SlideShare a Scribd company logo
Doing The Right Thing:
How Electronic Age Verification Protects Kids Online

An IDology, Inc. Whitepaper
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Taming the Wild West of the 21st Century
As a society we have established and live by a set of rules designed to keep merchandise
and services intended for adults out of the reach of children. In most states, alcohol sales
are restricted to anyone under 21 and 18 to buy tobacco. Entertainment rating systems
are used to determine if the content of movies, music or video games is suitable to minors.
Adult content magazines are kept out of site behind clerk counters in many stores across the
US. Advertising guidelines are followed for age-restricted products and promotional items.
Convicted sexual predators are required to register their residence.
Yet on the Internet, it is more like we live in the Wild West where anything goes. Logically
we know all these rules still apply. But enforcing them is a different situation.
Kim Cameron, Architect of Identity at Microsoft Corporation, states the problem clearly
within his paper on the Laws of Identity: “the Internet was built without a way to know who
and what you are connecting to.”1 And Peter Steiner, cartoonist at the New Yorker hints at
the dangers this poses in his well known cartoon: “On the Internet, nobody knows you’re a
dog.”2
Fortunately, advanced age and identity
verification technology solutions exist that
foster online trust and allow businesses to know
who their customer is when selling, marketing
or distributing age-restricted or age-sensitive
products, services or content. The result of
such solutions is a safer online environment for
kids that supports adult freedom of choice and
protects sensitive identifying information.
This white paper will review the emerging trends
in the age and identity verification market and
examine the benefits of integrating an electronic
age verification solution within your business.

1. Kim Cameron, Laws of Identity, May 2005, 1
2. Peter Steiner’s cartoon first appeared in the The New Yorker, on July 5, 1993 and is reproduced in compliance with the
copyright laws of the United States

page 1

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Market Drivers Impacting Age
				
& Identity Verification
Comparing Two Worlds
Physical World

Virtual World

•	
•	

•	
•	

•	

Enforced Regulations
Age Verification Process
Physical ID
Physical presence
Inherent Cost of
Doing Business

•	

Minimum Regulations
Age Verification Process
Honesty Policy
Credit Card Authorization
Emerging Acceptance
and Adoption

In the bricks and mortar world age-restricted and age-sensitive protection standards are
well established and enforced. We all know the steps such as comparing someone’s
physical appearance to an authentic and legal picture ID like a driver’s license. However
in the virtual world, most companies have not implemented appropriate age verification
mechanisms and some have implemented inadequate methods. Depending on the reason
for a verification, there are two methods some businesses use today to verify age – the
honesty policy or by credit card authorization.
Both methods present obstacles and are not considered effective for protecting children
online. Some of the reasons include:

•	 The honesty policy does not work – according to one study 31% of 7th-12th graders

pretend to be older to get onto a website3
•	 Kids have their own credit cards
•	 Credit card authorization validates the card only, not that the person using the credit
card is the rightful owner
•	 Credit card companies have issued guidelines saying credit cards are not a valid
method of age verification and merchants selling age-restricted products need to have
the appropriate controls in place to ensure that they abide by the laws governing these
transactions

3. The Henry J Kaiser Family Foundation, Generation M study: Media in the Lives of 8-18 year-olds, March 2005, 30

page 2

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

The amazing growth of social networking websites has highlighted the need for age
verification. Recently MySpace.com has been under fire from attorney generals about its
attempts to address the dangers the site poses to teens including the opportunity for adults
to interact with minors. The company is now faced with a lawsuit pertaining to alleged
inappropriate interactions of an adult with a minor.
In an effort to address these complaints, MySpace announced that it will deploy a database
that will contain the names and physical descriptions of convicted sex offenders in the United
States and automatically search for matches between the database and MySpace user profiles.
In response to this announcement, Connecticut Attorney General Richard Blumenthal
described the ineffectiveness of this measure without age and identity verification by saying,
“Convicted sex offenders can swiftly circumvent these protections by using fake names
– which they can do with ease.”4
Additionally, Xanga another social networking site was fined by the Federal Trade
Commission (FTC) over alleged violations of the Children’s Online Privacy Protection Act
(COPPA). The FTC said Xanga collected, used, and disclosed personal information from
children under the age of 13 without first notifying parents and obtaining their consent.5
Because of the events and issues surrounding social networking sites, attorney generals from
numerous states have a newly established task force to study the impact and potential harm to
children from an apparant lack of lawlessness in online communities. Specifically, Blumenthal
has called for MySpace to enact several practical steps including initiating a member login with
age verification and restricting access to adult content to individuals 18 or older along with
other steps.6

