Read More about fast-id page

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

The UK “Children’s Code” – Laying New Grounds for Age Verification

blog1

A 12-month grace period for compliance with a set of standards, introduced for protecting children online, expired in the UK on 2nd September 2021. The Age Appropriate Design Code, commonly known as the Children’s Code, was initially introduced on September 2, 2020. However, the UK’s Information Commissioner’s Office (ICO), which serves as the UK’s data protection watchdog, allowed the 1-year grace period to promote its compliance. 

For apps that offer digital services which are likely to be accessed by children, the new code means that a child’s “best interest” must be taken into account to avoid the risk of facing a fine worth ​​£17.5 million.

Let’s take a deeper dive into what the Children’s Code is, what it means for online businesses, and how businesses can comply with the new age verification code.

The aim of the ICO’s Children’s Code is to assist online businesses in creating and maintaining a safe, age-appropriate platform that fairly processes children’s data according to the GDPR. The code essentially advocates age verification policies. It states that unless businesses can prove their platforms are not likely to be used by children, they are left with two options: either make their service compliant with the Children’s Code, or have robust age verification processes in place to identify young users

In addition to this, the Children’s Code forbids the use of “nudge” techniques that lure minors into giving up more information online than required. Listed below are key takeaways from the ICO’s age verification code for children.

The 15 Standards Issued by the U.K. Children’s Code

1- Best Interests of the Child

Organizations have been mandated to consider the needs of minors on their platform as a top priority. While best interests might vary from user to user, the Children’s Code gives a start warning that states “it is unlikely … that the commercial interests of an organisation will outweigh a child’s right to privacy.”

2- Data Protection Impact Assessments (DPIA)

A Data Protection Impact Assessment (DPI) needs to be integrated into the main design of a digital product or service. This assessment helps businesses identify the risks that children may face through the collection of personal data. Each organization must have a flexible and scalable DPIA in place, which should be published. 

3- Age-Appropriate Application

Online businesses need to keep in mind the varying needs of children at different ages and stages of development. This requires organizations to establish age profiles of end-users through any method deemed fit, such as opting for an age verification solution provider, employing self-declaration techniques, or using artificial intelligence models.

4- Transparency

Any information provided to the end-users must be clear, easily understandable, precise, and child-friendly. Such information should be concisely delivered at all points where data collection is activated. 

5- Detrimental Use of Data

This standard prohibits all organizations to not use a child’s personal data in ways that may be harmful to their wellbeing, or that go against global data protection standards. 

Suggested Read: Age Verification – Ultimate Online Protection for Minors

6- Policies and Community Standards

All terms and conditions, community standards, and implemented policies must be published by an organization. 

7- Default Settings

Organizations should place “high privacy” as a default setting, since a majority of young users simply accept any default settings that are provided. The Children’s Code states, “It is not enough to merely allow children to activate high privacy settings”.

8- Data Minimization

Digital service providers must collect and retain a minimum amount of Personally Identifiable Information (PII) during services where a child is actively engaged. Additionally, separate choices of different data categories being collected must be provided to the end-users. 

9- Data Sharing

According to this standard, a child’s personal information must not be shared with third parties, while disclosure can only include data sharing between the different parts of the same organization 

10- Geolocation

As part of the default settings, the geolocation option must be turned off.  An obvious sign must appear on the screen while the location of the end-user is being tracked. At the end of each session, the location tracking option must be switched off by default.  

11- Parental Controls

As an age verification technique, young end-users must be provided with age-appropriate information regarding parental monitoring. If an online platform allows parents to monitor their child’s activity online or keep a track of their location, the platform must show an obvious sign to the child during the time of active monitoring. 

12- Profiling

Profiling, often used a marketing technique, must be switched off by default and enabled only when adequate measures are in place to protect the child’s online wellbeing from any violent or harmful activity. 

13- Nudge Techniques

Organizations are advised to refrain from using nudge techniques, that are designed to encourage end-users to follow the provider’s choice of path. 

