Welcome!

News Feed Item

New Survey Reveals Strong Support for Updating Children’s Online Privacy Protection Act

Two leading nonprofit groups, the Center for Digital Democracy and Common Sense Media, today released the results of a new survey on public attitudes about children’s online privacy. The study — conducted over a two-week period in November by Princeton Research Associates International (PSRAI) — polled more than 2,000 adults and found overwhelming support for the Children’s Online Privacy Protection Act (COPPA), the law that requires parental consent before websites can collect personal information from children under the age of 13. The findings revealed strong support not only for the basic principles of the law, but also for several key proposed changes in the rules that would address a range of online business practices — including mobile marketing and behavioral profiling — that have emerged since the COPPA took effect more than a decade ago. The Federal Trade Commission is expected to announce a number of updates to the COPPA regulations in the coming weeks.

The majority of respondents in the survey (90%) expressed support for COPPA’s basic requirement that online companies seeking to collect personal information from young children must first obtain permission from parents. In addition, the survey found significantly high levels of support for safeguards to protect children from many of the data collection and marketing practices that are frequently used to target them in today’s digital media environment.

Respondents expressed disapproval of a number of techniques increasingly employed by many child-directed websites — 80% of adults were opposed to allowing advertisers to collect and use information about a child’s activities online, even in cases where advertisers do not know the actual name and address of a child.

The survey also found that both parents and nonparents largely agree on many points:

  • 91% of both parents and adults believe it is not okay for advertisers to collect information about a child’s location from that child’s mobile phone.
  • 94% of parents and 91% of adults agree that advertisers should receive the parent’s permission before putting tracking software on a child’s computer.
  • 96% of parents and 94% of adults expressed disapproval when asked if it is “okay for a website to ask children for personal information about their friends.”
    • 91% of parents said they strongly disagree with the idea, as did 86% of adults.

Congress passed COPPA in 1998 with bipartisan support. The law established a set of safeguards for website operators targeting children under 13, and ensured that parents would play the key decision-making role in determining whether and how their children’s personal information would be used in the online environment. The law was purposely designed to respond to changing technologies and business practices, and requires the Federal Trade Commission to conduct periodic reviews. A coalition of child advocacy, consumer, public health, and privacy groups has called on the FTC to update its COPPA rules to cover many of the techniques that marketers are using today, which include: collecting geolocation information from a child’s mobile phone; targeting children and their friends through social networks and interactive games; and employing cookies, plug-ins, and other software to track young people’s online behaviors. The FTC proposed changes to the rules last year, and has sought comments from a wide range of industry and public interest groups, but has yet to release its revised regulations.

“It is clear from these findings that the public supports strong action by the FTC to address the disturbing and widespread practices that threaten the privacy and safety of our nation’s children,” said Kathryn C. Montgomery, Ph.D, professor of communication at American University and one of the leaders of the campaign to pass COPPA during the 1990s. “Children should be able to reap the benefits of this new participatory media culture without being subjected to techniques that take advantage of their developmental vulnerabilities. We must ensure that the COPPA rules are updated effectively so that the generation of young people growing up online today will be treated fairly in the growing digital marketplace.”

“The results of this poll should be a wake-up call to the industry that parents understand what’s at stake for their kids in a digital world, and want the power to protect their children to remain in their hands,” said James P. Steyer, CEO and founder, Common Sense Media. “The industry argues that updates to COPPA will stifle innovation and cost jobs, when in fact, they should respect the role of parents and use it build consumer trust. The FTC’s recommended updates to COPPA represent the most important regulation of the past 10 years when it comes to protecting our kids’ privacy. They will help ensure that parents have better information and tools, and that parents -- not third-party ad networks and data brokers -- get to decide when their children’s personal information can -- and can’t -- be collected, shared, and sold.”

Additional information about the survey, including a summary of findings, full tables, and an infographic can be found at www.democraticmedia.org and www.commonsense.org/COPPA. To download the summary of findings directly, go to http://cdn2-www.ec.commonsensemedia.org/sites/default/files/coppa-executive-summary-and-findings.pdf.

About Center for Digital Democracy

The Center for Digital Democracy (CDD) is recognized as one of the leading consumer protection and privacy organizations in the United States. Since its founding in 2001 (and prior to that through its predecessor organization, the Center for Media Education), CDD has been at the forefront of research, public education, and advocacy on protecting consumers in the digital age. Its impact has been highly significant, fostering widespread debate, educating a spectrum of stakeholders, and creating a legacy of government and self-regulatory safeguards across a variety of Internet and digital media platforms. CDD’s public education programs are focused on informing consumers, policy makers, and the press about contemporary digital marketing issues, including its impact on public health, children and youth, and financial services. For more information, visit www.democraticmedia.org.

About Common Sense Media

Common Sense Media is dedicated to improving the lives of kids and families by providing the trustworthy information, education, and independent voice they need to thrive in a world of media and technology. We exist because our kids are growing up in a culture that profoundly impacts their physical, social, and emotional well-being. We provide families with the advice and media reviews they need in order to make the best choices for their children. Through our education programs and policy efforts, Common Sense Media empowers parents, educators, and young people to become knowledgeable and responsible digital citizens. For more information, go to: www.commonsense.org.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...