4. Anick Jesdanun, MySpace Aims to Keep Sexual Predators off Web site (Associated Press) December 6, 2006, found online at
http://www.indystar.com/apps/pbcs.dll/article?AID=/20061206/LOCAL17/612060473/1012
5. Nicholas Carson, FTC Nails Xanga with Record Fine, (Internetnews.com) September 8, 2006, found online at
http://www.internetnews.com/bus-news/article.php/3631131
6. Richard Blumenthal in a letter addressed to Attorney Christine Varney of Hogan & Harston LLP in Washington, D.C., March 20,
2006, found online at http://www.ct.gov/ag/lib/ag/children/MySpacebullets.pdf

page 3

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Parent Controls vs. Corporate Responsibility
It takes a village to raise a child. Society has decided that we all protect kids together in the physical
world – from lawmakers and businesses to teachers, caregivers and parents.
Yet, in the virtual world, a common argument for not using electronic age verification is that it
is the responsibility of the parent to monitor the online activity of their children. Electronic age
verification bridges the gap between parental control and corporate responsibility by serving to assist
parents – particularly since children have access to the Internet outside of their home.
About 17 million youth ages 12-17 use the Internet representing 73% of those in this age bracket.7
While many access the Internet at home or school, 60% of teens still report that they use the
Internet “somewhere else”—away from home and from school.8
Teens are also savvy Internet users so that relying solely on parental control software and Internet
filters to protect children online is just not enough. In fact, 64% of teens and 66% of parents say
that online teens know more about the Internet than their parents.9
Overall, electronic age verification plays an important part in assisting parents and caregivers by
enabling businesses to enact the same protection standards online that have been recognized and
enforced in our bricks and mortar world.

7. PEW Internet & American Life Project, Teenage Life Online, 1
8. UCLA Center for Communication Policy, The UCLA Internet Report—“Surveying the Digital Future” 2003, 65
9. PEW Internet & American Life Project, Teenage Life Online, 5

page 4

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

The Age Verification Market
Electronic Age Verification technology is not new although the adoption of its use has only recently
started to gain traction in the market. Any industry concerned with protecting children online while
at the same time promoting adult-choice and access to adult content can benefit from electronic age
verification.

How Electronic Age Verification Works
So what exactly is Electronic Age Verification? Simply put, it is an automatic way of comparing
information provided by the consumer such as name, address and date of birth against information
found in thousands of trusted and verifiable data sources. The end result provides a verification
that helps businesses instantly make more informed decisions regarding their approvals of
transactions or access grants.

Step 1

Step 2

Step 3

Consumers provide their name,
address and other identifiable
information required such as
date of birth.

Electronic age verification
solution instantly compares the
consumers input to thousands
of trusted data sources
containing billions of
verifiable records.

Based on the verification
result, the business handles
the transaction by approving
it, conducting a deeper level of
identity check, or rejecting it.

Early Adoption by Industry Leaders
Certain industries have companies that are early adopters of electronic age verification. In May
2005, the Supreme Court opened up the direct shipment of wine for review on a state by state basis.
Before this ruling, thought-leader wineries such as Kendall-Jackson Wine Estates Limited deployed
age verification and continue to lead the wine industry in using this technology to do the right thing
for their businesses and customers.

page 5

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Also in 2005, the Cellular Telecommunications Industry Association (CTIA) released the Wireless
Content Guidelines which carriers follow when developing programs that distribute age-restricted
and age-rated content. These guidelines include using content filters and access control, such as
electronic age verification, and are designed specifically to provide consumers with tools and controls they
need to make informed choices when accessing carrier content.10
Even before the Master Settlement Agreement was signed in November 1998 the tobacco industry has
used age verification when marketing cigarettes both in the bricks and mortar world and also online.
The most recent early adopter comes from the beer industry. One of the major brewers announced it will
incorporate age verification to access all of its websites in 2007. This will certainly address findings from
a study conducted by the Center on Alcohol Marketing and Youth at Georgetown which estimated that
13 percent of visits to alcohol-branded sites were initiated by people under age 21, and that 34 percent of
in-depth visitors to a brewery’s website were underage.11 This is a significant advancement for the beer
industry which has until now relied on the honesty policy for allowing access to its marketing websites.

Risks of Not Using Electronic Age Verification
The media’s focus on issues surrounding social networks as well as the increased accessibility of content
have caught the attention of lawmakers so that it is no longer a matter of if, but when, age verification
will be required of ecommerce companies providing adult-related content, goods or services. However,
the risks associated with waiting for this mandate and not voluntarily electing to deploy an electronic age
verification solution are immediate. These risks include:

10. CTIA Wireless, the International Association for Wireless Telecommunications industry, Wireless Content Guidelines,
found online at http://files.ctia.org/pdf/CTIA_Board_Approved_Guidelines.pdf
11. Center for Alcohol Marketing and Youth, Clicking with Kids: Alcohol Marketing and Youth on the Internet, March 2004, 3

page 6

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Brand Reputation
Negative attention from the media can damage a company’s reputation. It is possible that companies
not taking proactive steps to protect children online will become a target for advocacy groups, boycotts
and other government sponsored initiatives that pose a threat to their public perception. And not being
considered a good corporate citizen impacts an important way consumers support brands – with
their wallets.

Regulatory Compliance Issues
One of the most complex issues facing ecommerce today concerns regulation. Poor compliance
measures and lack of due diligence increases liability and minimizes a business’s ability to establish
an affirmative defense through best efforts. Because the Internet allows commerce across multiple
jurisdictions, different regulation standards of geographies can be tricky. One example is within
the wine industry which takes regulatory issues very seriously. As a result, compliance software
solutions such as ShipCompliant have emerged that help wineries manage the complexity of
geographic wine sales regulations including providing built-in electronic age verification technology.
When any business is unable to show the efforts it has taken to promote sales to legal age adults in
situations involving age-restricted products and services, the economic impact from legal problems
and regulatory fines can be significant.