14- Connected Toys and Devices

Children’s toys and other digital devices linked to the internet must comply with the Children’s Code. 

15- Online Tools

Organizations must have in place “prominent and accessible tools” that facilitate children online in exercising their data protection rights, including streamlined processes of reporting. 

Why This Code is Necessary

Personally Identifiable Information and financial data of end-users sits at the heart of digital services today. From the second end-users open an app, their data starts being collected. But who are the end-users? Who is collecting the data? And where is the data being used? Monitoring this information is necessary under global data protection laws, particularly as malign actors often utilize digital platforms to commit financial crimes, that are frequently directed towards minors. Age verification provides the perfect solution for safeguarding children against such threats. The above-mentioned statutory code of practice can be easily implemented through the use of AI-powered age verification solutions, which seek to protect children from the digital world. 

blogs122

Response to the Children’s Code

In the months following the introduction of ICO’s Children’s Code last year, there have been indications of some major platforms paying mind to the compliance deadline. For instance, TikTok launched a wide array of changes, including restrictions on sharing options for young end-users and automated disabling of notifications from the app past bedtime for those under 18. 

Google introduced a new polic​​y that allows minors and their parents to take down images from Google search results, while the “location history” service for children has been entirely deactivated, which previously kept a record of the users’ movements. YouTube, as well, updated its privacy policy, switching off autoplay on videos for users between 13-17, while Facebook has also made amendments, such as exemption of users under 18 from targeted advertising, stricter default sharing settings, and protection of users from “potentially suspicious accounts”. 

How Online Businesses in UK Can Adhere to the Children’s Code 

Age verification solution by Shufti not only enables organizations to comply with the UK Children’s Code, but also streamlines customer onboarding while keeping intact global data protection standards. Here’s how the age verification works in four simple steps: 

  1. The end-user adds their name and date of birth in provided fields
  2. The end-user uploads an image of their official ID document
  3. The age verification solution uses OCR (Optical Character Recognition) technology to extract data through an automated process
  4. The end-user is either verified or denied access to the digital service on the basis of the provided age verification threshold

Shufti’s artificially intelligent age verification solution is currently assisting 500+ online businesses comply with global age verification laws, including the GDPR (General Data Protection Regulation), FFDCA (Federal Food, Drug, and Cosmetic Act), COPPA (Children’s Online Privacy Protection Act) and the Gambling Act of the UK.  

Need a walkthrough of our age verification services? Avail our 7-day free trial or talk to our experts right away!

Related Posts

Blog

Addressing AML Compliance Challenges with a Risk-based Approach (2023)

Regardless of how big or small a company is, the after-effects of Covid-19 and the global financi...

Addressing AML Compliance Challenges with a Risk-based Approach (2023) Explore More

Blog

Difference between KYC and AML

The growing Fintech industry leads to an increased demand for KYC and AML compliance requirements...

Difference between KYC and AML Explore More

Blog, Financial Crime / AML, Fraud Prevention, Identity & KYC

Data Breaches – Types, Sources, and Preventive Measures

A large number of well-renowned companies are under the threat of high-scale data breaches. After...

Data Breaches – Types, Sources, and Preventive Measures Explore More

Blog

Facial Recognition in UAE to Protect Private and Government Sector

Continuous developments in the world of technology have led to many innovative solutions like fac...

Facial Recognition in UAE to Protect Private and Government Sector Explore More

Blog

Customer Identification Programme (CIP) vs Know Your Customer (KYC) | What’s the Difference?

 Often, people confuse CIP and KYC and think both are the same. Customer Identification ...

Customer Identification Programme (CIP) vs Know Your Customer (KYC) | What’s the Difference? Explore More

Blog

5 Frauds in the Education Sector and How They Can be Prevented

Educational institutions have become an attractive target for cybercrime attacks in recent years....

