Texas AG sues two sites for children's privacy violations
They're accused of violating the Children's Online Privacy Protection Act
Computerworld - Texas Attorney General Gregg Abbott has sued two Web sites that cater to children for failing to take adequate measures to protect their identities and personal information.
The lawsuits are the first in the U.S. to be brought under the Children's Online Privacy Protection Act (COPPA) of 1998 and highlight the many privacy pitfalls facing minors that the law is designed to address.
COPPA requires Web sites to implement controls for obtaining verifiable parental consent before information can be gathered from children. The law also prohibits sites from requiring children to disclose an excessive amount of personal information as a precondition for participating in online games and activities.
"Federal law provides important protections to prevent children from divulging sensitive personal information and to shield them from inappropriate sexual or violent content online," Abbott said in statement. According to him, the two Web sites his office has targeted -- TheDollPalace.com and Gamesradar.com -- are in violation of COPPA because they failed to include necessary disclosures and obtain parental consent before collecting personal information from children.
A spokesman from Future US Inc., which operates Gamesradar.com, said the company had not yet seen the lawsuit and couldn't comment on it. No contact phone information was listed on TheDollPalace.com. An e-mail requesting comment did not get an immediate reply.
Court documents filed this week in the U.S. District Court in Austin, described Doll Palace as a foreign corporation with offices in New York.
In his compliant, Abbott alleges that the Doll Palace routinely collected a large amount of data from children, many of whom were under 13, as part of the registration process. Abbott claimed that most of the information was obtained without adequate verification of parental consent and little disclosure about the kind of information that was being collected and the purposes for which it was used. He also said the company did not comply with COPPA requirements on how the collected data could be used.
That information included the children's first and last names, their e-mail addresses, dates of birth, zip codes and gender. Registered members who wanted to participate in a so-called Friends feature on the site were required to fill out a 10-page questionnaire that sought details such as the height, eye color, personal habits, access to Internet, the types of persons they were interested in meeting and even whether they would like to meet someone older than themselves.
The Friends section allows members to search for other Doll Palace members using a wide variety of attributes, including those who live within five miles of the member doing the searching. The search results themselves often contained detailed information from the 10-page questionnaire and included the e-mail addresses, contact information and IM handles of the children, he said.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Building a New Era in Enterprise IT
- As the digital revolution spawned by the explosive growth of disruptive technologies such as mobile, cloud, social, and analytic tools continues to fundamentally...
- Mobile First: Securing Information Sprawl
- Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- AIIM Trendscape: The New Mobile Reality
- This AIIM Trendscape report shares data, expert opinions, and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing...
- Empowering Your Mobile Workers
- A modern mobile IT strategy is no longer an option, it is an absolute necessity. Here's how some of the nation's most progressive... All Government IT White Papers
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- Charting Your Analytical Future - "Making predictive analytics part of your business processes" Webinar This session will show how predictive analytics can be used throughout the organization by anyone looking for answers and how organizations can make...
- All Government IT Webcasts