Jump to content

Take Two: Difference between revisions

From Consumer Rights Wiki
Zskh (talk | contribs)
added privacy policy update
Line 43: Line 43:
<references />
<references />


= Take-Two Interactive Software Privacy Policy Update =
Last Update: February 2025
== Categories of Information Collected ==
The type of information we collect depends on how you use the Services. Generally, we collect the following information:
* '''Identifiers / Contact Information''': Name, user name, gamertag, postal and email address, phone number, unique IDs, mobile device ID, platform ID, gaming service ID, advertising ID (IDFA, Android ID) and IP address
* '''Protected Characteristics''': Age and gender
* '''Commercial Information''': Purchase and usage history and preferences, including gameplay information
* '''Billing Information''': Payment information (credit / debit card information) and shipping address
* '''Internet / Electronic Activity''': Web / app browsing and gameplay information related to the Services; information about your online interaction(s) with the Services or our advertising; and details about the games and platforms you use and other information related to installed applications
* '''Device and Usage Data''': Device type, software and hardware details, language settings, browser type and version, operating system, and information about how users use and interact with the Services (e.g., content viewed, pages visited, clicks, scrolls)
* '''Profile Inferences''': Inferences made from your information and web activity to help create a personalized profile so we can identify goods and services that may be of interest
* '''Audio / Visual Information''': Account photos, images, and avatars, audio information via chat features and functionality, and gameplay recordings and video footage (such as when you participate in playtesting)
* '''Sensitive Information''': Precise location information (if you allow the Services to collect your location), account credentials (user name and password), and contents of communications via chat features and functionality.
What  makes them different from a virus?
Here's a comparison between the '''data collected by a RAT (Remote Access Trojan), a Trojan''', and what is described in the '''privacy policy''':
{| class="wikitable"
!'''Data Type'''
!'''Keylogger'''
!'''Spyware'''
!'''RAT'''
!'''Info-Stealer'''
!'''Trojan'''
!'''Adware (Tracking)'''
!'''Network Sniffer'''
!'''Rootkit'''
!'''Browser Hijacker'''
!'''Privacy Policy'''
|-
|'''Identifiers / Contact Info'''
|❌
|✅
|✅
|✅
|✅
|✅
|✅ (via packet capture)
|✅ (indirectly)
|✅
|✅
|-
|'''Protected Characteristics'''
|❌
|⚠️ (inferred)
|❌
|❌
|❌
|✅ (from browsing)
|❌
|❌
|✅ (e.g., age from browsing)
|✅
|-
|'''Commercial Info (Purchases)'''
|✅ (if typed)
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|-
|'''Billing Info'''
|✅
|✅
|✅
|✅
|✅
|❌
|✅
|✅
|❌
|✅
|-
|'''Internet / Electronic Activity'''
|❌
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|✅
|-
|'''Device & Usage Data'''
|❌
|✅
|✅
|✅
|✅
|✅
|⚠️ (indirect)
|✅
|✅
|✅
|-
|'''Profile Inferences'''
|❌
|
{| class="wikitable"
|⚠️ (inference)
|}
|✅
|❌
|✅ (less common)
|✅
|❌
|❌
|✅
|✅
|-
|'''Audio / Visual Info'''
|❌
|✅ (screenshots)
|✅ (cam/mic access)
|❌
|Possibly
|❌
|❌
|✅ (via control)
|❌
|✅
|-
|'''Sensitive Info (Location, Credentials)'''
|✅ (typed)
|✅
|✅
|✅
|✅
|Possibly
|✅
|✅
|✅
|✅ (with consent)
|}
[[Category:Take-Two Interactive]]
[[Category:Take-Two Interactive]]

Revision as of 21:41, 21 May 2025

Article Status Notice: This Article is a stub

Notice: This Article Requires Additional Expansion

This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Issues may include:

  • This article needs to be expanded to provide meaningful information
  • This article requires additional verifiable evidence to demonstrate systemic impact
  • More documentation is needed to establish how this reflects broader consumer protection concerns
  • The connection between individual incidents and company-wide practices needs to be better established
  • The article is simply too short, and lacks sufficient content

How you can help:

  • Add documented examples with verifiable sources
  • Provide evidence of similar incidents affecting other consumers
  • Include relevant company policies or communications that demonstrate systemic practices
  • Link to credible reporting that covers these issues
  • Flesh out the article with relevant information

This notice will be removed once the article is sufficiently developed. Once you believe the article is ready to have its notice removed, visit the Discord (join here) and post to the #appeals channel, or mention its status on the article's talk page.