5 Frauds in the Education Sector and How They Can be Prevented Explore More

Blog, Online Marketplace

Why Millennials don’t care about Conventional Banking Services?

Millennials are different from the baby boomer generation. They earn less than what the previous ...

Why Millennials don’t care about Conventional Banking Services? Explore More

Blog

High-Risk Countries and The Significance of AML/CFT Regulations – How Shufti Can Help

Money laundering and terrorist financing are becoming a global concern. To overcome the risk of c...

High-Risk Countries and The Significance of AML/CFT Regulations – How Shufti Can Help Explore More

Blog, Online Marketplace

What do NGOs have to gain from Identity Verification Services?

Identity Verification services are quickly becoming the cornerstone of NGO-related activities acr...

What do NGOs have to gain from Identity Verification Services? Explore More

Blog

Assessing the Importance of Digital Identity Verification in On-Demand Services

Dealing with the after-effects of the coronavirus pandemic, digital business platforms and e-comm...

Assessing the Importance of Digital Identity Verification in On-Demand Services Explore More

Blog

AML in Real Estate – Combating Property Scams at the Forefront

Real estate is deemed to be a profitable and safe business to invest in thanks to its ever-growin...

AML in Real Estate – Combating Property Scams at the Forefront Explore More

Blog

E-Signature | Digitise and Verify Agreements in Compliance

The use of electronic signature, or e-signature, has transformed business dealings. The days of s...

E-Signature | Digitise and Verify Agreements in Compliance Explore More

Blog

The Most Common Bank Scams and How e-IDV Can Help

Protecting customers against diverse types of fraud is a continual practice for banks and credit ...

The Most Common Bank Scams and How e-IDV Can Help Explore More

Blog

AML Compliance in the FinTech Industry’s Uncertain Regulatory Landscape

Financial technology (FinTech) exists to improve and automate the delivery of economical services...

AML Compliance in the FinTech Industry’s Uncertain Regulatory Landscape Explore More

Blog

COVID-19: An opportunity for financial sector to expand digital transformation

A sudden epidemic swept across the world, and it had an impact on our lives, work, and even the p...

COVID-19: An opportunity for financial sector to expand digital transformation Explore More

Blog

KYC/AML Compliance for Startups in the Financial Sector – How Shufti Can Help

As technology continues to transform the financial industry, the need for identity verification h...

KYC/AML Compliance for Startups in the Financial Sector – How Shufti Can Help Explore More

Blog

KYC and AML: The Key to Secure BNPL Services in 2023

Seems like Buy Now Pay Later (BNPL) services have taken the world by storm, with 360 million user...

KYC and AML: The Key to Secure BNPL Services in 2023 Explore More

Blog

Post-pandemic eCommerce Landscape Calling for Robust ID Verification Solution

During the coronavirus pandemic, the e-commerce industry has witnessed a significant increase in ...

Post-pandemic eCommerce Landscape Calling for Robust ID Verification Solution Explore More

Blog

A Detailed Insight Into Canadian Gambling Industry [2022 Update]

Even though Canada is not among the world’s gambling capitals, this business thrives there. The c...

A Detailed Insight Into Canadian Gambling Industry [2022 Update] Explore More

Blog

June 2023 Recap: Major AML Violations and How Can Shufti Help

In global financial systems, the increasing frequency of Anti-Money Laundering (AML) violations h...

June 2023 Recap: Major AML Violations and How Can Shufti Help Explore More

Blog

The Most Common Use Cases of Identity Document Verification

As data breaches and other crimes increase, regulators must impose strict rules that corporations...

The Most Common Use Cases of Identity Document Verification Explore More

Blog

20 Facts and Statistics About the Global Finance Sector

The finance sector makes up around 20 to 25% of the global GDP. With the market capitalization re...

20 Facts and Statistics About the Global Finance Sector Explore More

Blog

KYC/AML Compliance for Startups in the Financial Sector – How Shufti Can Help

As technology continues to transform the financial industry, the need for identity verification h...

