{"id":1169,"date":"2016-08-15T08:24:29","date_gmt":"2016-08-15T16:24:29","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=1169"},"modified":"2016-11-03T05:36:04","modified_gmt":"2016-11-03T13:36:04","slug":"age-verification-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/age-verification-in-the-digital-age\/","title":{"rendered":"Age Verification in the Digital Age"},"content":{"rendered":"<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-932\" src=\"\/internet-safety\/wp-content\/uploads\/2014\/06\/LYNETTE-OWENS.png\" alt=\"LYNETTE-OWENS\" width=\"100\" height=\"109\" \/>How Old Must One Be to Swipe Left or Right?<\/h3>\n<h3>By Lynette Owens<\/h3>\n<p><em>The original article appeared in the\u00a0Huffington Post on August 10.<\/em><\/p>\n<div class=\"content-list-component text\">\n<h3>When Tinder announced it was shutting down all accounts of users younger than 18, many parents were surprised to find out that their 13 year old had access to the dating app in the first place. One of a parent\u2019s worst nightmares is for their child to go out into the real world and meet a stranger that they had met online, which is exactly what Tinder is designed to do as efficiently as possible.<\/h3>\n<h3>In today\u2019s Digital Age, children are exposed to an unending stream of social networks, apps, and games \u2013some are designed for all ages, but many are not. Age verification is supposed to act as the doorway between these worlds. But as most parents find out, children know how to [and will] get around it.<img loading=\"lazy\" decoding=\"async\" class=\"image__src alignright\" src=\"http:\/\/img.huffingtonpost.com\/asset\/scalefit_820_noupscale\/57ab480d1700001a00c72589.jpg\" width=\"259\" height=\"145\" \/><\/h3>\n<h3>\u00a0Many apps and sites with age restrictions simply ask for a month, day and year of birth to sign up.\u00a0 There is nothing to prevent kids and young teens from picking a year that allows them to access things and people that nobody intended for them to access, and yet the hurdles to get there are so low.<\/h3>\n<h3>\u00a0Today we have self-driving cars. Precision gene editing. Reusable rockets. A rover cruising around Mars sending us selfies. Yet, age verification remains elusive. Why can\u2019t we figure out whether someone online is a 12 year-old girl or 50 year-old man? How will Tinder ensure that no one under the age of 18 will be able to sign up now that they\u2019ve implemented their ban?<\/h3>\n<h3>There are many partial solutions in place that have attempted to solve this, from age-ratings for apps to stricter terms of use, and laws like COPPA which require additional parental approval before a child under 13 can use an online service. Each is imperfect, difficult to enforce, or both. Most age-restricted apps haven\u2019t gone as far as implementing biometric security gates, such as retina or finger-print scans; this would likely stifle innovation and prevent any apps from existing because of the sheer cost and security requirements of implementing them. And, who wants all of this information about us hosted by a small start-up running the latest popular app?<\/h3>\n<h3>The truth is there is no easy answer. But, by working together, technology developers, parents, educators, communities and the internet industry as a whole can take some steps towards further ensuring kids are sticking to the content and services that are really best for them. \u00a0Here are a few ways we can do this:<\/h3>\n<h3>Read the full article on Huffington Post <span style=\"text-decoration: underline;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff; text-decoration: underline;\" href=\"http:\/\/www.huffingtonpost.com\/entry\/age-verification-in-the-digital-age_us_57ab238ee4b024b403af7295\">here<\/a><\/span><\/span>.<\/h3>\n<p><em>Lynette Owens is the Founder and Global Director of Trend Micro\u2019s Internet Safety for Kids and Families program.\u00a0 With 20+ years in the tech industry, Lynette speaks and blogs regularly on how to help kids become great digital citizens.\u00a0 She works with communities and 1:1 school districts across the U.S. and around the world to support digital literacy and citizenship education.\u00a0 She is a board member of the National Association of Media Literacy Education and SPARK Kindness, and serves on the advisory boards of INHOPE and U.S. Safer Internet Day.<\/em><\/p>\n<p><em>Follow her on Twitter @lynettetowens<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s Digital Age, children are exposed to an unending stream of social networks, apps, and games \u2013some are designed for all ages, but many are not. Age verification is supposed to act as the doorway between these worlds. But as most parents find out, children know how to [and will] get around it.  Here are 3 ways to help kids stick to online content and services that are really best for them.<\/p>\n","protected":false},"author":2,"featured_media":1208,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[13,44,8,47,6,75,5,11,48,10,42,57,55,76,88,12,147,43],"class_list":["post-1169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-for-parents","category-for-teachers","tag-cell-phones","tag-coppa","tag-digital-citizenship","tag-digital-literacy","tag-education","tag-instagram","tag-internet-safety","tag-kids","tag-media-literacy","tag-online-safety","tag-parental-controls","tag-parents","tag-security","tag-snapchat","tag-social-media","tag-social-networking","tag-tinder","tag-website-filters","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/1169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=1169"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/1169\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media\/1208"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=1169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=1169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=1169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}