摘要 |
Computationally implemented methods and systems include monitoring a deployment of a privacy beacon associated with an entity, said privacy beacon configured to facilitate acquisition of one or more terms of service associated with said entity, and storing a record of the deployment of the privacy beacon associated with the entity, wherein said record is configured to be transmitted upon a particular request from a requestor entity. In addition to the foregoing, other aspects are described in the claims, drawings, and text. |