KYC/AML Compliance for Startups in the Financial Sector – How Shufti Can Help Explore More

Blog

Securing Mobility as a Service (MaaS) with Shufti’s Digital Identity Verification Solution

The transport industry is on the verge of significant disruption, with new emerging technologies,...

Securing Mobility as a Service (MaaS) with Shufti’s Digital Identity Verification Solution Explore More

Blog

Blockchain and NFTs – Setting New Standards for Cybersecurity and Identity Management

Non-fungible tokens (NFTs) are an evolution over the emerging concept of cryptocurrencies. As fin...

Blockchain and NFTs – Setting  New Standards for Cybersecurity and Identity Management Explore More

Blog

10 Fraud Signals Every Industry Must Monitor

Gone are the days when businesses paid attention to customer verification only. Today, organizati...

10 Fraud Signals Every Industry Must Monitor Explore More

Blog, Identity & KYC

ICOs and KYC Compliance

With the surge in digitalisation of payments and crowdfunding; the need to set proper standards f...

ICOs and KYC Compliance Explore More

Blog

Understanding and Implementing Age Verification Requirements in Accordance with the FDA Deeming Rule

Youth is considered the most valuable asset for any country, and it is the government’s responsib...

Understanding and Implementing Age Verification Requirements in Accordance with the FDA Deeming Rule Explore More

Blog

Passport Verification: Preventing Document Forgery and Identity Theft

In our current era of modern interconnection, global travel has become more accessible than ever,...

Passport Verification: Preventing Document Forgery and Identity Theft Explore More

Blog

Identity Fraud in Coworking Spaces – How Shufti’s Facial Biometric Authentication Helps

With more and more companies embracing remote work, the trend of coworking spaces is picking pace...

Identity Fraud in Coworking Spaces – How Shufti’s Facial Biometric Authentication Helps Explore More

Blog

What is KYC and Why is it Important for Crypto Exchanges?

 Cryptocurrencies are causing significant disruptions in the financial world. Cryptograp...

What is KYC and Why is it Important for Crypto Exchanges? Explore More

Blog

How Global AML Regulations Safeguard Financial Processes from Money Laundering

Growing a business in any part of the world requires effective AML compliance measures as a neces...

How Global AML Regulations Safeguard Financial Processes from Money Laundering Explore More

Blog

5 types of identity theft fraud and How businesses can prevent it?

Online identity theft has the fastest growing crime rate in the world. According to a report, onl...

5 types of identity theft fraud and How businesses can prevent it? Explore More

Blog

Curbing Financial Crimes and Securing Art Market With Shufti’s AML Screening Services

The global art industry is embracing digitization. However, the technological advancements and a ...

Curbing Financial Crimes and Securing Art Market With Shufti’s AML Screening Services Explore More

Blog

Modern Financial Management: The Role of KYI in Safeguarding Businesses

With our digital ecosystem being full of threats, there is a significant possibility that the qua...

Modern Financial Management: The Role of KYI in Safeguarding Businesses Explore More

Blog

5 RegTech Applications That Will Govern the Financial Regime in 2021

RegTech, short for Regulatory Technology, is the subset of FinTech which bridges the gap between ...

5 RegTech Applications That Will Govern the Financial Regime in 2021 Explore More

Blog

KYC Verification Process – 3 Steps to Know Your Customer Compliance

Did you know there are three key components to KYC? The entire identity verification procedure en...

KYC Verification Process – 3 Steps to Know Your Customer Compliance Explore More

Blog

Video KYC (VKYC) | Identity Verification and Fraud Prevention

In the last few years, the verification industry has experienced remarkable expansion. As our tec...

Video KYC (VKYC) | Identity Verification and Fraud Prevention Explore More

Blog

Identity Verification – Addressing the Challenge of Fraud in the Telecommunications Sector

Transforming technology, growing digitization, and increased use of online transactions have acco...

