

When an employee is a qualified worker within the workers' compensation system, his or her employer is

required to pay for workers’ comp insurance. If the worker is injured while performing job duties, then

he or she will be generally be entitled to collect benefits through workers compensation insurance. The

laws in place that create this system of compensation are also known as strict liability laws, which means

that negligence on the part of the employer is not a factor when deciding whether or not a worker may

collect benefits. But this type of strict liability comes with consequences; namely, the worker gives up his

or her right to file a lawsuit against the employer using the civil court system, even if the employer is at

fault for the accident itself. (OWCP 2012)

Corporate and Criminal Fraud Accountability Act (Whistleblower Acts)

Under the Corporate and Criminal Fraud Accountability Act, Title VIII of the Sarbanes-Oxley Act,

employees of certain publicly traded companies, companies with certain reporting requirements with the

Securities and Exchange Commission (SEC), and their contractors, subcontractors, and agents may file

complaints with the Occupational Safety and Health Administration if they believe that they have

experienced discrimination or retaliation for reporting alleged violations of the federal mail, wire, bank,

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 16/17

  16

or securities fraud statutes, any rule or regulation of the SEC, or any other provision of federal law

relating to fraud against shareholders. (SEC 2012) Generally, the employee protection provisions listed

above prohibit covered employers from discharging or otherwise discriminating against any employee

because the employee engaged in certain activities protected by law. (OSHA 2012)

The protected activities typically include:

  Initiating a proceeding under, or for the enforcement of, any of these statutes, or causing such a

proceeding to be initiated and testifying in any such proceeding;

  Assisting or participating in any such proceeding or in any other action to carry out the purposes

of these statutes; or complaining about a violation.

Many of the statutes specifically protect an employee's internal complaints to his or her employer, and it

is the Department of Labor's position, as set forth in regulations, that employees who express safety or

quality assurance concerns internally to their employers are protected under all of the whistleblower

statutes administered by the Occupational Safety and Health Administration. (OSHA 2012)

Conclusion

The Internet has create a society that is connected more than in any other time in history. Along with this

opportunity has come an equally great challenge in staying successful in a world where you may have

know idea how far you product might reach and who it might touch. At Zynga Inc. we are operating in a

diverse and complicated legal environment. Residents of every state and many countries around the

world might use our products, thus we must understand the wide variety of laws that apply to our

products and how to comply with those laws. I have just scratched the surface of a few of the legal issues

that face a company that strives to push the outer limit of what technology can bring to people, but I hope

that I addressed some of the most important. These issues included personal privacy laws, intellectual

property laws, and labor laws. I hope that I have given the reader a glimpse of a company that produces

casual social games is influenced by so many legal ideologies.

7/30/2019 Zynga Inc. Business Law

http://slidepdf.com/reader/full/zynga-inc-business-law 17/17

  17

Bibliography 

Apple Inc., Developers (02/14/2012), https://developer.apple.com/ 

Danielson, Miguel, iPhone Developers Legal Guide, Intellectual Property Law and Strategy, Danielson

Legal LLC., 2010

Fayle, Kevin, Understanding the Legal Issues for Social Networking Sites and Their Users, Find Law,

2010

Google Inc., Developers - Android Market (02/22/2012), http://developer.android.com/index.html

Intel Inc., Privacy Requirements and Recommendations for Application Development for the Intel

AppUp(SM) developer program, 2011

McHale, Robert, A practical Guide to iPhone Application Development, R McHale LLC., 2010

US Code, 47 U.S.C. § 230, Section 230: Protection for private blocking and screening of offensive

material (02/23/2012),

http://www.gpo.gov/fdsys/search/pagedetails.action?st=citation%3A47+USC+231&granuleId=USCO

DE-2008-title47-chap5-subchapII-partI-sec230&packageId=USCODE-2008-title47&bread=true

US Code, 17 U.S.C. § 512, Section 512: Limitations on liability relating to material online (02/23/2012),

http://www.copyright.gov/title17/ 

United States Department of Labor, FMLA (01/29/2012), http://www.dol.gov/whd/fmla

United States Department of Labor, Office of Workers' Compensation Programs (OWCP) (01/29/2012),

http://www.dol.gov/owcp/owcpabot.htm

United States Department of Labor, Corporate and Criminal Fraud Accountability Act,

Sarbanes Oxley Act (SOX) (01/29/2012), http://www.whistleblowers.gov/acts/ccfa.html

United States Securities and Exchange Commission (02/14/2012), http://www.sec.gov/ 

Zynga Inc., Legal (01/21/2012), http://company.zynga.com/about/legal

Zynga Inc., Privacy (01/21/2012), http://company.zynga.com/about/privacy-center/privacyville

Zynga Inc., About (01/21/2012), http://company.zynga.com/about