Sony BMG to pay $1M to FTC for COPPA violations
Company collected data on children under age 13
IDG News Service - Sony BMG Music Entertainment will pay $1 million to the U.S. Federal Trade Commission for collecting data on at least 30,000 children under the age of 13 without their parents' consent, which violates the Children’s Online Privacy Protection Act (COPPA).
The penalty, which was announced by the FTC today, is the largest to date in a COPPA case and settles a lawsuit brought by the FTC.
COPPA protects children from Internet marketers by prohibiting unfair or deceptive acts, or practices to collect or disclose personal information about children. It also requires that parents be notified and give consent if necessary to collect information about children.
Sony BMG is a subsidiary of Sony Corporation of America, which oversees recording labels that represent hundreds of musicians and entertainers. Sony BMG operates more than 1,000 Web sites for those labels and requires people to submit personal information to register for the sites.
The FTC claimed that on 196 of its Web sites, Sony BMG collected personal information from at least 30,000 underage children without first obtaining parental consent. Sony BMG also allowed children to interact with other Sony BMG fans, including adults, without their parents' knowledge, the FTC said.
Sony BMG could not be reached immediately for comment.
The COPPA settlement is not the first time Sony BMG has run afoul of U.S. regulators. The company got a black eye three years ago for shipping copy protection software with its music CDs that included stealth rootkit software. Sony BMG eventually paid millions of dollars to settle lawsuits generated by its actions.
One of COPPA's backers applauded the FTC's lawsuit, saying it sent a strong signal to Internet companies that the law must be taken seriously.
"In recent years, online data collection has become increasingly sophisticated, expanding into a variety of new platforms -- from social networks to mobile phones to interactive games -- that are now central tools in young people's lives," said Kathryn Montgomery, a communications professor at American University, in a statement.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts