Reading | Digital era, will sun -exposed dolls cause nightmares?—— "Please think twice in the sun: the Privacy Protection of Children in the Digital Age"
Author:Report Time:2022.07.12
The application of digital technology has brought great convenience to the life of contemporary people, but there are many problems we have never noticed. The growth information collected by the social platform, the growth information collected by the school and other social institutions, the data records generated by online shopping or survey have inadvertently prepared a "indelible file" for the child, and may become a right right. Children's disguise "surveillance" and "infringement". The author of "Children's Privacy for Children in the Digital Age" author combined with many practical cases, and used classic children's literary images, which meticulously and sharply presented the hidden safety hazards, legal risks, and the growth of children themselves by the excessive sharing of children's information. The hazards that may be produced have proposed deep warnings for parents, nursing staff, and educators.
As a lawyer and a mother with rich experience in the defense of youth cases, the author calls on adults to examine their behavior, think about how our daily practice affects children's privacy and interests, and from family education strategy, legal revision, social networking The platform's functional improvement and the construction of social credit reporting institutions have made specific and feasible suggestions for us, so that we can better protect the privacy of children in the era of big data and provide them with a more scientific and healthy growth environment.
"Please think twice: Child Privacy Protection in the Digital Age"
[Mei] Lia Princott
Zhang Changhong translated
Century Wenjing | Shanghai People's Publishing House, May 2022 Edition
>> Selected reading in the text:
Introduce the nightmare of the house
Let's start exploring really shocking things. Children's data may attract the attention of illegal, criminal or other adults, and become the goal of their various activities. These include pornography, identity theft, secret tracking, trafficking children or other forms of network bullying. The following will be briefly discussed. Persons engaged in the porn industry may use photos of children with nothing to do with them to make children's pornographic works through map repair software. Therefore, photos you posted on social media may be stolen to various criminal activities. As long as those evil images are there, they will ferment themselves and pose a lifetime threat to your child. The ghost of children's pornography not only hovers in the kinky cave, but also appears in ordinary families. When we want to ask: When, will the child's nude photos taken in the daily life of the 21st century be included in the definition of children's pornographic works in federal law? When raising this issue, the purpose is not to expand the scope of federal justice. Criminal prosecution for parents and other adult guardians, nor is it to blame those parents who accidentally sunbaths to video calls with their children's grandparents. , Pass through the living room, or install video surveillance in the child's bedroom by negotiating, so the child's image was unintentionally seen by others. Here, our purpose is to attract everyone's attention and be vigilant.
A naked newborn is lying on a bear carpet. Is this traditional baby picture obscene? no. The toddler babies are taking a bath while exploring their physical structure. Is such a picture obscene? Is her curiosity about herself in nature? Basically, you can answer: No. However, the ubiquitous use of digital technology provides the opportunity to obtain potential pornographic (or uncomfortable) images than ever before.
We need to use children's pornography carefully, and try to use it to cope with the usual practices and behaviors of the 21st century -those private digital images are not taken out of harassment, abuse of children or other evil purposes. Looking at them, they will mistake them as giant rape. Out of voluntary "send erotic messages" between adolescents, it has led to a precedent for criminal proceedings who shared themselves, friends, or intimate partner images; and according to the requirements, the judged perpetrators were recorded in the case. Digital behaviors in a private environment are leading to major criminal consequences. No signs show that parents who take nude photos of newborns on bear skin blankets may lead to similar judicial accountability. The main difference is that the practice of sending erotic text messages for teenagers is pornographic behavior, and the practice of taking naked swimming photos to the children by the secure swimming pool is not pornographic behavior. The judicial explanation given by the court is that the original intention of children's pornography is not to "punish parents who watch or have photos of nude children -the photos itself is not malicious." But it is best to avoid being summoned by the court, and then the following debate around a photo: Under what circumstances is it harmless? Under what circumstances is it illegal?
