Skip to content

Commit f4f521e

Browse files
author
ID Bot
committed
Script updating gh-pages from 2447bd1. [ci skip]
1 parent d04669a commit f4f521e

File tree

2 files changed

+108
-46
lines changed

2 files changed

+108
-46
lines changed

draft-nottingham-iab-age-restrictions.html

Lines changed: 62 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1207,11 +1207,19 @@ <h3 id="name-centralization">
12071207
<p id="section-2.1-6">Even when multiple parties provide verification services, centralization can emerge if there is too much friction against user switching between them. For example, if Web sites rather than end users select the verification service used, this does not create a market that respects end user preferences; it only respects the self-interest of sites.<a href="#section-2.1-6" class="pilcrow"></a></p>
12081208
<p id="section-2.1-7">Age restriction systems can also have secondary effects that lead to centralization. For example, if an age restriction system requires use of a particular Web browser (or a small number of them), that effectively distorts the market for Web browsers.<a href="#section-2.1-7" class="pilcrow"></a></p>
12091209
<p id="section-2.1-8">Thus, centralisation is a primary consideration for age restriction systems. Internet infrastructure is designed in a way to avoid centralization where it is technically possible, or to mitigate centralization risks where it is not. Since there is nothing inherently centralized about determining a person's age -- i.e., there are many ways to come to that conclusion -- centralization should be avoided, not merely mitigated, in these systems.<a href="#section-2.1-8" class="pilcrow"></a></p>
1210-
<p id="section-2.1-9">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1211-
* Avoid reliance on a single party to provide age verification services
1212-
* Provide some mechanism for easy switching between verification services by end users
1213-
* Avoid requiring use of an arbitrarily limited set of operating systems, Web browsers, client programs, or other software or hardware<a href="#section-2.1-9" class="pilcrow"></a></p>
1214-
<p id="section-2.1-10"><span>[<a href="#CENTRALIZATION" class="cite xref">CENTRALIZATION</a>]</span> explores these issues greater detail.<a href="#section-2.1-10" class="pilcrow"></a></p>
1210+
<p id="section-2.1-9">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<a href="#section-2.1-9" class="pilcrow"></a></p>
1211+
<ul class="normal">
1212+
<li class="normal" id="section-2.1-10.1">
1213+
<p id="section-2.1-10.1.1">Avoid reliance on a single party to provide age verification services<a href="#section-2.1-10.1.1" class="pilcrow"></a></p>
1214+
</li>
1215+
<li class="normal" id="section-2.1-10.2">
1216+
<p id="section-2.1-10.2.1">Provide some mechanism for easy switching between verification services by end users<a href="#section-2.1-10.2.1" class="pilcrow"></a></p>
1217+
</li>
1218+
<li class="normal" id="section-2.1-10.3">
1219+
<p id="section-2.1-10.3.1">Avoid requiring use of an arbitrarily limited set of operating systems, Web browsers, client programs, or other software or hardware<a href="#section-2.1-10.3.1" class="pilcrow"></a></p>
1220+
</li>
1221+
</ul>
1222+
<p id="section-2.1-11"><span>[<a href="#CENTRALIZATION" class="cite xref">CENTRALIZATION</a>]</span> explores these issues greater detail.<a href="#section-2.1-11" class="pilcrow"></a></p>
12151223
</section>
12161224
</div>
12171225
<div id="privacy-and-security">
@@ -1228,13 +1236,25 @@ <h3 id="name-privacy-and-security">
12281236
<p id="section-2.2-7">Furthermore, exposing information beyond age to services creates additional privacy and security risks. For example, an age verification system that also exposes the country a person is a citizen of allows sites to discriminate against that attribute, which is beyond the purpose of age restriction.<a href="#section-2.2-7" class="pilcrow"></a></p>
12291237
<p id="section-2.2-8">Finally, even on its own a simple attribute like 'age in years' or 'birthdate' can be used to add entropy to an identifier for the end user, creating a new tracking vector when exposed to services that collect such information. See <span>[<a href="#TRACKING" class="cite xref">TRACKING</a>]</span>.<a href="#section-2.2-8" class="pilcrow"></a></p>
12301238
<p id="section-2.2-9">In all cases, the privacy and security of an age restriction system needs to be proven: considerable experience has shown that merely trusting assertions of these properties is ill-founded.<a href="#section-2.2-9" class="pilcrow"></a></p>