Financial Risk
In addition to decreased revenue from negative PR, other financial impacts include the potential
for increased spending on marketing and legal costs as well as high penalty fines for failing to meet
the guidelines under COPPA. And if age verification is handled manually, companies experience
slower processing rates and a higher cost of doing business.

Competitive Position
Industry-leading companies are often recognized as being forward-thinking in their ability to
capitalize on the latest trends and gain market share. Ecommerce companies continuing to operate
without a way to verify legitimate, age appropriate customers, when others in the industry are
moving toward this practice, risk their competitive ability to sustain a successful, revenue-generating
business.
To minimize these risks, an automated age verification solution that protects the privacy of adults
and children without eliminating adult-choice or restricting the flow of ecommerce for a business
is needed.

page 7

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Industries In Need of Electronic Age Verification:
Telecommunications – content, including age-restricted movies, games and adult content, is
becoming more accessible through wireless devices

Retail – the Internet opened up new channels of commerce for everyone including age-restricted
products like wine and cigars

Social Networks – online communities allow interaction between adult and youth members
which increases the risk that a child will be approached by a predator. And because it is difficult to
monitor the various forms of content available within a social network, it is possible for children to
have access to racey content. Social networks also have an added need for identity verification since
performing searches against predator lists is ineffective if the person is not positively identified

Marketing –

applying the same standards for beer, tobacco, and adult content advertising and
distribution in an unregulated channel

Entertainment – operates an expanded distribution channel for rated-content such as movies,
music and games containing violent and/or explicit material

Benefits of Electronic Age Verification
A number of significant benefits emerge when businesses use electronic age verification including:

Positive PR Image – Instead of being perceived in a negative light, businesses have the
opportunity to position themselves positively as doing the right thing and being industry leaders for
protecting children online.

Maintains Regulatory Compliance – With an electronic age verification system, all rules
and regulations under COPPA are upheld. By conducting age verification on all transactions,
you protect your business from the liabilities associated with selling or offering age-restricted or
age-sensitive products and services. Electronic age verification abides by society’s rules and helps
businesses establish an affirmative defense through due diligence of best efforts.

page 8

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Overall Brand Protection – Electronic age verification protects a company’s brand reputation
and establishes the business as a good corporate citizen.

Improves Financial Results – The use of an automated electronic solution helps ecommerce
companies keep the speed of the Internet and process more transactions. This increases revenue or
customers faster and it decreases the amount of manual review needed to process transactions thus
limiting the amount of headcount required to operate your business. Exception transactions are
handled faster and more efficiently thus freeing up staff to handle other business operations.

Increases Competitive Position – Early adoption of electronic age verification shows
forward thinking and helps establish companies as thought leaders.
Other benefits of electronic age verification include:
•	 Protects children
•	 Promotes adult-choice
•	 Improves customer satisfaction
•	 Proactive self-regulation limits the impact of future enforced regulations

Selecting an Age Verification Vendor
When looking for a provider to electronically verify the age and identity of your consumers, there
are many factors to consider including:

Market Experience – Seek a solution provider that has been working with age verification
technology and offering a solution for several years. Rather than offering band aid solutions, an
experienced provider will have a proven, mature product and be a leader in the age verification
market. Be sure to get a list of clients and ask for references.

3rd Party Endorsements – Many industry organizations are dedicated to helping members’
select trusted and competent providers of various services important to the industry. Look for a
solution that has 3rd party endorsements from age-related industry organizations either within or
and outside of your specific industry. A good provider will be a thought-leader on age verification
and will often be sought out by lawmakers and law enforcement as a knowledgeable market expert.

page 9

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

Security – Work with a provider that understands security encompasses more than just
encryption technologies. Try to find a solution that will protect both your business and your
customers from fraud and identity theft. Look for a solution that can verify the age and identity of
someone without requiring sensitive information from the consumer like a social security number
or credit history.

Product Flexibility & Scalability – Seek a solution that answers your immediate needs
but can easily change and grow with the demands of your business. It should be easy to set up
and change system rules that trigger actions to complete transactions quicker and without manual
review. Work with a provider that can offer the best mix of products to meet several different levels
of identity verification. The ideal solution will allow you to take advantage of more in-depth identity
verification techniques when needed so that you can verify someone is who they claim.

Ease of Integration – To help minimize the impact on your business, look for a solution that
is service-based so that you can be up and running in just a few days. Be sure the vendor supports
a project with training and documentation such as technical and end user help guides. A good
provider will offer several different deployment options to cover all the service areas within your
business including your call center. In addition, the solution should not require IT resources to
maintain or change once it is integrated.

Due Diligence Efforts – The right solution provides the necessary transaction reporting
for you to maintain due diligence files. Select a provider that is knowledgeable and aware of the
guidelines and rules for establishing an affirmative defense and maintains a positive relationship
with lawmakers interested in the use of electronic age verification.

Data Protection Standards – Try to find a company that promotes the responsible use of
data. The right solution will have strict protocols for using and sharing data and will not collect and
store data, nor will it present data within verification results. Additionally, it should not be restricted
to any single data provider and have the ability to access multiple independent data sources. Finally
the ideal solution should eliminate any impact on credit reports when performing verifications.

