Feeds

AVG: We need laws to stop biz from tracking our kids

CTO of antivirus firm calls for new laws on children's privacy

Beginner's guide to SSL certificates

The antivirus giant AVG will today call for legislative action to prevent data-grabbers from spying on children.

Yuval Ben-Itzhak, the antivirus firm's chief technical officer, will speak at the Child Internet Safety Summit to call for limits on data-gathering on children's devices.

AVG is well known for its antivirus software, but has recently ventured into the privacy-protection game with a product called PrivacyFix. This move could prove particularly lucrative in the wake of disclosures by ex-National Security Agency contractor Edward Snowden about widespread spying on citizens' internet and mobile comms by governments.

It is likely to become even more profitable if the predicted rise in the use of machine-to-machine tech via connected devices – currently branded as the "Internet of Things" – takes place.

"Businesses can not just simply track and share my children's data by default. You need my consent to do that," Ben-Itzhak said.

"It's time to tell vendors where the line lies. If there are not any law, they are just going to [keep gathering data on minors]. We need to tell lawmakers and influencers that there could be a problem."

AVG wants to see limits on what data can be gathered about children and an end to the policy vacuum around the internet of stuff. Currently, there are few limits on what data can be gathered from smart devices or apps aimed at children.

Parents should be given clear advice on what sort of data is collected and must give their permission before any information is gathered and sent back to a company, it urged.

The so-called internet of things is a potentially exciting development, but one which creates clear ethical dilemmas. It's easy to see why parents would want to give their kids a watch with tracking functionality, but if that device – along with the telly and the fridge at home – tracks some other metric and then flogs the data, especially geolocation data, to advertiser, then there is an obvious issue.

"Big companies don't care unless there is a law. Life today is different and children live in a different environment. Companies that collect data and infringe privacy are not necessarily the bad guys, but they often end up doing things which society considers wrong.

"Privacy is not a black-and-white issue like malware or security. It's grey in the middle, which is why there is legislation needed."

The Office of the Information Commissioner recently issued guidance on wearables and said any information collected should stick to the Data Protection Act if collected for business purposes.

Existing legislation doesn't specifically mention rules on underage subjects, although the ICO has issued guidance that marketeers need parental consent.

Last week, Andrew Paterson at the ICO wrote: "Organisations [that use] wearable technology to process personal information will almost always be covered the Act. This means that they must process the information collected by these devices in compliance with the legislation. This includes making sure that people are being informed about how their details are being collected and used, only collecting information that is relevant, adequate and not excessive and ensuring that any information that needs to be collected is kept securely and deleted once it is no longer required."

As for the EU legislation, neither the Data Protection Directive (1995/46/EC) nor the Directive on privacy and electronic communications (2002/58/EC) explicitly mention the privacy rights of minors.

Of course, AVG's motives are not entirely altruistic. It hopes to be able to profit from the rise in privacy concerns by selling software to help guard people's sensitive information and fight off malware on a number of devices, including wearable computers.

We (rather optimistically) asked if this would include the iWatch.

"Well, we will have to see the iWatch first," said Ben-Itzhak. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.