1231-
<p id="section-2.2-10">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1232-
* Avoid over-collection of information by age verifiers
1233-
* Avoid sharing information about service usage with age verifiers
1234-
* Avoid sharing information other than age information with services
1235-
* Minimise the amount of age information shared with services (e.g., using age brackets)
1236-
* Be based upon publicly available specifications that have had adequate security and privacy review to the level that Internet standards are held to<a href="#section-2.2-10" class="pilcrow"></a></p>
1237-
<p id="section-2.2-11">See also <span>[<a href="#PRIVACY" class="cite xref">PRIVACY</a>]</span>.<a href="#section-2.2-11" class="pilcrow"></a></p>
1239+
<p id="section-2.2-10">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<a href="#section-2.2-10" class="pilcrow"></a></p>
1240+
<ul class="normal">
1241+
<li class="normal" id="section-2.2-11.1">
1242+
<p id="section-2.2-11.1.1">Avoid over-collection of information by age verifiers<a href="#section-2.2-11.1.1" class="pilcrow"></a></p>
1243+
</li>
1244+
<li class="normal" id="section-2.2-11.2">
1245+
<p id="section-2.2-11.2.1">Avoid sharing information about service usage with age verifiers<a href="#section-2.2-11.2.1" class="pilcrow"></a></p>
1246+
</li>
1247+
<li class="normal" id="section-2.2-11.3">
1248+
<p id="section-2.2-11.3.1">Avoid sharing information other than age information with services<a href="#section-2.2-11.3.1" class="pilcrow"></a></p>
1249+
</li>
1250+
<li class="normal" id="section-2.2-11.4">
1251+
<p id="section-2.2-11.4.1">Minimise the amount of age information shared with services (e.g., using age brackets)<a href="#section-2.2-11.4.1" class="pilcrow"></a></p>
1252+
</li>
1253+
<li class="normal" id="section-2.2-11.5">
1254+
<p id="section-2.2-11.5.1">Be based upon publicly available specifications that have had adequate security and privacy review to the level that Internet standards are held to<a href="#section-2.2-11.5.1" class="pilcrow"></a></p>
1255+
</li>
1256+
</ul>
1257+
<p id="section-2.2-12">See also <span>[<a href="#PRIVACY" class="cite xref">PRIVACY</a>]</span>.<a href="#section-2.2-12" class="pilcrow"></a></p>
12381258
</section>
12391259
</div>
12401260
<div id="barriers-to-access">
@@ -1246,9 +1266,15 @@ <h3 id="name-barriers-to-access">
12461266
<p id="section-2.3-2">Imposing these requirements means that some number of people will be disenfranchised from full use of the Internet – especially if age restriction becomes pervasive across many services. At the scale of the entire Internet (or even in a single country), this can be a large number of disenfranchised people.<a href="#section-2.3-2" class="pilcrow"></a></p>
12471267
<p id="section-2.3-3">For example, many people only have Internet access from public computers (such as those in libraries), and do not have exclusive or reliable access to a smartphone. Others lack government-issued identity documents that some schemes rely upon.<a href="#section-2.3-3" class="pilcrow"></a></p>
12481268
<p id="section-2.3-4">While such restrictions may be palatable in a closed system (such as on a single platform or in a single jurisdiction), they are not suitable for Internet-wide deployment.<a href="#section-2.3-4" class="pilcrow"></a></p>
1249-
<p id="section-2.3-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1250-
* Avoid requiring hardware capabilities not widely available in desktop and mobile computers globally, both in terms of overall performance and specific features
1251-
* Avoid relying on a single mechanism for proving age<a href="#section-2.3-5" class="pilcrow"></a></p>
1269+
<p id="section-2.3-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<a href="#section-2.3-5" class="pilcrow"></a></p>
1270+
<ul class="normal">
1271+
<li class="normal" id="section-2.3-6.1">
1272+
<p id="section-2.3-6.1.1">Avoid requiring hardware capabilities not widely available in desktop and mobile computers globally, both in terms of overall performance and specific features<a href="#section-2.3-6.1.1" class="pilcrow"></a></p>
1273+
</li>
1274+
<li class="normal" id="section-2.3-6.2">
1275+
<p id="section-2.3-6.2.1">Avoid relying on a single mechanism for proving age<a href="#section-2.3-6.2.1" class="pilcrow"></a></p>
1276+
</li>
1277+
</ul>
12521278
</section>
12531279
</div>
12541280
<div id="fragmentation">
@@ -1260,10 +1286,18 @@ <h3 id="name-fragmentation">
12601286