Supports Consumer Privacy – Be sure to select a vendor that addresses the identity theft
crisis by supporting consumer privacy. Different providers have varying philosophies on this
issue so be sure to select a partner that demonstrates the highest level of consumer locate rates
with input requirements that match your business model and does not over expose sensitive data.
Additionally, the ideal solution will follow all the guidelines set forth in COPPA. The right vendor
will consult with you on the best way to communicate to your customers the protection measures
you are taking and will support this by providing scripts to follow and a trusted mark to place on
your site.
page 10

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

The IDology Advantage
IDology is a best of breed provider focused solely on delivering leading solutions in the age and
identity verification market. Our real-time, technology solutions verify an individual’s age and
identity in customer not present transactions such as online or in a call center without interrupting
the transaction. What makes us different is that we do this in a way that builds more confidence with
your customers – by protecting sensitive data and promoting consumer privacy.
IDology’s ExpectID Age is recognized by many as the solution setting the industry standard for
age verification services. ExpectID Age confirms someone’s age while supporting the guidelines
set forth by COPPA and the rules of the credit card associations. Our unique patent-pending
process instantly analyzes billions of data records to confirm someone’s age in a matter of seconds.
When situations need more in depth verification, you can take advantage of our ExpectID IQ
solution which offers non-intrusive, intelligent questions relating to that person’s history such as a
question involving a previous address or an associated person. By requiring a minimum of name
and address only to perform verifications, your customers are comfortable with the amount of
information they are required to share.
ExpectID Age has been endorsed by WineAmerica as the premier solution for its members selling
wine on the Internet and recently the State of Michigan tested and approved ExpectID Age for all
direct wine shipments in and out of the state. Currently, IDology is conducting age verification for
customers in several age-restricted industries including wine, distilled spirits, tobacco, and other
age-rated vendors and services. Additionally, our product is integrated within several other solutions
serving the telecommunications and wine industries including a managed service for mobile content;
ShipCompliant, a wine industry leader in ecommerce and compliance solutions; Nexternal’s
e-shopping cart; and within the ecommerce offerings of one of the largest e-markets for the wine
industry, the WineWeb.
Designed to offer complete flexibility, IDology’s solutions run on an advanced, rules-based platform
engine which enables clients to configure their solution based on defined business rules specific to
their market, including performing verifications through a hand held device. And as the demands
of the market change, you can change these business rules in real-time without having to rely on IT
resources.
Using a patent-pending process to return quick, accurate results, our solutions are backed by
maximum uptime and state-of-the-art facilities.

page 11

© 2006 IDology, Inc.
Doing The Right Thing: How Electronic Age Verification Protects Kids Online

The ExpectID product suite includes:
ExpectID Age – confirms someone’s age and supports COPPA guidelines and rules of the
Credit Card Association

ExpectID – locates a valid ID based on name and address only; can incorporate SSN4 and DOB
ExpectID IQ – advanced verification process that presents robust multiple-choice questions
related to someone’s personal history
All of our solutions are easy to deploy and offer several different delivery methods to have you up
and running quickly.

Take the first step toward protecting children online while protecting
your business by scheduling a product demonstration. Call 866-520-1234
or email info@idology.com to set up an appointment.

280 Interstate North Circle SE
Suite 610
Atlanta, GA 30339
866-520-1234
www.IDology.com

page 12

© 2006 IDology, Inc.

More Related Content

What's hot

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
mjsale781
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
Kuliza Technologies
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
David Cain
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
Patrick McCormick
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita Rollins
Nita Rollins, Ph.D.
 
US Data Privacy Laws
US Data Privacy LawsUS Data Privacy Laws
US Data Privacy LawsIDG Connect
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsBradley Buchanan
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
Sherry Jones
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
Cuttime, Inc.
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
Patrick McCormick
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaboration
Patrick McCormick
 
Social Media
Social MediaSocial Media
Social Mediaclggibson
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Read-write government: engaging citizens with social media
Read-write government: engaging citizens with social mediaRead-write government: engaging citizens with social media
Read-write government: engaging citizens with social media
Patrick McCormick
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscurelisafilipek
 
Senators question executives from you tube, tiktok, and snap about kids' safety
Senators question executives from you tube, tiktok, and snap about kids' safetySenators question executives from you tube, tiktok, and snap about kids' safety
Senators question executives from you tube, tiktok, and snap about kids' safety
aditi agarwal
 

What's hot (20)

Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Points & Pitfalls of Social Media
Points & Pitfalls of Social MediaPoints & Pitfalls of Social Media
Points & Pitfalls of Social Media
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
 
Spokeo v Robins
Spokeo v RobinsSpokeo v Robins
Spokeo v Robins
 
Big Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita RollinsBig Data's Big Paradox_Dr. Nita Rollins
Big Data's Big Paradox_Dr. Nita Rollins
 
US Data Privacy Laws
US Data Privacy LawsUS Data Privacy Laws
US Data Privacy Laws
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
The Future of Moral Persuasion in Games, AR, AI Bots, and Self Trackers by Sh...
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
Social government: a platform for online collaboration
Social government:  a platform for online collaborationSocial government:  a platform for online collaboration
Social government: a platform for online collaboration
 
Social Media
Social MediaSocial Media
Social Media
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Read-write government: engaging citizens with social media
Read-write government: engaging citizens with social mediaRead-write government: engaging citizens with social media
Read-write government: engaging citizens with social media
 
