Feeds

US advertisers question Web rules for kiddies

Forge a note from Mum and we'll do business...

  • alert
  • submit to reddit

The essential guide to IT transformation

The US Federal Trade Commission issued new rules governing the collection of children's personal information by Webmasters yesterday, as required by the Child Online Protection Act (COPA). Kids' Web sites will now be required to obtain parental consent before gathering demographic data on children below age 13. Numerous kids' Web sites function as little more than demographics clearinghouses, offering free entertainment and online amusements in exchange for the registration data which they analyse and sell to advertising firms. Advertising front groups have lobbied hard on Capitol Hill against parental verification requirements, chiefly because setting them up in any effective manner would likely push the cost of the data to a point exceeding its value, or at least close enough to it to make the whole operation more trouble than its worth. Advertising is a $600 billion a year operation in the US, with Web pitches representing roughly one per cent of that. Kids, whose entire commercial identities are overwhelmingly that of care-free consumers, represent a special target. A great deal of money and effort goes into marketing to children, whose incomes, strictly speaking, are entirely disposable. Separating them from their allowances has become something of a science unto itself. Privacy groups have been equally vocal in registering their contempt for the commercial use of kids' personal data, especially where very young ones, who may not have a clue what the information will be used for, are concerned. The FTC listened, and thought, and developed a scaled approach which would burden most heavily those firms gathering the most detailed data for sale to a third-party, and imposing the lightest burden on those that keep non-specific data in house. At the upper end, a fax, a signed letter (not in crayon), or a credit card might be required before a child could register on a site. At the lower extreme, a simple email and a follow-up phone call from a friend with a deep voice would do the trick. Early soundings from both industry flacks and privacy advocates have been remarkably positive. It may well be that vagueness in the regulations is producing considerable optimism on both sides, which can only be crushed by bitter experience when they take effect in April. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.