Identity Verification – Addressing the Challenge of Fraud in the Telecommunications Sector Explore More

Blog

What is an OCR Screening and How Does it Work?

In our digital environment, where automated technology has already taken over corporate processes...

What is an OCR Screening and How Does it Work? Explore More

Blog

Address Verification: Types, Benefits, and Best Practices

Improving customer service and combating fraud frequently requires swiftly gathering and confirmi...

Address Verification: Types, Benefits, and Best Practices Explore More

Blog

Cryptocurrency Market and Financial Crimes: How to Handle Transaction Monitoring

The adoption of cryptocurrencies by both individuals and businesses has exploded in the last 12 m...

Cryptocurrency Market and Financial Crimes: How to Handle Transaction Monitoring Explore More

Blog

The Benefits and Best Practices of Deploying Facial Recognition in the Workplace

With the rapid shift towards digitisation, keeping track of the most recent technological develop...

The Benefits and Best Practices of Deploying Facial Recognition in the Workplace Explore More

Blog

FATF’s June 2021 Plenary – Strategic and Country-specific Initiatives

The fourth plenary meeting of the Financial Action Task Force (FATF) took place from June 20-25 t...

FATF’s June 2021 Plenary – Strategic and Country-specific Initiatives Explore More

Blog

Securing The Digital Landscape with Electronic Identity Verification Services

With a surge in identity document forgery, the likelihood of onboarding a criminal has grown subs...

Securing The Digital Landscape with Electronic Identity Verification Services Explore More

Blog

A Brief Overview of 2021 AML Trends

Over the last decade, regulatory scrutiny on Anti-Money Laundering (AML) compliance has remained ...

A Brief Overview of 2021 AML Trends Explore More

Blog

Age Gating VS Age Verification | Enhancing Security for Minors

Age gating was once employed to stop minors from accessing age-restricted content. However, the a...

Age Gating VS Age Verification | Enhancing Security for Minors Explore More

Blog

Holiday Season – The Time of the Year When Frauds Soar Sky High

Despite being the “most wonderful time of the year”, the holiday season is known to have the high...

Holiday Season – The Time of the Year When Frauds Soar Sky High Explore More

Blog

Facial Recognition to Reshape the Retail Industry in 2020

The explosion of facial recognition technology in our smartphones – for instance in iPhone ...

Facial Recognition to Reshape the Retail Industry in 2020 Explore More

Blog

How biometrics in visa process reduce travel difficulties

Biometric technology is enhancing the travel industry in many ways.  Factors that drive the secur...

How biometrics in visa process reduce travel difficulties Explore More

Blog

5 Types of ID Fraud Skyrocketed in the First Half of 2021 – Shufti

Last year, Shufti’s AI-powered identity verification system captured a 3.36% increase in iden...

5 Types of ID Fraud Skyrocketed in the First Half of 2021 – Shufti Explore More

Blog

AML Compliance – Addressing the Threat of Money Laundering in NFT Marketplaces

The NFT marketplace is flourishing even though the top platforms do not always comply with Anti-M...

AML Compliance – Addressing the Threat of Money Laundering in NFT Marketplaces Explore More

Blog

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions

On September 23rd, the 2021 UK NRA (National Risk Assessment) was published as part of the govern...

Overcoming the Challenges of Proliferation Financing with AML Screening Solutions Explore More

Blog

Optical Character Recognition (OCR) | Pushing the Boundaries of Data Extraction

There is a surging demand for swift and remote identity verification methods in our digital world...

Optical Character Recognition (OCR) | Pushing the Boundaries of Data Extraction Explore More

Blog

FATF October 2019 Plenary – Here is What You Need to Know

Financial Action Task Force (FATF) President Xiangmin Liu, chaired the first meeting from 16-18 O...

FATF October 2019 Plenary – Here is What You Need to Know Explore More

Blog, Online Marketplace

Benefits of KYC services for Money Services Operators

Money service operators are at the forefront of international financial system as they help with ...