Writing Sample
Writing SampleWriting Sample
Writing Sample
 
Privately Obscure
Privately ObscurePrivately Obscure
Privately Obscure
 
Senators question executives from you tube, tiktok, and snap about kids' safety
Senators question executives from you tube, tiktok, and snap about kids' safetySenators question executives from you tube, tiktok, and snap about kids' safety
Senators question executives from you tube, tiktok, and snap about kids' safety
 

Similar to Age Verification / “Doing the Right Thing”

Children and the Media
Children and the MediaChildren and the Media
Children and the Media
EllieWeedon
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
MobiDigger
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
Hubert Moik
 
The FDA’s role in the approval and subsequent review of Vioxx, a.docx
The FDA’s role in the approval and subsequent review of Vioxx, a.docxThe FDA’s role in the approval and subsequent review of Vioxx, a.docx
The FDA’s role in the approval and subsequent review of Vioxx, a.docx
mehek4
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
eraser Juan José Calderón
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research Paper
Michelle Brown
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Bernard Marr
 
How To Write A Academic Essay Introduction
How To Write A Academic Essay IntroductionHow To Write A Academic Essay Introduction
How To Write A Academic Essay Introduction
Heather Wilkins
 
Social Media And Employment Screening
Social Media And Employment ScreeningSocial Media And Employment Screening
Social Media And Employment Screening
Lakesia Wright
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
Aboul Ella Hassanien
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
Krishna De
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 

Similar to Age Verification / “Doing the Right Thing” (15)

Children and the Media
Children and the MediaChildren and the Media
Children and the Media
 
3
33
3
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
The FDA’s role in the approval and subsequent review of Vioxx, a.docx
The FDA’s role in the approval and subsequent review of Vioxx, a.docxThe FDA’s role in the approval and subsequent review of Vioxx, a.docx
The FDA’s role in the approval and subsequent review of Vioxx, a.docx
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
How To Write An Introduction To A Research Paper
How To Write An Introduction To A Research PaperHow To Write An Introduction To A Research Paper
How To Write An Introduction To A Research Paper
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
 
How To Write A Academic Essay Introduction
How To Write A Academic Essay IntroductionHow To Write A Academic Essay Introduction
How To Write A Academic Essay Introduction
 
Social Media And Employment Screening
Social Media And Employment ScreeningSocial Media And Employment Screening
Social Media And Employment Screening
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Age Verification / “Doing the Right Thing”