Take Two
Basic information
Founded 1993
Type Holding Company
Industry Video games
Official website https://www.take2games.com/


Take-Two Interactive Software, Inc. is an NYC-based video game holding company founded by Ryan Brant in September 1993. The company owns three major publishing labels, Rockstar Games, Zynga and 2K, which operate internal game development studios.

Relevant incidents

Incidents not mentioned here can be found on the Take-Two Interactive category page.

2K Games - exclusivity contracts (stub)

Much like with EA, 2K has also purchased exclusivity contracts with sports leagues, thus also restricting options for consumers. (Maybe mention pga or wwe?)

2k - personal data breaches (stub)

ref a ref b

2k - faulty game launcher (stub)

Ref

2k - shuttered studios (stub)

Wikipedia page ref(note: use as springboard, find dedicated sources for history of buyouts and shuttering)

General - Microtransactions (MTX) and lootboxes (stub)

Ref | should cover all 3 major companies owned by T2, ref covers 2k. Zynga's pioneering of predatory mtx needs to be covered (see cityville and Farmville games.) Rockstar, shark cards in GTAO? No clue how we could shoehorn this one.


Borderlands Series - Terms of Service changes and alleged spyware 2025-Apr https://medium.com/@DarkRa/why-gamers-are-furious-over-take-two-and-2ks-new-terms-of-service-051e7a6a5594 https://www.youtube.com/watch?v=vMKMhqKzHxs&pp=ygUMdGFrZSB0d28gdG9z

References


Take-Two Interactive Software Privacy Policy Update

Last Update: February 2025

Categories of Information Collected

The type of information we collect depends on how you use the Services. Generally, we collect the following information:

  • Identifiers / Contact Information: Name, user name, gamertag, postal and email address, phone number, unique IDs, mobile device ID, platform ID, gaming service ID, advertising ID (IDFA, Android ID) and IP address
  • Protected Characteristics: Age and gender
  • Commercial Information: Purchase and usage history and preferences, including gameplay information
  • Billing Information: Payment information (credit / debit card information) and shipping address
  • Internet / Electronic Activity: Web / app browsing and gameplay information related to the Services; information about your online interaction(s) with the Services or our advertising; and details about the games and platforms you use and other information related to installed applications
  • Device and Usage Data: Device type, software and hardware details, language settings, browser type and version, operating system, and information about how users use and interact with the Services (e.g., content viewed, pages visited, clicks, scrolls)
  • Profile Inferences: Inferences made from your information and web activity to help create a personalized profile so we can identify goods and services that may be of interest
  • Audio / Visual Information: Account photos, images, and avatars, audio information via chat features and functionality, and gameplay recordings and video footage (such as when you participate in playtesting)
  • Sensitive Information: Precise location information (if you allow the Services to collect your location), account credentials (user name and password), and contents of communications via chat features and functionality.

What makes them different from a virus? Here's a comparison between the data collected by a RAT (Remote Access Trojan), a Trojan, and what is described in the privacy policy:

Data Type Keylogger Spyware RAT Info-Stealer Trojan Adware (Tracking) Network Sniffer Rootkit Browser Hijacker Privacy Policy
Identifiers / Contact Info ✅ (via packet capture) ✅ (indirectly)
Protected Characteristics ⚠️ (inferred) ✅ (from browsing) ✅ (e.g., age from browsing)
Commercial Info (Purchases) ✅ (if typed)
Billing Info
Internet / Electronic Activity
Device & Usage Data ⚠️ (indirect)
Profile Inferences
⚠️ (inference)
✅ (less common)
Audio / Visual Info ✅ (screenshots) ✅ (cam/mic access) Possibly ✅ (via control)
Sensitive Info (Location, Credentials) ✅ (typed) Possibly ✅ (with consent)