Benefits of KYC services for Money Services Operators Explore More

Blog, Identity & KYC, Reg Tech

RegTech: The Case for Financial Inclusion

The FinTech industry has grown tremendously in recent years, introducing both scale and efficienc...

RegTech: The Case for Financial Inclusion Explore More

Blog

Top 10 Cybersecurity Trends for 2021

Cybersecurity in 2020 became the biggest challenge thanks to the COVID-19 pandemic. Global lockdo...

Top 10 Cybersecurity Trends for 2021 Explore More

Blog

New KYC Regime for the UK, US, and Australia – What’s in it for Financial Institutions?

Financial institutions are known for getting their reputation maligned due to crimes like identit...

New KYC Regime for the UK, US, and Australia – What’s in it for Financial Institutions? Explore More

Blog

Top 10 Forged ID Documents on the Dark Web in 2023

As criminal activity increases every year, the massive amounts of data being uploaded to the inte...

Top 10 Forged ID Documents on the Dark Web in 2023 Explore More

Blog

Identity Verification – Building Trust and Combating Scams in Online Dating

Since the beginning of civilization, humans have always preferred to live in communities. This co...

Identity Verification – Building Trust and Combating Scams in Online Dating Explore More

Blog

Business transformations for operational resilience amid COVID-19 crisis

The pandemic continues affecting businesses and consumer operations along with having economical ...

Business transformations for operational resilience amid COVID-19 crisis Explore More

Blog

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification

In today’s digital age, businesses must have a robust identity verification system in place...

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification Explore More

Blog

Merchant Onboarding – Evaluating the Best Practices to Onboard Risk-free Partners

Partnering with the right people who can actually help your business grow is quite a tedious task...

Merchant Onboarding – Evaluating the Best Practices to Onboard Risk-free Partners Explore More

Blog

COVID-19 and Travel & Tourism Industry – What Opportunities Await Post-Pandemic?

The world is completely exhausted with the COVID-19 pandemic. The corporate sector has lost enoug...

COVID-19 and Travel & Tourism Industry – What Opportunities Await Post-Pandemic? Explore More

Blog

Understanding Facial Identification: Face Verification vs. Face Recognition

Many terms in the biometrics field are used interchangeably, particularly regarding facial verifi...

Understanding Facial Identification: Face Verification vs. Face Recognition Explore More

Blog

Effectiveness of the UK’s Economic Crime Bill in Combating Financial Crime

The Russian invasion of Ukraine has resulted in a surge in financial crimes in the UK as Russian ...

Effectiveness of the UK’s Economic Crime Bill in Combating Financial Crime Explore More

Blog

Initial Art Offering – Everything you need to know about it

Initial Art offering is an innovative way to support artists and their brilliant art without worr...

Initial Art Offering – Everything you need to know about it Explore More

Blog

KYC and AML Compliance – Addressing the Challenge of Money Laundering in Online Trading Platforms

An online trading platform is a program where shareholders and traders deal through financial int...

KYC and AML Compliance – Addressing the Challenge of Money Laundering in Online Trading Platforms Explore More

Blog

Age Verification Service – How Businesses can Identify Underage Visitors in Real Time?

When it comes online retail, one has to know that in such an age of fast-moving technology and in...

Age Verification Service – How Businesses can Identify Underage Visitors in Real Time? Explore More

Blog

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution

High-risk clients pose a serious threat to banks. Over the past few years, a significant number o...

Deutsche Bank’s Epstein Fine – Lesson for Financial Institution Explore More

Blog

Preventing Criminal Abuse of the Australian Crypto Market with Shufti’s AML Screening Services

Cryptocurrencies have been around for a decade and investors have found a feasible option for inv...

Preventing Criminal Abuse of the Australian Crypto Market with Shufti’s AML Screening Services Explore More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started