  • 1. Doing The Right Thing: How Electronic Age Verification Protects Kids Online An IDology, Inc. Whitepaper
  • 2. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Taming the Wild West of the 21st Century As a society we have established and live by a set of rules designed to keep merchandise and services intended for adults out of the reach of children. In most states, alcohol sales are restricted to anyone under 21 and 18 to buy tobacco. Entertainment rating systems are used to determine if the content of movies, music or video games is suitable to minors. Adult content magazines are kept out of site behind clerk counters in many stores across the US. Advertising guidelines are followed for age-restricted products and promotional items. Convicted sexual predators are required to register their residence. Yet on the Internet, it is more like we live in the Wild West where anything goes. Logically we know all these rules still apply. But enforcing them is a different situation. Kim Cameron, Architect of Identity at Microsoft Corporation, states the problem clearly within his paper on the Laws of Identity: “the Internet was built without a way to know who and what you are connecting to.”1 And Peter Steiner, cartoonist at the New Yorker hints at the dangers this poses in his well known cartoon: “On the Internet, nobody knows you’re a dog.”2 Fortunately, advanced age and identity verification technology solutions exist that foster online trust and allow businesses to know who their customer is when selling, marketing or distributing age-restricted or age-sensitive products, services or content. The result of such solutions is a safer online environment for kids that supports adult freedom of choice and protects sensitive identifying information. This white paper will review the emerging trends in the age and identity verification market and examine the benefits of integrating an electronic age verification solution within your business. 1. Kim Cameron, Laws of Identity, May 2005, 1 2. Peter Steiner’s cartoon first appeared in the The New Yorker, on July 5, 1993 and is reproduced in compliance with the copyright laws of the United States page 1 © 2006 IDology, Inc.
  • 3. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Market Drivers Impacting Age & Identity Verification Comparing Two Worlds Physical World Virtual World • • • • • Enforced Regulations Age Verification Process Physical ID Physical presence Inherent Cost of Doing Business • Minimum Regulations Age Verification Process Honesty Policy Credit Card Authorization Emerging Acceptance and Adoption In the bricks and mortar world age-restricted and age-sensitive protection standards are well established and enforced. We all know the steps such as comparing someone’s physical appearance to an authentic and legal picture ID like a driver’s license. However in the virtual world, most companies have not implemented appropriate age verification mechanisms and some have implemented inadequate methods. Depending on the reason for a verification, there are two methods some businesses use today to verify age – the honesty policy or by credit card authorization. Both methods present obstacles and are not considered effective for protecting children online. Some of the reasons include: • The honesty policy does not work – according to one study 31% of 7th-12th graders pretend to be older to get onto a website3 • Kids have their own credit cards • Credit card authorization validates the card only, not that the person using the credit card is the rightful owner • Credit card companies have issued guidelines saying credit cards are not a valid method of age verification and merchants selling age-restricted products need to have the appropriate controls in place to ensure that they abide by the laws governing these transactions 3. The Henry J Kaiser Family Foundation, Generation M study: Media in the Lives of 8-18 year-olds, March 2005, 30 page 2 © 2006 IDology, Inc.
  • 4. Doing The Right Thing: How Electronic Age Verification Protects Kids Online The amazing growth of social networking websites has highlighted the need for age verification. Recently MySpace.com has been under fire from attorney generals about its attempts to address the dangers the site poses to teens including the opportunity for adults to interact with minors. The company is now faced with a lawsuit pertaining to alleged inappropriate interactions of an adult with a minor. In an effort to address these complaints, MySpace announced that it will deploy a database that will contain the names and physical descriptions of convicted sex offenders in the United States and automatically search for matches between the database and MySpace user profiles. In response to this announcement, Connecticut Attorney General Richard Blumenthal described the ineffectiveness of this measure without age and identity verification by saying, “Convicted sex offenders can swiftly circumvent these protections by using fake names – which they can do with ease.”4 Additionally, Xanga another social networking site was fined by the Federal Trade Commission (FTC) over alleged violations of the Children’s Online Privacy Protection Act (COPPA). The FTC said Xanga collected, used, and disclosed personal information from children under the age of 13 without first notifying parents and obtaining their consent.5 Because of the events and issues surrounding social networking sites, attorney generals from numerous states have a newly established task force to study the impact and potential harm to children from an apparant lack of lawlessness in online communities. Specifically, Blumenthal has called for MySpace to enact several practical steps including initiating a member login with age verification and restricting access to adult content to individuals 18 or older along with other steps.6 4. Anick Jesdanun, MySpace Aims to Keep Sexual Predators off Web site (Associated Press) December 6, 2006, found online at http://www.indystar.com/apps/pbcs.dll/article?AID=/20061206/LOCAL17/612060473/1012 5. Nicholas Carson, FTC Nails Xanga with Record Fine, (Internetnews.com) September 8, 2006, found online at http://www.internetnews.com/bus-news/article.php/3631131 6. Richard Blumenthal in a letter addressed to Attorney Christine Varney of Hogan & Harston LLP in Washington, D.C., March 20, 2006, found online at http://www.ct.gov/ag/lib/ag/children/MySpacebullets.pdf page 3 © 2006 IDology, Inc.
  • 5. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Parent Controls vs. Corporate Responsibility It takes a village to raise a child. Society has decided that we all protect kids together in the physical world – from lawmakers and businesses to teachers, caregivers and parents. Yet, in the virtual world, a common argument for not using electronic age verification is that it is the responsibility of the parent to monitor the online activity of their children. Electronic age verification bridges the gap between parental control and corporate responsibility by serving to assist parents – particularly since children have access to the Internet outside of their home. About 17 million youth ages 12-17 use the Internet representing 73% of those in this age bracket.7 While many access the Internet at home or school, 60% of teens still report that they use the Internet “somewhere else”—away from home and from school.8 Teens are also savvy Internet users so that relying solely on parental control software and Internet filters to protect children online is just not enough. In fact, 64% of teens and 66% of parents say that online teens know more about the Internet than their parents.9 Overall, electronic age verification plays an important part in assisting parents and caregivers by enabling businesses to enact the same protection standards online that have been recognized and enforced in our bricks and mortar world. 7. PEW Internet & American Life Project, Teenage Life Online, 1 8. UCLA Center for Communication Policy, The UCLA Internet Report—“Surveying the Digital Future” 2003, 65 9. PEW Internet & American Life Project, Teenage Life Online, 5 page 4 © 2006 IDology, Inc.
