You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pid="section-2.1-6">Even when multiple parties provide verification services, centralization can emerge if there is too much friction against user switching between them. For example, if Web sites rather than end users select the verification service used, this does not create a market that respects end user preferences; it only respects the self-interest of sites.<ahref="#section-2.1-6" class="pilcrow">¶</a></p>
1208
1208
<pid="section-2.1-7">Age restriction systems can also have secondary effects that lead to centralization. For example, if an age restriction system requires use of a particular Web browser (or a small number of them), that effectively distorts the market for Web browsers.<ahref="#section-2.1-7" class="pilcrow">¶</a></p>
1209
1209
<pid="section-2.1-8">Thus, centralisation is a primary consideration for age restriction systems. Internet infrastructure is designed in a way to avoid centralization where it is technically possible, or to mitigate centralization risks where it is not. Since there is nothing inherently centralized about determining a person's age -- i.e., there are many ways to come to that conclusion -- centralization should be avoided, not merely mitigated, in these systems.<ahref="#section-2.1-8" class="pilcrow">¶</a></p>
1210
-
<pid="section-2.1-9">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1211
-
* Avoid reliance on a single party to provide age verification services
1212
-
* Provide some mechanism for easy switching between verification services by end users
1213
-
* Avoid requiring use of an arbitrarily limited set of operating systems, Web browsers, client programs, or other software or hardware<ahref="#section-2.1-9" class="pilcrow">¶</a></p>
1214
-
<pid="section-2.1-10"><span>[<ahref="#CENTRALIZATION" class="cite xref">CENTRALIZATION</a>]</span> explores these issues greater detail.<ahref="#section-2.1-10" class="pilcrow">¶</a></p>
1210
+
<pid="section-2.1-9">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<ahref="#section-2.1-9" class="pilcrow">¶</a></p>
1211
+
<ulclass="normal">
1212
+
<liclass="normal" id="section-2.1-10.1">
1213
+
<pid="section-2.1-10.1.1">Avoid reliance on a single party to provide age verification services<ahref="#section-2.1-10.1.1" class="pilcrow">¶</a></p>
1214
+
</li>
1215
+
<liclass="normal" id="section-2.1-10.2">
1216
+
<pid="section-2.1-10.2.1">Provide some mechanism for easy switching between verification services by end users<ahref="#section-2.1-10.2.1" class="pilcrow">¶</a></p>
1217
+
</li>
1218
+
<liclass="normal" id="section-2.1-10.3">
1219
+
<pid="section-2.1-10.3.1">Avoid requiring use of an arbitrarily limited set of operating systems, Web browsers, client programs, or other software or hardware<ahref="#section-2.1-10.3.1" class="pilcrow">¶</a></p>
1220
+
</li>
1221
+
</ul>
1222
+
<pid="section-2.1-11"><span>[<ahref="#CENTRALIZATION" class="cite xref">CENTRALIZATION</a>]</span> explores these issues greater detail.<ahref="#section-2.1-11" class="pilcrow">¶</a></p>
<pid="section-2.2-7">Furthermore, exposing information beyond age to services creates additional privacy and security risks. For example, an age verification system that also exposes the country a person is a citizen of allows sites to discriminate against that attribute, which is beyond the purpose of age restriction.<ahref="#section-2.2-7" class="pilcrow">¶</a></p>
1229
1237
<pid="section-2.2-8">Finally, even on its own a simple attribute like 'age in years' or 'birthdate' can be used to add entropy to an identifier for the end user, creating a new tracking vector when exposed to services that collect such information. See <span>[<ahref="#TRACKING" class="cite xref">TRACKING</a>]</span>.<ahref="#section-2.2-8" class="pilcrow">¶</a></p>
1230
1238
<pid="section-2.2-9">In all cases, the privacy and security of an age restriction system needs to be proven: considerable experience has shown that merely trusting assertions of these properties is ill-founded.<ahref="#section-2.2-9" class="pilcrow">¶</a></p>
1231
-
<pid="section-2.2-10">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1232
-
* Avoid over-collection of information by age verifiers
1233
-
