25.01.2018 Views

white_paper_on_data_protection_in_india_171127_final_v2

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 2: CHILD’S CONSENT<br />

2.1 Introducti<strong>on</strong><br />

It is estimated that globally, <strong>on</strong>e <strong>in</strong> three Internet users is a child under the age of 18. 418<br />

Although Internet-use am<strong>on</strong>g children is very comm<strong>on</strong> and children are becom<strong>in</strong>g more<br />

familiar with technology, they are viewed as be<strong>in</strong>g more vulnerable than adults <strong>on</strong>l<strong>in</strong>e. They<br />

may be more easily misled, given their lack of awareness with respect to the l<strong>on</strong>g-term<br />

c<strong>on</strong>sequences of their acti<strong>on</strong>s <strong>on</strong>l<strong>in</strong>e. 419 Therefore, children represent a vulnerable group,<br />

which may benefit from receiv<strong>in</strong>g a heightened level of protecti<strong>on</strong> with respect to their<br />

pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong>. 420<br />

Keep<strong>in</strong>g <strong>in</strong> m<strong>in</strong>d their vulnerability and <strong>in</strong>creased exposure to risks <strong>on</strong>l<strong>in</strong>e, there has been a<br />

call to take <strong>in</strong>to c<strong>on</strong>siderati<strong>on</strong> the rights of children <strong>in</strong> the ―digital age‖. To this effect, the<br />

United Nati<strong>on</strong>s C<strong>on</strong>venti<strong>on</strong> <strong>on</strong> the Rights of the Child (UN CRC) recognises children‘s rights<br />

to protecti<strong>on</strong>, <strong>in</strong>clud<strong>in</strong>g a specific protecti<strong>on</strong> aga<strong>in</strong>st arbitrary or unlawful <strong>in</strong>terference with<br />

children‘s privacy and unlawful attacks <strong>on</strong> their h<strong>on</strong>our and reputati<strong>on</strong>. 421 Previously, most<br />

<strong>in</strong>formati<strong>on</strong>al privacy laws were designed for every<strong>on</strong>e, without a special focus <strong>on</strong> protect<strong>in</strong>g<br />

the process<strong>in</strong>g of children‘s pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong>. However, studies c<strong>on</strong>ducted across the EU<br />

and the US have highlighted <strong>in</strong>stances of pers<strong>on</strong>al <strong>data</strong> misuse and reputati<strong>on</strong>al damage (such<br />

as hack<strong>in</strong>g social media accounts, creati<strong>on</strong> of fake accounts and impers<strong>on</strong>ati<strong>on</strong>), which are<br />

affect<strong>in</strong>g children. 422 Studies show that children also face difficulties while navigat<strong>in</strong>g<br />

privacy sett<strong>in</strong>gs. 423 Additi<strong>on</strong>al issues relat<strong>in</strong>g to <strong>in</strong>adequate, n<strong>on</strong>-child-tailored privacy<br />

policies, excessive collecti<strong>on</strong> of pers<strong>on</strong>al <strong>data</strong> from children and frequent disclosure of<br />

children‘s <strong>data</strong> to third parties were also revealed. 424 Therefore, several jurisdicti<strong>on</strong>s have<br />

recognised the need to <strong>in</strong>troduce <strong>data</strong> protecti<strong>on</strong> measures that are specifically applicable to<br />

the process<strong>in</strong>g of children‘s pers<strong>on</strong>al <strong>in</strong>formati<strong>on</strong>.<br />

2.2 Issues<br />

418 S<strong>on</strong>ia Liv<strong>in</strong>gst<strong>on</strong>e et al., ‗One <strong>in</strong> Three: Internet Governance and Children‘s Rights‘, Global Commissi<strong>on</strong> <strong>on</strong><br />

Internet Governance Paper Series No. 22 (November 2015), available at:<br />

https://www.cigi<strong>on</strong>l<strong>in</strong>e.org/sites/default/files/no22_2.pdf, (last accessed 28 October 2017).<br />

419 Milda Macenaite and Eleni Kosta, ‗C<strong>on</strong>sent for Process<strong>in</strong>g Children‘s pers<strong>on</strong>al <strong>data</strong> <strong>in</strong> the EU: Follow<strong>in</strong>g <strong>in</strong><br />

US footsteps?‘, 26(2) Informati<strong>on</strong> & Communicati<strong>on</strong>s Technology Law Journal (2017), available at:<br />

http://www.tandf<strong>on</strong>l<strong>in</strong>e.com/doi/full/10.1080/13600834.2017.1321096, (last accessed 28 October 2017).<br />

420 ‗Children‘s <strong>data</strong> protecti<strong>on</strong> and parental c<strong>on</strong>sent: A best practice analysis to <strong>in</strong>form the EU <strong>data</strong> protecti<strong>on</strong><br />

reform‘, Advertis<strong>in</strong>g Educati<strong>on</strong> Forum (October 2013), available at:<br />

http://www.aeforum.org/gallery/5248813.pdf, (last accessed 28 October 2017) cit<strong>in</strong>g: Giovanna Mascher<strong>on</strong>i and<br />

Kjartan Olaffs<strong>on</strong>, „Risks and Opportunities‘, Net Children Go Mobile (Sec<strong>on</strong>d edn, Milano Educatt 2014).<br />

421 Article 16, United Nati<strong>on</strong>s C<strong>on</strong>venti<strong>on</strong> <strong>on</strong> the Rights of the Child.<br />

422 Milda Macenaite and Eleni Kosta, ‗C<strong>on</strong>sent for Process<strong>in</strong>g Children‘s pers<strong>on</strong>al <strong>data</strong> <strong>in</strong> the EU: Follow<strong>in</strong>g <strong>in</strong><br />

US footsteps?‘, 26(2) Informati<strong>on</strong> & Communicati<strong>on</strong>s Technology Law Journal (2017), available at:<br />

http://www.tandf<strong>on</strong>l<strong>in</strong>e.com/doi/full/10.1080/13600834.2017.1321096, (last accessed 28 October 2017).<br />

423 S<strong>on</strong>ia Liv<strong>in</strong>gst<strong>on</strong>e et al., ‗One <strong>in</strong> Three: Internet Governance and Children‘s Rights‘, Global Commissi<strong>on</strong> <strong>on</strong><br />

Internet Governance Paper Series No. 22 (November 2015), available at:<br />

https://www.cigi<strong>on</strong>l<strong>in</strong>e.org/sites/default/files/no22_2.pdf, (last accessed 28 October 2017).<br />

424<br />

Global Privacy Enforcement Network, ‗Sweep-Children‘s Privacy‘ (2015), available at:<br />

http://194.242.234.211/documents/10160/0/GPEN+Privacy+Sweep+2015.pdf, (last accessed 28 October 2017).<br />

85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!