The Privacy Lawyer: From The Mouths Of Babes - InformationWeek
10:32 AM
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

The Privacy Lawyer: From The Mouths Of Babes

Companies can begin winning over the next generation of online customers now, by respecting kids' privacy and being focused on adding value to their Internet experiences.

More than [60] million Internet users in the United States are under the age of 18. They each spend more time online than most adults do (aside from work). They shop, make buying decisions, communicate, play games, and search. They do their homework, collaborate, and hold meetings online. They participate in surveys, fill out forms, and register for online sites and services. They are the future of the Internet and E-communities and E-commerce. And, for smart E-businesses, the future is now.

In preparation for the International Association of Privacy Professionals and the TrustE nonprofit privacy initiative's West Coast conference on privacy, where we were running a plenary panel on kids, teens, and privacy, I polled 30 preteens and teens who work with (our's preteen and teen online-safety program) about privacy. Their sophistication surprised me and I expect will surprise others, too.

The kids identified five areas of privacy that concerned them:

  • The collection and use of personally identifiable information;

  • Surveillance;

  • Intrusion on seclusion;

  • Private facts made public; and

  • False light.
  • These are very sophisticated concepts of privacy. The kids used different descriptions than these. But I have used the privacy law terms usually used to identify these issues. (Most are codified under state common law in the United States and may give rise to a legal right of action.) The kids defined the terms themselves, based on how they saw them.

    According to the kids:

    "Personally identifiable information" means any information that can be used to find you in real life. It includes full names, snail-mail addresses, telephone numbers, schools they attend, the names of their sport teams, etc.

    "Surveillance" included public surveillance, nanny cams, GPS tracking, monitoring software, and spyware. They were particularly concerned about adware and whether the marketers knew who they were and could target them for pop-ups and SPAM.

    "Intrusion on seclusion" or, as they called it, personal space, began as a concern over their room, their diaries, and their phone calls. It then expanded to include intrusion by spammers, pop-ups, and anything else that gathers information about them and what they do online.

    "Private facts made public" includes personal facts about their family, themselves, or their close friends that are shared with the public (as in newspapers) or with others through rumors or unauthorized disclosures. Some of the children came from high-profile families and knew the pain of this first-hand and another one of the children had experienced cyberbullying where personal and very private information about her was shared with kids at another school and quickly spread online. (In cyberbullying situations, the rumors and lies that used to appear on the bathroom wall in the boys' room now populate a wall 700 million people wide.)

    "False light" is when the facts disclosed are false or intended to create a false impression. It may not rise to the level of defamation, but can be as devastating.

    Companies expecting to win the online business of the next generation, so sophisticated about privacy matters, will do well to think about how they'll earn that generation's trust. When I asked the kids if they would be willing to have others track what they did online, they qualified their answers.

    1 of 3
    Comment  | 
    Print  | 
    More Insights
    Newest First  |  Oldest First  |  Threaded View
    How Enterprises Are Attacking the IT Security Enterprise
    How Enterprises Are Attacking the IT Security Enterprise
    To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
    Register for InformationWeek Newsletters
    White Papers
    Current Issue
    2017 State of IT Report
    In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
    Twitter Feed
    Sponsored Live Streaming Video
    Everything You've Been Told About Mobility Is Wrong
    Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
    Flash Poll