Feeds

AVG: We need laws to stop biz from tracking our kids

CTO of antivirus firm calls for new laws on children's privacy

Reducing security risks from open source software

The antivirus giant AVG will today call for legislative action to prevent data-grabbers from spying on children.

Yuval Ben-Itzhak, the antivirus firm's chief technical officer, will speak at the Child Internet Safety Summit to call for limits on data-gathering on children's devices.

AVG is well known for its antivirus software, but has recently ventured into the privacy-protection game with a product called PrivacyFix. This move could prove particularly lucrative in the wake of disclosures by ex-National Security Agency contractor Edward Snowden about widespread spying on citizens' internet and mobile comms by governments.

It is likely to become even more profitable if the predicted rise in the use of machine-to-machine tech via connected devices – currently branded as the "Internet of Things" – takes place.

"Businesses can not just simply track and share my children's data by default. You need my consent to do that," Ben-Itzhak said.

"It's time to tell vendors where the line lies. If there are not any law, they are just going to [keep gathering data on minors]. We need to tell lawmakers and influencers that there could be a problem."

AVG wants to see limits on what data can be gathered about children and an end to the policy vacuum around the internet of stuff. Currently, there are few limits on what data can be gathered from smart devices or apps aimed at children.

Parents should be given clear advice on what sort of data is collected and must give their permission before any information is gathered and sent back to a company, it urged.

The so-called internet of things is a potentially exciting development, but one which creates clear ethical dilemmas. It's easy to see why parents would want to give their kids a watch with tracking functionality, but if that device – along with the telly and the fridge at home – tracks some other metric and then flogs the data, especially geolocation data, to advertiser, then there is an obvious issue.

"Big companies don't care unless there is a law. Life today is different and children live in a different environment. Companies that collect data and infringe privacy are not necessarily the bad guys, but they often end up doing things which society considers wrong.

"Privacy is not a black-and-white issue like malware or security. It's grey in the middle, which is why there is legislation needed."

The Office of the Information Commissioner recently issued guidance on wearables and said any information collected should stick to the Data Protection Act if collected for business purposes.

Existing legislation doesn't specifically mention rules on underage subjects, although the ICO has issued guidance that marketeers need parental consent.

Last week, Andrew Paterson at the ICO wrote: "Organisations [that use] wearable technology to process personal information will almost always be covered the Act. This means that they must process the information collected by these devices in compliance with the legislation. This includes making sure that people are being informed about how their details are being collected and used, only collecting information that is relevant, adequate and not excessive and ensuring that any information that needs to be collected is kept securely and deleted once it is no longer required."

As for the EU legislation, neither the Data Protection Directive (1995/46/EC) nor the Directive on privacy and electronic communications (2002/58/EC) explicitly mention the privacy rights of minors.

Of course, AVG's motives are not entirely altruistic. It hopes to be able to profit from the rise in privacy concerns by selling software to help guard people's sensitive information and fight off malware on a number of devices, including wearable computers.

We (rather optimistically) asked if this would include the iWatch.

"Well, we will have to see the iWatch first," said Ben-Itzhak. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.