Tony24986 (talk | contribs)
m Added a hyperlink for UK's Online Safety Act
Wilh3lm (talk | contribs)
Copyediting
Line 1: Line 1:
{{Incomplete}}
{{Incomplete}}
'''Age Verification''' (AV) also referred to as '''Age Affirmation''' (AA) is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Certain ways of checking can include: checking for a valid credit card, facial age estimation tools, government issued id, bio-metric data, or account history behavior and so forth.
'''Age Verification''' (AV), also referred to as '''Age Affirmation''' (AA), is the process in where a business requires some form of identification to verify your age. This is usually done for more explicit or mature content. This practice has been widely spreading since the [[UK Online Safety Act|UK's Online Safety Act (OSA)]] has passed; requiring all individuals to verify themselves before accessing mature content. Ways of checking age include, but are not limited to: checking for a valid credit card, facial age estimation tools, government-issued ID, biometric data, account history behavior, and more.


==How it works==
==How it works==
Line 13: Line 13:


===Censorship===
===Censorship===
Certain topics such as 18+ or political will likely be unfairly censored by the governing body or company that has a say on what platform has the '''potential''' to be inappropriate for minors or other age groups.<ref>{{Cite web |date=2025-09-01 |title=Strict Age Verification Laws: Balancing Content Restriction and Educational Rights |url=https://www.thinkacademy.ca/blog/strict-age-verification-laws-impact-k12-education/#:~:text=Impact%20on%20K12,affect%20these%20groups |access-date=2025-09-04 |website=Think Academy}}</ref><ref name=":0">{{Cite web |last=Kelley |first=Jason |last2=Mackey |first2=Aaron |last3=Mullin |first3=Joe |date=2024-02-15 |title=Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act |url=https://www.eff.org/deeplinks/2024/02/dont-fall-latest-changes-dangerous-kids-online-safety-act |access-date=2025-09-04 |website=Electronic Frontier Foundation}}</ref>
Certain topics, such as adult content, politics, and LGBT+ topics, will likely be unfairly censored by the governing body or company that has a say on what platform has the '''potential''' to be inappropriate for minors or other age groups.<ref>{{Cite web |date=2025-09-01 |title=Strict Age Verification Laws: Balancing Content Restriction and Educational Rights |url=https://www.thinkacademy.ca/blog/strict-age-verification-laws-impact-k12-education/#:~:text=Impact%20on%20K12,affect%20these%20groups |access-date=2025-09-04 |website=Think Academy}}</ref><ref name=":0">{{Cite web |last=Kelley |first=Jason |last2=Mackey |first2=Aaron |last3=Mullin |first3=Joe |date=2024-02-15 |title=Don’t Fall for the Latest Changes to the Dangerous Kids Online Safety Act |url=https://www.eff.org/deeplinks/2024/02/dont-fall-latest-changes-dangerous-kids-online-safety-act |access-date=2025-09-04 |website=Electronic Frontier Foundation}}</ref>


Platforms that host this type of content may also be more proactive in deleting/hiding posts that may get them in trouble or fined by laws or policies by local governments leading to a more censored internet where opinions are streamlined to fit a set narrative or outlook.<ref name=":0" />
Platforms that host this type of content may also be more proactive in deleting/hiding posts that may get them in trouble or fined by laws or policies by local governments, leading to a more censored internet where opinions are streamlined to fit a set narrative or outlook.<ref name=":0" />


===Increased inequality and denial of service===
===Increased inequality and denial of service===
Some stores, such as grocery stores, prohibit young people from viewing their web sites or using [[loyalty cards]], which provide discounts and digital coupons. Age verification means that young people and families where the young person does the shopping pay more for essentials like food.<ref>{{Cite news |last=Pell |first=Miranda |date=25 Oct 2024 |title=Tesco, Lidl and Sainsbury's shoppers issued warning over little-known 'age limit' rules |url=https://www.manchestereveningnews.co.uk/whats-on/shopping/tesco-lidl-sainsburys-shoppers-issued-30233318 |access-date=20 Sep 2025 |work=Manchester evening news}}</ref> Those who do not have ID, or do not chose to use it (for instance, those who fear domestic violence, or are members of a group subject to persecution) may also be locked out or have to pay more.
Some stores, such as grocery stores, prohibit young people from viewing their web sites or using [[loyalty cards]], which provide discounts and digital coupons. Age verification means that young people and families where the young person does the shopping pay more for essentials like food.<ref>{{Cite news |last=Pell |first=Miranda |date=25 Oct 2024 |title=Tesco, Lidl and Sainsbury's shoppers issued warning over little-known 'age limit' rules |url=https://www.manchestereveningnews.co.uk/whats-on/shopping/tesco-lidl-sainsburys-shoppers-issued-30233318 |access-date=20 Sep 2025 |work=Manchester evening news}}</ref> Those who do not have ID, or do not chose to use it (for instance, those who fear domestic violence, or are members of a group subject to persecution) may also be locked out or have to pay more.


