What you should be doing is proving that K2 has ways of checking your computer without your consent or knowledge, violating the privacy laws. Im not that great with computers, and I dont have alot of time to devote to any such things, but someone might. I do have one piece of evidence when someone finds the actual way they do it, let me know when you do, and I'll provide you with the conversation of a gm proving they do. But one without the other is just not good enough.
On another note: You are right, they have lawyers that make it air tight, and they will find all sorts of loopholes to make sure it's swayed there way.
See the part of, "We may change this TOS without notifying anyone at anytime..."