Upload
gur
View
64
Download
3
Tags:
Embed Size (px)
DESCRIPTION
Aristotle International Integrity™ Age and ID Verification. Presentation to ISTTF September 23, 2008. Overview of Integrity™. Commercially Reasonable Age & ID Verification Launched 2001 50+ million individuals verified. 1,000+ commercial and government clients worldwide Limits/prevents: - PowerPoint PPT Presentation
Citation preview
Aristotle InternationalIntegrity™
Age and ID Verification
Presentation to ISTTF September 23, 2008
Aristotle’s Integrity™ ISTTF Presentation 9/23/2008
Overview of Integrity™• Commercially Reasonable Age & ID Verification• Launched 2001• 50+ million individuals verified.• 1,000+ commercial and government clients worldwide• Limits/prevents:
- harmful contact between adults and minors- minors from accessing inappropriate content on the Internet- minors from accessing particular sites without parental consent- harassment, unwanted solicitation, and bullying of minors on
the Internet.- adult solicitation of minors who willingly participate (solicitation
not “unwanted”).• Since inception 7 years ago, no Integrity client has been fined or
prosecuted for underage access after adopting the service.
60 Minutes Report – November 20, 2005
Age Verification - Core ObjectivesTo deter kids from acting older than
they are
To deter adult predators from acting younger than they are
Case 1Child Registers with
Correct Age
Case 2Child Attempts to Register
with Bogus Details
Case 3Predator Registers with
Correct Details
Case 4Predator Impersonates a
Child & Adult
Age Verification – How It WorksCase #1: Child Attempts to Register with Correct Details
1. Child attempts to register.
2. Site prompts for permission from a verifiable adult.
3. Adult’s identity is verified for valid age and sex offender status.
4. Access granted.
5. Adult is sent a post card or automated phone call made to the residence.
Age Verification – How It Works
Case #2: Child Attempts to Register with Bogus Details
• Child attempts to register with fabricated or ‘borrowed’ credentials.
2. Access denied, or, if parent’s ID is used, access is temporarily granted.
3. Parent receives automated phone call or postcard alerting them to ‘their’ registration at the site.
4. Parent suspends access. Child is ‘grounded’.
Age Verification – How It Works
Case #3: Predator Tries to Register with Correct Details
1. Sexual predator attempts to register.
2. Identity is scrubbed against registered sex offender database.
3. Access denied or
restricted.
Age Verification - How It WorksCase 4: Predator Impersonates a Child & Adult
1.Sexual predator registers as a child, and impersonates an adult who is giving permission for that fictitious child to register.
2.Predator is denied access if the adult is fictitious, OR
3.Predator gains temporary access until the real adult gets the postcard or phone call.
4.Site suspends predator’s access & alerts those he contacted to the danger.
Age Verification
Against•Parents’ Responsibility
•Added Cost•No Data on Kids•Gives False Sense of Security
•Invasion of Privacy•Drives Kids Offshore•“Only 15% of our users are underage”
In Favor•Shared Responsibility•Commercially Reasonable•Not Required•Good Security Better Than None
•Government-Issued ID•No Evidence•15%? Without Age Verification, How Do You Know?