<p id="section-2.4-2">Fragmentation is a growing concern for the Internet: various local requirements are creating friction against global deployment of new applications, protocols, and capabilities. As the Internet fragments, the benefits of having a single, globe-spanning networking technology are correspondingly lessened. Although a single factor (such as diverging approaches to age restriction) is unlikely to fragment the Internet on its own, the sum of such divergences increases the risk of fragmentation greatly, risking the viability of the Internet itself.<a href="#section-2.4-2" class="pilcrow"></a></p>
12611287
<p id="section-2.4-3">In the context of age restriction, fragmentation is most concerning if someone were to need to understand and interact with (possibly after some onboarding procedure) a new system for each jurisdiction they visit. This would represent a significant barrier for users who travel, and would also present increased complexity and regulatory burden for businesses, potentially leading to further lack of competitiveness in some industries by increasing costs.<a href="#section-2.4-3" class="pilcrow"></a></p>
12621288
<p id="section-2.4-4">Fragmentation is best addressed by adoption of common technical standards across jurisdictions. However, it is important to recognise that the mere existence of an international standard does not imply that it is suitable for deployment: experience has shown that voluntary adoption by implementers is important to prove their viability.<a href="#section-2.4-4" class="pilcrow"></a></p>
1263-
<p id="section-2.4-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1264-
* Be based upon internationally recognised, open technical standards
1265-
* Be based upon technical standards that are voluntarily adopted by implementers
1266-
* Be coordinated across jurisdictions wherever feasible<a href="#section-2.4-5" class="pilcrow"></a></p>
1289+
<p id="section-2.4-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<a href="#section-2.4-5" class="pilcrow"></a></p>
1290+
<ul class="normal">
1291+
<li class="normal" id="section-2.4-6.1">
1292+
<p id="section-2.4-6.1.1">Be based upon internationally recognised, open technical standards<a href="#section-2.4-6.1.1" class="pilcrow"></a></p>
1293+
</li>
1294+
<li class="normal" id="section-2.4-6.2">
1295+
<p id="section-2.4-6.2.1">Be based upon technical standards that are voluntarily adopted by implementers<a href="#section-2.4-6.2.1" class="pilcrow"></a></p>
1296+
</li>
1297+
<li class="normal" id="section-2.4-6.3">
1298+
<p id="section-2.4-6.3.1">Be coordinated across jurisdictions wherever feasible<a href="#section-2.4-6.3.1" class="pilcrow"></a></p>
1299+
</li>
1300+
</ul>
12671301
</section>
12681302
</div>
12691303
<div id="an-age-gated-internet">
@@ -1274,9 +1308,15 @@ <h3 id="name-an-age-gated-internet">
12741308
<p id="section-2.5-1">The Internet is designed to be used without permission, both be servers and clients. Easy-to-use age restriction mechanisms risk creating a ‘papers please’ Internet, where a credential is required to access large portions of the Internet's services. Such an outcome would amplify the other harms listed.<a href="#section-2.5-1" class="pilcrow"></a></p>
12751309
<p id="section-2.5-2">This risk is heightened if there are incentives for sites to deploy it, such as increased access to non-age data.<a href="#section-2.5-2" class="pilcrow"></a></p>
12761310
<p id="section-2.5-3">Access to more granular age information also heightens many risks, because it makes a restriction system simultaneously useful in a broader variety of cases, and more attractive for misuse, because it offers more information about users.<a href="#section-2.5-3" class="pilcrow"></a></p>
1277-
<p id="section-2.5-4">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1278-
* Make the use of age restrictions visible to end users
1279-
* Have a structural disincentive for deployment of age-gated services online<a href="#section-2.5-4" class="pilcrow"></a></p>
1311+
<p id="section-2.5-4">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<a href="#section-2.5-4" class="pilcrow"></a></p>
1312+
<ul class="normal">
1313+
<li class="normal" id="section-2.5-5.1">
1314+
<p id="section-2.5-5.1.1">Make the use of age restrictions visible to end users<a href="#section-2.5-5.1.1" class="pilcrow"></a></p>
1315+
</li>
1316+
<li class="normal" id="section-2.5-5.2">
1317+
<p id="section-2.5-5.2.1">Have a structural disincentive for deployment of age-gated services online<a href="#section-2.5-5.2.1" class="pilcrow"></a></p>
1318+
</li>
1319+
</ul>
12801320
</section>
12811321
</div>
12821322
</section>

