Use of age verification data
Dear eSafety Commissioner,
I am writing to request information under the Freedom of Information Act 1982 regarding the implementation and use of age verification mechanisms currently being proposed by the eSafety Commissioner. Specifically, I seek detailed information on the following:
How will the proposed age verification process function in practice for all proposed methods from a technical perspective? Is ESafety able to provide diagrams, technical design documentation etc
Could you please provide detailed information on the specific uses of age verification data? For instance, will the eSafety Commissioner or private companies have access to age verification data, such as facial recognition data or provided ID information? Additionally, will the eSafety Commissioner have the capability to associate potentially collected identifiable data with actual internet usage, such as visits to pornographic sites for example URLs, searches conducted on sites or content viewed? Or will esafety have the ability to compel private companies to provide this information.
If private companies are responsible for implementing age verification, has there been any research or measures taken to ensure that the data captured will be protected from data collection practices governed by legislation in the private companies’ respective countries?
Thanks
OFFICIAL
Dear applicant
Please see attached letter in relation to your FOI request.
Kind regards
FOI Coordinator
[1]signature_4012186592
[2]signature_1274066324 [3]signature_3751350823
[4]signature_3511698446 [5]signature_578146143
eSafety acknowledges all First Nations people for their continuing care of
everything Country encompasses — land, waters and community. We pay our
respects to First Nations people, and to Elders past, present and future.
NOTICE: This email message is for the sole use of the intended
recipient(s)
and may contain confidential and privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not the
intended recipient, please contact the sender by reply email and destroy
all
copies of the original message.
References
Visible links
1. https://www.esafety.gov.au/
2. https://au.linkedin.com/company/esafetyo...
3. https://twitter.com/esafetyoffice
4. https://www.facebook.com/eSafetyOffice/
5. https://www.instagram.com/esafetyoffice