* Avoid sharing information about service usage with age verifiers
1234
-
* Avoid sharing information other than age information with services
1235
-
* Minimise the amount of age information shared with services (e.g., using age brackets)
1236
-
* Be based upon publicly available specifications that have had adequate security and privacy review to the level that Internet standards are held to<ahref="#section-2.2-10" class="pilcrow">¶</a></p>
1237
-
<pid="section-2.2-11">See also <span>[<ahref="#PRIVACY" class="cite xref">PRIVACY</a>]</span>.<ahref="#section-2.2-11" class="pilcrow">¶</a></p>
1239
+
<pid="section-2.2-10">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<ahref="#section-2.2-10" class="pilcrow">¶</a></p>
1240
+
<ulclass="normal">
1241
+
<liclass="normal" id="section-2.2-11.1">
1242
+
<pid="section-2.2-11.1.1">Avoid over-collection of information by age verifiers<ahref="#section-2.2-11.1.1" class="pilcrow">¶</a></p>
1243
+
</li>
1244
+
<liclass="normal" id="section-2.2-11.2">
1245
+
<pid="section-2.2-11.2.1">Avoid sharing information about service usage with age verifiers<ahref="#section-2.2-11.2.1" class="pilcrow">¶</a></p>
1246
+
</li>
1247
+
<liclass="normal" id="section-2.2-11.3">
1248
+
<pid="section-2.2-11.3.1">Avoid sharing information other than age information with services<ahref="#section-2.2-11.3.1" class="pilcrow">¶</a></p>
1249
+
</li>
1250
+
<liclass="normal" id="section-2.2-11.4">
1251
+
<pid="section-2.2-11.4.1">Minimise the amount of age information shared with services (e.g., using age brackets)<ahref="#section-2.2-11.4.1" class="pilcrow">¶</a></p>
1252
+
</li>
1253
+
<liclass="normal" id="section-2.2-11.5">
1254
+
<pid="section-2.2-11.5.1">Be based upon publicly available specifications that have had adequate security and privacy review to the level that Internet standards are held to<ahref="#section-2.2-11.5.1" class="pilcrow">¶</a></p>
1255
+
</li>
1256
+
</ul>
1257
+
<pid="section-2.2-12">See also <span>[<ahref="#PRIVACY" class="cite xref">PRIVACY</a>]</span>.<ahref="#section-2.2-12" class="pilcrow">¶</a></p>
<pid="section-2.3-2">Imposing these requirements means that some number of people will be disenfranchised from full use of the Internet – especially if age restriction becomes pervasive across many services. At the scale of the entire Internet (or even in a single country), this can be a large number of disenfranchised people.<ahref="#section-2.3-2" class="pilcrow">¶</a></p>
1247
1267
<pid="section-2.3-3">For example, many people only have Internet access from public computers (such as those in libraries), and do not have exclusive or reliable access to a smartphone. Others lack government-issued identity documents that some schemes rely upon.<ahref="#section-2.3-3" class="pilcrow">¶</a></p>
1248
1268
<pid="section-2.3-4">While such restrictions may be palatable in a closed system (such as on a single platform or in a single jurisdiction), they are not suitable for Internet-wide deployment.<ahref="#section-2.3-4" class="pilcrow">¶</a></p>
1249
-
<pid="section-2.3-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1250
-
* Avoid requiring hardware capabilities not widely available in desktop and mobile computers globally, both in terms of overall performance and specific features
1251
-
* Avoid relying on a single mechanism for proving age<ahref="#section-2.3-5" class="pilcrow">¶</a></p>
1269
+
<pid="section-2.3-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<ahref="#section-2.3-5" class="pilcrow">¶</a></p>
1270
+
<ulclass="normal">
1271
+
<liclass="normal" id="section-2.3-6.1">
1272
+
<pid="section-2.3-6.1.1">Avoid requiring hardware capabilities not widely available in desktop and mobile computers globally, both in terms of overall performance and specific features<ahref="#section-2.3-6.1.1" class="pilcrow">¶</a></p>
1273
+
</li>
1274
+
<liclass="normal" id="section-2.3-6.2">
1275
+
<pid="section-2.3-6.2.1">Avoid relying on a single mechanism for proving age<ahref="#section-2.3-6.2.1" class="pilcrow">¶</a></p>