===Storage of Private and Biometric Information by Age Verification Service Providers===
===Storage of private and biometric Information by age verification service providers===
A study commissioned by the Australian government found that age verification service providers accumulate a concerning amount of personal information, sometimes even biometric in nature, even when that was not necessary to provide the age verification service.<ref>{{Cite web |last=Meineck |first=Sebastian |date=2025-09-03 |title=Anbieter von Alterskontrollen horten biometrische Daten [Age Verification Providers are hoarding biometric Data] |url=https://netzpolitik.org/2025/australisches-gutachten-anbieter-von-alterskontrollen-horten-biometrische-daten/ |access-date=2025-09-03 |website=Netzpolitik.org}}</ref><ref>{{Cite web |last=Meineck |first=Sebastion |date=2025-09-03 |title=Anbieter von Alterskontrollen horten biometrische Daten [Google Translate English Version] |url=https://netzpolitik-org.translate.goog/2025/australisches-gutachten-anbieter-von-alterskontrollen-horten-biometrische-daten/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=de&_x_tr_pto=wapp |access-date=2025-09-03 |website=Netzpolitik.org}}</ref>
A study commissioned by the Australian government found that age verification service providers accumulate a concerning amount of personal information, sometimes even biometric in nature, even when that was not necessary to provide the age verification service.<ref>{{Cite web |last=Meineck |first=Sebastian |date=2025-09-03 |title=Anbieter von Alterskontrollen horten biometrische Daten [Age Verification Providers are hoarding biometric Data] |url=https://netzpolitik.org/2025/australisches-gutachten-anbieter-von-alterskontrollen-horten-biometrische-daten/ |access-date=2025-09-03 |website=Netzpolitik.org}}</ref><ref>{{Cite web |last=Meineck |first=Sebastion |date=2025-09-03 |title=Anbieter von Alterskontrollen horten biometrische Daten [Google Translate English Version] |url=https://netzpolitik-org.translate.goog/2025/australisches-gutachten-anbieter-von-alterskontrollen-horten-biometrische-daten/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=de&_x_tr_pto=wapp |access-date=2025-09-03 |website=Netzpolitik.org}}</ref>


Line 28: Line 28:
However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |access-date=2025-09-04 |website=Countly Blog}}</ref> With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers<ref>{{Cite web |last=Branley |first=Dawn |last2=Covey |first2=Judith |date=2016-06-06 |title=Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline? |url=https://www.sciencedirect.com/science/article/pii/S0747563217303357 |access-date=2025-09-04 |website=ScienceDirect}}</ref> and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.<ref>{{Cite web |date=2024-04 |title=Potential risks of content, features, and functions: The science of how social media affects youth |url=https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |access-date=2025-09-04 |website=American Psychological Association}}</ref>
However, users who do not wish to compromise their privacy or who are not of age will then go looking towards smaller niche platforms, often in other regions not affected by the regulation or the darknet.<ref name=":1">{{Cite web |last=Kaleta |first=Miroslav |date=2025-08-20 |title=The Cost of Data Privacy Negligence (And How to Avoid It) |url=https://countly.com/blog/data-privacy-negligence#:~:text=2.%20Losing%20Customer,IBM%20Report. |access-date=2025-09-04 |website=Countly Blog}}</ref> With these offerings, there is little to no leverage with regards to removal of illegal content. Increased exposure to illegal content can then lead to both a strengthening of illegal content providers<ref>{{Cite web |last=Branley |first=Dawn |last2=Covey |first2=Judith |date=2016-06-06 |title=Is exposure to online content depicting risky behavior related to viewers' own risky behavior offline? |url=https://www.sciencedirect.com/science/article/pii/S0747563217303357 |access-date=2025-09-04 |website=ScienceDirect}}</ref> and significantly increased danger to minors, who may not yet be able to differentiate between legal and illegal content as well as an adult.<ref>{{Cite web |date=2024-04 |title=Potential risks of content, features, and functions: The science of how social media affects youth |url=https://www.apa.org/topics/social-media-internet/youth-social-media-2024 |access-date=2025-09-04 |website=American Psychological Association}}</ref>


===Increased Damage from Data Breaches===
===Increased damage from data breaches===
Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |access-date=2025-09-04 |website=Brandefense}}</ref> As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.<ref>{{Cite web |last=Popov |first=Cristina |date=2023-03-22 |title=Why breaches can affect you long after they occur |url=https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur#:~:text=%232%3A%20Breaches%20can,for%20online%20accounts. |access-date=2025-09-04 |website=Bitdefender}}</ref>
Platforms which implement age checks that require sensitive information such as a government-issued ID will likely be more of a target for cyber criminals.<ref>{{Cite web |date=2025-04-02 |title=Cybercriminals Target These Industries the Most – Here’s Why and How to Stay Safe |url=https://brandefense.io/blog/cybercriminals-target-these-industries/#:~:text=The%20Most%20Vulnerable%20Industries%20to,information%20stored%20within%20their%20networks. |access-date=2025-09-04 |website=Brandefense}}</ref> As more platforms comply with the age checks, it becomes more likely that a data breach on at least one of these platforms can reveal extremely sensitive information. In the case of a data breach, it can be catastrophic if users' sensitive information were exposed, which can likely result in identity theft.<ref>{{Cite web |last=Popov |first=Cristina |date=2023-03-22 |title=Why breaches can affect you long after they occur |url=https://www.bitdefender.com/en-us/blog/hotforsecurity/why-breaches-can-affect-you-long-after-they-occur#:~:text=%232%3A%20Breaches%20can,for%20online%20accounts. |access-date=2025-09-04 |website=Bitdefender}}</ref>


Line 34: Line 34:


==Examples==
==Examples==
*[[YouTube]]'s Age verification and account estimation algorithm.
*[[YouTube]]'s Age verification and account estimation algorithm. (See [[Youtubes Requirement for Government ID]] for more information)


*[[Spotify]]'s Age affirmation for MA rated songs and content.
*[[Spotify]]'s Age affirmation for MA rated songs and content.