draft-nottingham-iab-age-restrictions.txt

Lines changed: 46 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -150,11 +150,17 @@ Table of Contents
150150
should be avoided, not merely mitigated, in these systems.
151151

152152
Therefore, age restriction systems that are intended to become part
153-
of Internet infrastructure MUST: * Avoid reliance on a single party
154-
to provide age verification services * Provide some mechanism for
155-
easy switching between verification services by end users * Avoid
156-
requiring use of an arbitrarily limited set of operating systems, Web
157-
browsers, client programs, or other software or hardware
153+
of Internet infrastructure MUST:
154+
155+
* Avoid reliance on a single party to provide age verification
156+
services
157+
158+
* Provide some mechanism for easy switching between verification
159+
services by end users
160+
161+
* Avoid requiring use of an arbitrarily limited set of operating
162+
systems, Web browsers, client programs, or other software or
163+
hardware
158164

159165
[CENTRALIZATION] explores these issues greater detail.
160166

@@ -213,14 +219,20 @@ Table of Contents
213219
trusting assertions of these properties is ill-founded.
214220

215221
Therefore, age restriction systems that are intended to become part
216-
of Internet infrastructure MUST: * Avoid over-collection of
217-
information by age verifiers * Avoid sharing information about
218-
service usage with age verifiers * Avoid sharing information other
219-
than age information with services * Minimise the amount of age
220-
information shared with services (e.g., using age brackets) * Be
221-
based upon publicly available specifications that have had adequate
222-
security and privacy review to the level that Internet standards are
223-
held to
222+
of Internet infrastructure MUST:
223+
224+
* Avoid over-collection of information by age verifiers
225+
226+
* Avoid sharing information about service usage with age verifiers
227+
228+
* Avoid sharing information other than age information with services
229+
230+
* Minimise the amount of age information shared with services (e.g.,
231+
using age brackets)
232+
233+
* Be based upon publicly available specifications that have had
234+
adequate security and privacy review to the level that Internet
235+
standards are held to
224236

225237
See also [PRIVACY].
226238

@@ -246,10 +258,13 @@ Table of Contents
246258
suitable for Internet-wide deployment.
247259

248260
Therefore, age restriction systems that are intended to become part
249-
of Internet infrastructure MUST: * Avoid requiring hardware
250-
capabilities not widely available in desktop and mobile computers
251-
globally, both in terms of overall performance and specific features
252-
* Avoid relying on a single mechanism for proving age
261+
of Internet infrastructure MUST:
262+
263+
* Avoid requiring hardware capabilities not widely available in
264+
desktop and mobile computers globally, both in terms of overall
265+
performance and specific features
266+
267+
* Avoid relying on a single mechanism for proving age
253268

254269
2.4. Fragmentation
255270

@@ -284,10 +299,14 @@ Table of Contents
284299
viability.
285300

286301
Therefore, age restriction systems that are intended to become part
287-
of Internet infrastructure MUST: * Be based upon internationally
288-
recognised, open technical standards * Be based upon technical
289-
standards that are voluntarily adopted by implementers * Be
290-
coordinated across jurisdictions wherever feasible
302+
of Internet infrastructure MUST:
303+
304+
* Be based upon internationally recognised, open technical standards
305+
306+
* Be based upon technical standards that are voluntarily adopted by
307+
implementers
308+
309+
* Be coordinated across jurisdictions wherever feasible
291310

292311
2.5. An Age-Gated Internet
293312

@@ -306,9 +325,12 @@ Table of Contents
306325
offers more information about users.
307326

308327
Therefore, age restriction systems that are intended to become part
309-
of Internet infrastructure MUST: * Make the use of age restrictions
310-
visible to end users * Have a structural disincentive for deployment
311-
of age-gated services online
328+
of Internet infrastructure MUST:
329+
330+
* Make the use of age restrictions visible to end users
331+
332+
* Have a structural disincentive for deployment of age-gated
333+
services online
312334

313335
3. IANA Considerations
314336

0 commit comments

Comments
 (0)