  • 6. Doing The Right Thing: How Electronic Age Verification Protects Kids Online The Age Verification Market Electronic Age Verification technology is not new although the adoption of its use has only recently started to gain traction in the market. Any industry concerned with protecting children online while at the same time promoting adult-choice and access to adult content can benefit from electronic age verification. How Electronic Age Verification Works So what exactly is Electronic Age Verification? Simply put, it is an automatic way of comparing information provided by the consumer such as name, address and date of birth against information found in thousands of trusted and verifiable data sources. The end result provides a verification that helps businesses instantly make more informed decisions regarding their approvals of transactions or access grants. Step 1 Step 2 Step 3 Consumers provide their name, address and other identifiable information required such as date of birth. Electronic age verification solution instantly compares the consumers input to thousands of trusted data sources containing billions of verifiable records. Based on the verification result, the business handles the transaction by approving it, conducting a deeper level of identity check, or rejecting it. Early Adoption by Industry Leaders Certain industries have companies that are early adopters of electronic age verification. In May 2005, the Supreme Court opened up the direct shipment of wine for review on a state by state basis. Before this ruling, thought-leader wineries such as Kendall-Jackson Wine Estates Limited deployed age verification and continue to lead the wine industry in using this technology to do the right thing for their businesses and customers. page 5 © 2006 IDology, Inc.
  • 7. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Also in 2005, the Cellular Telecommunications Industry Association (CTIA) released the Wireless Content Guidelines which carriers follow when developing programs that distribute age-restricted and age-rated content. These guidelines include using content filters and access control, such as electronic age verification, and are designed specifically to provide consumers with tools and controls they need to make informed choices when accessing carrier content.10 Even before the Master Settlement Agreement was signed in November 1998 the tobacco industry has used age verification when marketing cigarettes both in the bricks and mortar world and also online. The most recent early adopter comes from the beer industry. One of the major brewers announced it will incorporate age verification to access all of its websites in 2007. This will certainly address findings from a study conducted by the Center on Alcohol Marketing and Youth at Georgetown which estimated that 13 percent of visits to alcohol-branded sites were initiated by people under age 21, and that 34 percent of in-depth visitors to a brewery’s website were underage.11 This is a significant advancement for the beer industry which has until now relied on the honesty policy for allowing access to its marketing websites. Risks of Not Using Electronic Age Verification The media’s focus on issues surrounding social networks as well as the increased accessibility of content have caught the attention of lawmakers so that it is no longer a matter of if, but when, age verification will be required of ecommerce companies providing adult-related content, goods or services. However, the risks associated with waiting for this mandate and not voluntarily electing to deploy an electronic age verification solution are immediate. These risks include: 10. CTIA Wireless, the International Association for Wireless Telecommunications industry, Wireless Content Guidelines, found online at http://files.ctia.org/pdf/CTIA_Board_Approved_Guidelines.pdf 11. Center for Alcohol Marketing and Youth, Clicking with Kids: Alcohol Marketing and Youth on the Internet, March 2004, 3 page 6 © 2006 IDology, Inc.
  • 8. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Brand Reputation Negative attention from the media can damage a company’s reputation. It is possible that companies not taking proactive steps to protect children online will become a target for advocacy groups, boycotts and other government sponsored initiatives that pose a threat to their public perception. And not being considered a good corporate citizen impacts an important way consumers support brands – with their wallets. Regulatory Compliance Issues One of the most complex issues facing ecommerce today concerns regulation. Poor compliance measures and lack of due diligence increases liability and minimizes a business’s ability to establish an affirmative defense through best efforts. Because the Internet allows commerce across multiple jurisdictions, different regulation standards of geographies can be tricky. One example is within the wine industry which takes regulatory issues very seriously. As a result, compliance software solutions such as ShipCompliant have emerged that help wineries manage the complexity of geographic wine sales regulations including providing built-in electronic age verification technology. When any business is unable to show the efforts it has taken to promote sales to legal age adults in situations involving age-restricted products and services, the economic impact from legal problems and regulatory fines can be significant. Financial Risk In addition to decreased revenue from negative PR, other financial impacts include the potential for increased spending on marketing and legal costs as well as high penalty fines for failing to meet the guidelines under COPPA. And if age verification is handled manually, companies experience slower processing rates and a higher cost of doing business. Competitive Position Industry-leading companies are often recognized as being forward-thinking in their ability to capitalize on the latest trends and gain market share. Ecommerce companies continuing to operate without a way to verify legitimate, age appropriate customers, when others in the industry are moving toward this practice, risk their competitive ability to sustain a successful, revenue-generating business. To minimize these risks, an automated age verification solution that protects the privacy of adults and children without eliminating adult-choice or restricting the flow of ecommerce for a business is needed. page 7 © 2006 IDology, Inc.
  • 9. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Industries In Need of Electronic Age Verification: Telecommunications – content, including age-restricted movies, games and adult content, is becoming more accessible through wireless devices Retail – the Internet opened up new channels of commerce for everyone including age-restricted products like wine and cigars Social Networks – online communities allow interaction between adult and youth members which increases the risk that a child will be approached by a predator. And because it is difficult to monitor the various forms of content available within a social network, it is possible for children to have access to racey content. Social networks also have an added need for identity verification since performing searches against predator lists is ineffective if the person is not positively identified Marketing – applying the same standards for beer, tobacco, and adult content advertising and distribution in an unregulated channel Entertainment – operates an expanded distribution channel for rated-content such as movies, music and games containing violent and/or explicit material Benefits of Electronic Age Verification A number of significant benefits emerge when businesses use electronic age verification including: Positive PR Image – Instead of being perceived in a negative light, businesses have the opportunity to position themselves positively as doing the right thing and being industry leaders for protecting children online. Maintains Regulatory Compliance – With an electronic age verification system, all rules and regulations under COPPA are upheld. By conducting age verification on all transactions, you protect your business from the liabilities associated with selling or offering age-restricted or age-sensitive products and services. Electronic age verification abides by society’s rules and helps businesses establish an affirmative defense through due diligence of best efforts. page 8 © 2006 IDology, Inc.
