Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.

Slides:



Advertisements
Similar presentations
HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Ali Hammoud rd hour. Change your screen name Block that person from chatting with you Tell a parent or trusted adult Use Common Sense.
E safety workshop.  Resources  Available on our new website  This presentation  SMART safe.
Many of us are now on social media (Twitter, Facebook…) Many sites for children have this capability (Club Penguin, Moshi Monsters…)
Internet Safety Cyber Bullying. Berks County District Attorney Mark C. Baldwin said, “They have found a way to enter your home, enter your child’s bedroom.
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Children online: Risks they might face Awareness raising session – Secondary.
SpectorSoft Corporation / Spector Pro, eBlaster, Spector for Mac OS ISTTF Presentation 9/23/2008 Enforcing Internet Safety for Children with Spector Pro.
Phillip Hallam-Baker Extended Validation Presentation to ISTTF September 23, 2008 VeriSign/Extended Validation ISTTF Presentation 9/23/2008.
Making the Web a safer place for children AGR™ Cutting-Edge Biometrics System For Online Age Verification, In Real-Time Presentation to ISTTF Boston, September.
ExpectID® Product Suite Presentation to ISTTF September 23, 2008 IDology, Inc. / ExpectID Product Suite ISTTF Presentation 9/23/2008.
Microsoft Passport Waldemar Swiercz.
1 Children and Families. 2 Children & Families Focus on the Internet Children’s Needs –Education –Entertainment Families’ Needs –Education –Protection.
Stay Safe Online Contributed by Jon Berry All resources in the "Safeguarding Resources" section of our resource bank have been submitted by delegates on.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Shawanda Sturdivant The Internet What would we do without the Internet? It gives us the world at our fingertips. Almost anything that we want and need.
BY: ASHLEY ESTEP, ALYSIA GEORGE, AND ASHLEY MOFFETT Internet Safety.
© 2011 Aristotle, Inc. All Rights Reserved. Why Johnny Can't Play: Creating Websites for Grown Ups.
1 Internet Safety By: Nicole Sutton, Kenny Messinger, and Emily Whitman.
 Social Networking  Posting and watching videos on YouTube  Blogging  Chat Rooms  Visiting Wikis  Googeling virtually ANY subject.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
Welcome! Accessed anywhere anytime Easy to communicat e with friends and family Wide and flexible range of information Motivational and fun A key skill.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Sexting Definition: The act of sending, receiving or forwarding sexually explicit messages or photos electronically, primarily between cell phones, but.
Social Media How can we manage social network for children?
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
INTERNET RULES Mr. Evans. Never give out personal information on the Internet. Such as their address, telephone number, the name or location of their.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Diane Travis Artina Orum Paris Conner Conner, Travis, Orum.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Our Youth- Their Social Networks, Sexting, and Safety.
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
© Childnet International 2008 What are the risks?.
Internet Safety 101.  Potential Dangers  Social Networks  Online Gaming  Sexting  Pornography  Texting & Driving.
Help parents protect their children online Our Vision To enable children to use new forms of communication in a safe way.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Welcome to Kittatinny Regional High School Internet Safety and Social Networking Workshop.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Online Safety Issues in Our School Topics of Discussion All about Acceptable Use Policies Significance of Signatures on an AUP What is included in an.
Internet Safety Advanced Techniques By: Haley Needs McKenna Sorensen Kathryn Feltwell.
Internet Safety Why is internet safety important? What about mobiles? What are the risks? Why is the internet so great?
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
E-safety is all about keeping children safe online.
Internet Survival Tips for Kids and Teens
All Unit Charter Renewals are due at the respective District’s Roundtable Meeting in November Last Updated 9/29/15.
E-Safety. ‘1 in 5 kids play internet games with people they haven’t met in person.’ ( 2014) ‘The average.
Children online: Risks they might face Awareness raising session – Secondary.
By Gail Brenner. The main purpose in this survey is to find out how students use networking sites.
Internet Safety Advanced Techniques By: Haley Needs McKenna Sorensen Kathryn Feltwell.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
ONLINE PREDATORS: HOW SAFE ARE WE? A PHOTO PRESENTATION BY: MICHELLE OCASIO & BRIANNA PEREZ.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
70% were female; 30% were male 86% of offenders were people youth first “met” online 37% of incidents happened in chatrooms 40% in instant messages.
Virginia License Requirements Applicants for a Virginia learner’s permit must  be at least 15 years and 6 months old  complete a DL 1P learner’s permit.
Communicare Presentation v March 2016 NOTE: All screen shots from Communicare indicate PCEHR. Any reference to the PCEHR or the My Health Record.
Internet Safety. Online Concerns: Contact Content Conduct.
Social Media Smarts. Yep! That’s Me! I have had a cell phone since 5 th Grade I just got a cell phone this year I wish I had a cell phone I have an IPAD.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
DIGITAL CITIZENSHIP ED 505 TECHNOLOGY AND EDUCATION (REVISION)
Patient access Forgotten password
Tips and Information for Parents
How safe are you and your information when you are on the internet?
Personal Safety Online
Social Media & Cell Phones What RCS Parents Need to Know
Presentation transcript:

Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008

Overview of Integrity™ Commercially Reasonable Age & ID Verification Launched million individuals verified. 1,000+ commercial and government clients worldwide Limits/prevents: - harmful contact between adults and minors - minors from accessing inappropriate content on the Internet - minors from accessing particular sites without parental consent - harassment, unwanted solicitation, and bullying of minors on the Internet. - adult solicitation of minors who willingly participate (solicitation not “unwanted”). Since inception 7 years ago, no Integrity client has been fined or prosecuted for underage access after adopting the service.

60 Minutes Report – November 20, 2005

Age Verification - Core Objectives To deter kids from acting older than they are To deter adult predators from acting younger than they are Case 1 Child Registers with Correct Age Case 1 Child Registers with Correct Age Case 2 Child Attempts to Register with Bogus Details Case 2 Child Attempts to Register with Bogus Details Case 3 Predator Registers with Correct Details Case 3 Predator Registers with Correct Details Case 4 Predator Impersonates a Child & Adult Case 4 Predator Impersonates a Child & Adult

Age Verification – How It Works Case #1: Child Attempts to Register with Correct Details 1.Child attempts to register. 2. Site prompts for permission from a verifiable adult. 3. Adult’s identity is verified for valid age and sex offender status. 4. Access granted. 5. Adult is sent a post card or automated phone call made to the residence.

Age Verification – How It Works Case #2: Child Attempts to Register with Bogus Details Child attempts to register with fabricated or ‘borrowed’ credentials. 2. Access denied, or, if parent’s ID is used, access is temporarily granted. 3. Parent receives automated phone call or postcard alerting them to ‘their’ registration at the site. 4. Parent suspends access. Child is ‘grounded’.

Age Verification – How It Works Case #3: Predator Tries to Register with Correct Details 1.Sexual predator attempts to register. 2. Identity is scrubbed against registered sex offender database. 3. Access denied or restricted.

Age Verification - How It Works Case 4: Predator Impersonates a Child & Adult 1.Sexual predator registers as a child, and impersonates an adult who is giving permission for that fictitious child to register. 2.Predator is denied access if the adult is fictitious, OR 3.Predator gains temporary access until the real adult gets the postcard or phone call. 4.Site suspends predator’s access & alerts those he contacted to the danger.

Age Verification Against Parents’ Responsibility Added Cost No Data on Kids Gives False Sense of Security Invasion of Privacy Drives Kids Offshore “Only 15% of our users are underage” In Favor Shared Responsibility Commercially Reasonable Not Required Good Security Better Than None Government-Issued ID No Evidence 15%? Without Age Verification, How Do You Know?

John Aristotle Phillips (415) Contact Integrity