Protecting Children In The Digital Age

The British Information Commissioner’s Office (ICO) has now published a set of 15 new standards which it expects online services to meet in order to protect children’s privacy.

Data is at the heart of the digital services children use. From the moment a young person opens an app, plays a game or loads a website, data begins to be gathered. That data may then inform techniques used to persuade young people to spend more time using services, to shape the content they are encouraged to engage with, and to tailor advertisements they see.

For all the benefits the digital economy can offer children, we are not currently creating a safe space for them to learn, explore and play.This statutory code of practice looks to change that, not by seeking to protect children from the digital world, but by protecting them within it.

The ICO chief, Elizabeth Denham indicated that these standards were expected to apply eqaully to online services like apps, connected toys, social media platforms, online games, educational websites and streaming services.

The ICO, which is also responsible for enforcing GDPR, has set the code which includes standards for those responsible for designing, developing or providing online services like apps, connected toys, social media platforms, online games, educational websites and streaming services. It covers services likely to be accessed by children and which process their data.

The code will require digital services to automatically provide children with a built-in baseline of data protection whenever they download a new app, game or visit a website.

It also covers services not specifically designed for, but likely to be accessed by children and which process their data.
The code requires digital services to provide children with a built-in baseline of data protection automatically whenever they download a new app or game or visit a site. It says that location settings that allow the world to see where a child is should also be switched off by default and data collection and sharing should be minimised.

Elizabeth Denham said: “There are laws to protect children in the real world – film ratings, car seats, age restrictions on drinking and smoking. We need our laws to protect children in the digital world too. “In an age when children learn how to use an iPad before they ride a bike, it is right that organisations designing and developing online services do so with the best interests of children in mind. Children’s privacy must not be traded in the chase for profit.”

She also expressed concern that one in five internet users in the UK is a child, but that the internet is not designed for them.

“In a generation from now, we will look back and find it astonishing that online services weren’t always designed with children in mind.”

The ICO submitted the code to the Secretary of State in November and it must complete a statutory process before it is laid in Parliament for approval. If approved, organisations will have 12 months to update their practices before the code comes into full effect. The ICO expects this to be by autumn 2021.

The ICO’s enforcement powers include a fine of up to £17.5m or 4% of worldwide turnover, whichever is higher when firms breach GDPR guidelines.

In the case of breaches involving children, it warned in official papers: “where we see harm or potential harm to children we will likely take more severe action against a company than would be the case for other types of personal data."

The ICO Standards Are:

Best interests of the child: The best interests of the child should be a primary consideration when you design and develop online services likely to be accessed by a child.

Data protection impact assessments: Undertake a DPIA to assess and mitigate risks to the rights and freedoms of children who are likely to access your service, which arise from your data processing. Take into account differing ages, capacities and development needs and ensure that your DPIA builds in compliance with this code.

Age appropriate application: Take a risk-based approach to recognising the age of individual users and ensure you effectively apply the standards in this code to child users. Either establish age with a level of certainty that is appropriate to the risks to the rights and freedoms of children that arise from your data processing, or apply the standards in this code to all your users instead.

Transparency: The privacy information you provide to users, and other published terms, policies and community standards, must be concise, prominent and in clear language suited to the age of the child. Provide additional specific ‘bite-sized’ explanations about how you use personal data at the point that use is activated.

Detrimental use of data: Do not use children’s personal data in ways that have been shown to be detrimental to their wellbeing, or that go against industry codes of practice, other regulatory provisions or Government advice.

Policies and community standards: Uphold your own published terms, policies and community standards (including but not limited to privacy policies, age restriction, behaviour rules and content policies).

Default settings: Settings must be ‘high privacy’ by default (unless you can demonstrate a compelling reason for a different default setting, taking account of the best interests of the child).

Data minimisation: Collect and retain only the minimum amount of personal data you need to provide the elements of your service in which a child is actively and knowingly engaged. Give children separate choices over which elements they wish to activate.

Data sharing: Do not disclose children’s data unless you can demonstrate a compelling reason to do so, taking account of the best interests of the child.

Geolocation: Switch geolocation options off by default (unless you can demonstrate a compelling reason for geolocation to be switched on by default, taking account of the best interests of the child). Provide an obvious sign for children when location tracking is active. Options which make a child’s location visible to others must default back to ‘off’ at the end of each session.

Parental controls: If you provide parental controls, give the child age appropriate information about this. If your online service allows a parent or carer to monitor their child’s online activity or track their location, provide an obvious sign to the child when they are being monitored.

Profiling: Switch options which use profiling ‘off’ by default (unless you can demonstrate a compelling reason for profiling to be on by default, taking account of the best interests of the child). Only allow profiling if you have appropriate measures in place to protect the child from any harmful effects (in particular, being fed content that is detrimental to their health or wellbeing).

Nudge techniques: Do not use nudge techniques to lead or encourage children to provide unnecessary personal data or weaken or turn off their privacy protections.

Connected toys and devices: If you provide a connected toy or device ensure you include effective tools to enable conformance to this code.
Online tools: Provide prominent and accessible tools to help children exercise their data protection rights and report concerns.

Next Steps
The Secretary of State will now need to lay the code before Parliament for its approval as soon as is reasonably practicable.
Before that, the Government intends to notify the European Commission of the code under the requirements of the Technical Standards and Regulations Directive 2015/1535/EU, and observe the resultant 3 month, standstill period. 
The Information Commissioner’s Office (ICO) is the UK’s independent regulator for data protection and information rights law, upholding information rights in the public interest, promoting openness by public bodies and data privacy for individuals.
To report a concern to the ICO, go to ico.org.uk/concerns.

Business Cloud:           Information Commissioners Office:         Information Commissioners Office

You Might Also Read:

Children Need A Break:

Websites To Be Fined Over 'online harms' Under New UK Law:

 


 

« Bigger Budgets For Cyber Security In 2020
US Cyber Command Hacked ISIS »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

CENTRI Technology

CENTRI Technology

CENTRI provide a standards-based security platform for the Internet of Things.

Cosan

Cosan

Cosan is a cybersec solutions & services provider that assists organisations to identify vulnerabilities, protect sensitive data and remain compliant.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Approach

Approach

Approach is a leading provider of cyber security consulting and secure application development services in Belgium.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity solves cybersecurity challenges with a people-first approach, creating personalized cyber defense with individualized business strategy, enterprise-wide expertise and partnership.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.