  • 10. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Overall Brand Protection – Electronic age verification protects a company’s brand reputation and establishes the business as a good corporate citizen. Improves Financial Results – The use of an automated electronic solution helps ecommerce companies keep the speed of the Internet and process more transactions. This increases revenue or customers faster and it decreases the amount of manual review needed to process transactions thus limiting the amount of headcount required to operate your business. Exception transactions are handled faster and more efficiently thus freeing up staff to handle other business operations. Increases Competitive Position – Early adoption of electronic age verification shows forward thinking and helps establish companies as thought leaders. Other benefits of electronic age verification include: • Protects children • Promotes adult-choice • Improves customer satisfaction • Proactive self-regulation limits the impact of future enforced regulations Selecting an Age Verification Vendor When looking for a provider to electronically verify the age and identity of your consumers, there are many factors to consider including: Market Experience – Seek a solution provider that has been working with age verification technology and offering a solution for several years. Rather than offering band aid solutions, an experienced provider will have a proven, mature product and be a leader in the age verification market. Be sure to get a list of clients and ask for references. 3rd Party Endorsements – Many industry organizations are dedicated to helping members’ select trusted and competent providers of various services important to the industry. Look for a solution that has 3rd party endorsements from age-related industry organizations either within or and outside of your specific industry. A good provider will be a thought-leader on age verification and will often be sought out by lawmakers and law enforcement as a knowledgeable market expert. page 9 © 2006 IDology, Inc.
  • 11. Doing The Right Thing: How Electronic Age Verification Protects Kids Online Security – Work with a provider that understands security encompasses more than just encryption technologies. Try to find a solution that will protect both your business and your customers from fraud and identity theft. Look for a solution that can verify the age and identity of someone without requiring sensitive information from the consumer like a social security number or credit history. Product Flexibility & Scalability – Seek a solution that answers your immediate needs but can easily change and grow with the demands of your business. It should be easy to set up and change system rules that trigger actions to complete transactions quicker and without manual review. Work with a provider that can offer the best mix of products to meet several different levels of identity verification. The ideal solution will allow you to take advantage of more in-depth identity verification techniques when needed so that you can verify someone is who they claim. Ease of Integration – To help minimize the impact on your business, look for a solution that is service-based so that you can be up and running in just a few days. Be sure the vendor supports a project with training and documentation such as technical and end user help guides. A good provider will offer several different deployment options to cover all the service areas within your business including your call center. In addition, the solution should not require IT resources to maintain or change once it is integrated. Due Diligence Efforts – The right solution provides the necessary transaction reporting for you to maintain due diligence files. Select a provider that is knowledgeable and aware of the guidelines and rules for establishing an affirmative defense and maintains a positive relationship with lawmakers interested in the use of electronic age verification. Data Protection Standards – Try to find a company that promotes the responsible use of data. The right solution will have strict protocols for using and sharing data and will not collect and store data, nor will it present data within verification results. Additionally, it should not be restricted to any single data provider and have the ability to access multiple independent data sources. Finally the ideal solution should eliminate any impact on credit reports when performing verifications. Supports Consumer Privacy – Be sure to select a vendor that addresses the identity theft crisis by supporting consumer privacy. Different providers have varying philosophies on this issue so be sure to select a partner that demonstrates the highest level of consumer locate rates with input requirements that match your business model and does not over expose sensitive data. Additionally, the ideal solution will follow all the guidelines set forth in COPPA. The right vendor will consult with you on the best way to communicate to your customers the protection measures you are taking and will support this by providing scripts to follow and a trusted mark to place on your site. page 10 © 2006 IDology, Inc.
  • 12. Doing The Right Thing: How Electronic Age Verification Protects Kids Online The IDology Advantage IDology is a best of breed provider focused solely on delivering leading solutions in the age and identity verification market. Our real-time, technology solutions verify an individual’s age and identity in customer not present transactions such as online or in a call center without interrupting the transaction. What makes us different is that we do this in a way that builds more confidence with your customers – by protecting sensitive data and promoting consumer privacy. IDology’s ExpectID Age is recognized by many as the solution setting the industry standard for age verification services. ExpectID Age confirms someone’s age while supporting the guidelines set forth by COPPA and the rules of the credit card associations. Our unique patent-pending process instantly analyzes billions of data records to confirm someone’s age in a matter of seconds. When situations need more in depth verification, you can take advantage of our ExpectID IQ solution which offers non-intrusive, intelligent questions relating to that person’s history such as a question involving a previous address or an associated person. By requiring a minimum of name and address only to perform verifications, your customers are comfortable with the amount of information they are required to share. ExpectID Age has been endorsed by WineAmerica as the premier solution for its members selling wine on the Internet and recently the State of Michigan tested and approved ExpectID Age for all direct wine shipments in and out of the state. Currently, IDology is conducting age verification for customers in several age-restricted industries including wine, distilled spirits, tobacco, and other age-rated vendors and services. Additionally, our product is integrated within several other solutions serving the telecommunications and wine industries including a managed service for mobile content; ShipCompliant, a wine industry leader in ecommerce and compliance solutions; Nexternal’s e-shopping cart; and within the ecommerce offerings of one of the largest e-markets for the wine industry, the WineWeb. Designed to offer complete flexibility, IDology’s solutions run on an advanced, rules-based platform engine which enables clients to configure their solution based on defined business rules specific to their market, including performing verifications through a hand held device. And as the demands of the market change, you can change these business rules in real-time without having to rely on IT resources. Using a patent-pending process to return quick, accurate results, our solutions are backed by maximum uptime and state-of-the-art facilities. page 11 © 2006 IDology, Inc.
  • 13. Doing The Right Thing: How Electronic Age Verification Protects Kids Online The ExpectID product suite includes: ExpectID Age – confirms someone’s age and supports COPPA guidelines and rules of the Credit Card Association ExpectID – locates a valid ID based on name and address only; can incorporate SSN4 and DOB ExpectID IQ – advanced verification process that presents robust multiple-choice questions related to someone’s personal history All of our solutions are easy to deploy and offer several different delivery methods to have you up and running quickly. Take the first step toward protecting children online while protecting your business by scheduling a product demonstration. Call 866-520-1234 or email info@idology.com to set up an appointment. 280 Interstate North Circle SE Suite 610 Atlanta, GA 30339 866-520-1234 www.IDology.com page 12 © 2006 IDology, Inc.