The innocence is defiled, this is just one aspect of children's criminal activities or other dangerous activities. At the same time, children's identity information is also threatened. Even children with very limited electronic data can become the goal of criminals. For some criminal acts, teenagers are facing a greater threat than adults, which is precisely because their data is blank. For those who are stolen, an adult with a long -term legal credit record and a child who has no credit records. The use value of the former social security number (SSN) is lower than the latter. Parents are unlikely to publish their children's social security numbers to the Internet, and other institutions with children's social security numbers are unlikely to do this. However, due to security vulnerabilities inside or data theft from external, children's social security numbers will still spread to the Internet. In the process of sharing children's information, parents, teachers, and other adults who care for children will publish their children's personal information, and these key information can be used by criminals to stole the child's identity. Looking back on Tommy's birth of a ecstatic post on Facebook: Everyone who sees the post knows Tommy's full name, date of birth and place. For a long time, this information can be used by others to create false personal credit in the name of Tommy, or for other purposes. People who look at the post may also know Tommy's height, weight, and other situations at birth. If the content of the post shows that the mother is still working hard, but the father eats pizza in the delivery room, so most of the follow -up comment will identify the post as "#不 如果 如果".
Even if it appears in the most direct form, this kind of information may not be the core information that the identity is stealing. However, we must realize that people use private information in unclear ways and use these private information to provide security guarantees for digital life. For example, the security issues of many websites will require users to provide personal information; the premise hidden here is that only real account owners know the information. However, with the details of personal life, the premise of this assumption is getting more and more loopholes from the beginning of the infant period. A 60 -year -old man and a 16 -year -old child are required to say the names of their primary schools. Such a security problem can protect the former more protective. For those born in the babies, not many people will know the answer to this question. For the current adolescents, many people will know the answer, or to find his school from the personal information and other channels from the child to social media. Considering the standard practices of such information, you can easily obtain such information from the electronic data traces of youth, which makes them face great risks.
Risks should not be underestimated. Law enforcement agencies like the General Judicial Prosecutor's Office of Judasian Judicial Procuratorate are creating a task force or organizing special forces to solve the problem of children's identity theft. Other relevant departments are also responding to this threat through investigation or other means. For example, in the winter of 2018, the General Judicial Prosecutor of New York State, the stealing identity information -including the stealing youth identity information -to create a social media automatic response process to start a survey. In the fall of 2017, the Minister of Justice of the United States issued an early warning to all school districts, pointing out that more and more hackers took student data as the target of attack. Some school districts even redeem the stolen student data by paying ransom.
Sading monitoring service provider -such as AllClearid -now launch identity information protection services for children. In 2015, the data of the medical insurance company Anthem was stolen, and the personal information of customers and their family members was leaked. Subsequently, the company provided identity monitoring services to influencing children and adolescents. There is a paradox here: to protect the child's identity information, their parents must register for their identity information. There is also a paradox: even if the parents have completed the information registration for their children. Once allclearid issues a warning, saying that there is a suspicious activity of theft of children's identity information, then before the problem has been resolved, the parents must provide one or more types Forms of personal information to prove their identity and their relationship with their affected children. This requires us that we must share more private information to protect children's personal information from damage. However, if the company providing identity information protection services has a security problem, what should I do? This is caught in a "vicious circle".
We are most concerned about protecting children and adolescents from being violated. At the beginning of the birth of the Internet, children's online activities have aroused concern for children's personal safety issues. This concern not only makes people panic, but also gives birth to effective response. We all "drove" all the way, drove through the "information highway" area, entered the "digital channel in all directions", and continued to develop the understanding and response methods of children's online security.
We are no longer just jumping out of the roadside kidnapper from the side of the highway. Although such a kidnapper still exists, for example, the child may be tracked, intimidated, or encountered other forms of harassment. Depending on the activities of children's parents. We talk more — even the most talked about -the little evil height next door and the threat near us. Children may be tracked and intimidated by their peers (even parents of peers), and similar dangers. This harassment may cause devastating consequences, including suicide. Native
We do not let our children go out, but through digital technology, we let the outside world break into our private space. We let the children's personal data roam — whether this data is generated by us, or with our assistance, it is generated by the child. In the initial stage of the children's exploring life, we introduced the nightmare to the house.
——This is taken from "Troubled Baby, please think twice: Child Privacy Protection in the Digital Age", the title of the editor
Author: [Mei] Lia Prubokat
Edit: Jiang Chuting
Editor in charge: Zhu Zilong
- END -
Huayu: "Peach Blossom" on the coast of the water
Recently, Director Huo Yishan and volunteers of the Green Society Shenqiuye Soy So...
Over 3 million "clouds" onlookers!Behind the screen of "Awakening Lion" is the warmth of warmth
The real historical background, encountering original stories full of power; heavy...