<pid="section-2.4-2">Fragmentation is a growing concern for the Internet: various local requirements are creating friction against global deployment of new applications, protocols, and capabilities. As the Internet fragments, the benefits of having a single, globe-spanning networking technology are correspondingly lessened. Although a single factor (such as diverging approaches to age restriction) is unlikely to fragment the Internet on its own, the sum of such divergences increases the risk of fragmentation greatly, risking the viability of the Internet itself.<ahref="#section-2.4-2" class="pilcrow">¶</a></p>
1261
1287
<pid="section-2.4-3">In the context of age restriction, fragmentation is most concerning if someone were to need to understand and interact with (possibly after some onboarding procedure) a new system for each jurisdiction they visit. This would represent a significant barrier for users who travel, and would also present increased complexity and regulatory burden for businesses, potentially leading to further lack of competitiveness in some industries by increasing costs.<ahref="#section-2.4-3" class="pilcrow">¶</a></p>
1262
1288
<pid="section-2.4-4">Fragmentation is best addressed by adoption of common technical standards across jurisdictions. However, it is important to recognise that the mere existence of an international standard does not imply that it is suitable for deployment: experience has shown that voluntary adoption by implementers is important to prove their viability.<ahref="#section-2.4-4" class="pilcrow">¶</a></p>
1263
-
<pid="section-2.4-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1264
-
* Be based upon internationally recognised, open technical standards
1265
-
* Be based upon technical standards that are voluntarily adopted by implementers
1266
-
* Be coordinated across jurisdictions wherever feasible<ahref="#section-2.4-5" class="pilcrow">¶</a></p>
1289
+
<pid="section-2.4-5">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<ahref="#section-2.4-5" class="pilcrow">¶</a></p>
1290
+
<ulclass="normal">
1291
+
<liclass="normal" id="section-2.4-6.1">
1292
+
<pid="section-2.4-6.1.1">Be based upon internationally recognised, open technical standards<ahref="#section-2.4-6.1.1" class="pilcrow">¶</a></p>
1293
+
</li>
1294
+
<liclass="normal" id="section-2.4-6.2">
1295
+
<pid="section-2.4-6.2.1">Be based upon technical standards that are voluntarily adopted by implementers<ahref="#section-2.4-6.2.1" class="pilcrow">¶</a></p>
1296
+
</li>
1297
+
<liclass="normal" id="section-2.4-6.3">
1298
+
<pid="section-2.4-6.3.1">Be coordinated across jurisdictions wherever feasible<ahref="#section-2.4-6.3.1" class="pilcrow">¶</a></p>
<pid="section-2.5-1">The Internet is designed to be used without permission, both be servers and clients. Easy-to-use age restriction mechanisms risk creating a ‘papers please’ Internet, where a credential is required to access large portions of the Internet's services. Such an outcome would amplify the other harms listed.<ahref="#section-2.5-1" class="pilcrow">¶</a></p>
1275
1309
<pid="section-2.5-2">This risk is heightened if there are incentives for sites to deploy it, such as increased access to non-age data.<ahref="#section-2.5-2" class="pilcrow">¶</a></p>
1276
1310
<pid="section-2.5-3">Access to more granular age information also heightens many risks, because it makes a restriction system simultaneously useful in a broader variety of cases, and more attractive for misuse, because it offers more information about users.<ahref="#section-2.5-3" class="pilcrow">¶</a></p>
1277
-
<pid="section-2.5-4">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:
1278
-
* Make the use of age restrictions visible to end users
1279
-
* Have a structural disincentive for deployment of age-gated services online<ahref="#section-2.5-4" class="pilcrow">¶</a></p>
1311
+
<pid="section-2.5-4">Therefore, age restriction systems that are intended to become part of Internet infrastructure MUST:<ahref="#section-2.5-4" class="pilcrow">¶</a></p>
1312
+
<ulclass="normal">
1313
+
<liclass="normal" id="section-2.5-5.1">
1314
+
<pid="section-2.5-5.1.1">Make the use of age restrictions visible to end users<ahref="#section-2.5-5.1.1" class="pilcrow">¶</a></p>
1315
+
</li>
1316
+
<liclass="normal" id="section-2.5-5.2">
1317
+
<pid="section-2.5-5.2.1">Have a structural disincentive for deployment of age-gated services online<ahref="#section-2.5-5.2.1" class="pilcrow">¶</a></p>
0 commit comments