| NR
130/1999 8
December 1999
ABA
decides on adult verification systems for users
who wish to access R-rated Internet content
The
ABA has decided on minimum system requirements
for restricted access systems for Internet
content. An ABA declaration setting out the
system requirements was tabled in Parliament
yesterday.
Restricted
access systems are adult verification devices
that allow people who are 18 years or older to
access adult material on the Internet, whilst
protecting children from exposure to material
that may be unsuitable for them.
"The
declaration provides commercial certainty for the
Internet industry," said Professor David
Flint, ABA Chairman. "The requirements set
by the ABA are consistent with Internet practices
used throughout the world."
The
declaration sets out the process by which a
person can gain access to Internet content that
is likely to be rated 'R' by the Classification
Board. It relies on credit card validation as a
means to check that a person is 18 years or
older.
Internet
content hosted in Australia that is likely to be
classified 'R' and not protected by a compliant
restricted access system is potentially
prohibited content and may be taken down from the
Internet if the ABA receives a complaint about
that content after 1 January 2000.
The
declaration was developed based on submissions to
the ABA from industry and community groups and
individual users following distribution of a
consultation paper that set out draft system
specifications. The declaration also provides for
off-line registration processes and anticipates
the future use of digital signatures as an
electronic means of identity authentication.
Following advice from the Office of the Federal
Privacy Commissioner, the declaration also
provides for certain privacy and security
safeguards.
BACKGROUNDER
Internet
content hosted in Australia is prohibited content
or potential prohibited content under Schedule 5
of the Broadcasting Services Act 1992 if it has
been classified 'R' by the Classification Board
and is not subject to a 'restricted access
system'.
The
ABA has the power to declare a specified access
control system a 'restricted access system'. A
declaration, in the form of a written instrument
tabled in Parliament, may be made by the ABA.
In
making a declaration, the ABA is to be guided by
principles laid down in the Act which have the
aim of minimising the financial and
administrative burdens on the Internet industry
and encouraging the supply of Internet carriage
services at performance standards that meet
community needs.
Consultation
process
The
ABA prepared a consultation paper on restricted
access systems and sought industry and public
comment. The paper contained draft restricted
access system requirements and was prepared
following consideration of a number of existing
identity and age verification processes
including:
- existing
adult verification systems in use on the
Internet;
- 100
point identity checks used by financial
institutions to verify the identity of
people opening accounts; * use of digital
signatures; * credit card validation;
- tax
file numbers and medicare numbers; and
- evidence
of identity and age such as certified
copy of passport, birth certificate,
driver's licence, senior's card or
student card.
The
consultation paper was distributed to the
following industry and community groups and
relevant government agencies on 27 October 1999
for comment by 9 November 1999:
Internet
Industry Association (IIA) Internet Society of
Australia (ISOC-AU) Western Australian Internet
Association (WAIA) South Australian Internet
Association (SAIA) CSIRO National Office for the
Information Economy (NOIE) Office of the Privacy
Commissioner Young Media Australia
The
consultation paper was also posted on the ABA's
website and general comments were sought.
A
total of 101 comments on the consultation paper
were received by the ABA.
Industry
and community groups that provided submissions
included:
Internet
Society of Australia (ISOC-AU) Western Australian
Internet Association (WAIA) South Australian
Internet Association (SAIA) Australian Computer
Society (ACS) Electronic Frontiers Australia
(EFA) Australian Privacy Charter Council (APCC)
Young Media Australia (YMA)
The
Office of the Federal Privacy Commissioner also
provided comments on the Consultation paper .
While
Mr Peter Coroneos, Executive Director, IIA,
provided comments on the consultation paper, he
made it clear that his comments were not the
result of consultation with IIA members nor
should they be taken to express the view of
membership. The consultation paper was however
posted on the website of IIA which would have
given IIA members the opportunity to provide
comments if they so desired.
The
Restricted Access Systems Declaration 1999 (No.
1) was developed taking into account the comments
contained in the submissions received by the ABA.
It sets out minimum system requirements a
restricted access system must meet to satisfy the
Act. Attached is a copy of the declaration which
was tabled in Parliament on 7 December 1999.
Restricted
Access Systems Declaration 1999 (No. 1)
made
under the Broadcasting Services Act 1992
1.
Introduction
1.1.
This declaration is the Restricted Access
Systems Declaration 1999 (No. 1).
1.2.
This declaration commences on gazettal.
1.3.
This declaration sets out minimum system
requirements for a 'restricted access system'
pursuant to subclause 4(1) of Schedule 5 of
the Broadcasting Services Act 1992 (the Act).
1.4.
Pursuant to subclause 4(2) of Schedule 5 of
the Act, in making this declaration, the
Australian Broadcasting Authority
- has
had regard to the objective of
protecting children from exposure to
Internet content that is unsuitable
for children; and
- has
been guided by the principles
contained in subsection 4(3) of the
Act concerning the regulation of
Internet content hosted in Australia
and Internet carriage services
supplied to end-users in Australia.
2.
Functions
2.1.
A 'restricted access system' will be required, as
a minimum, to perform the following functions:
| Number
|
Function |
Description
|
| 1.
|
Registration |
The
system will receive applications for
registration, either in hard copy or
electronically. |
| 2.
|
Qualification/validation |
The
system will verify age. Upon verification
of age, the system will allocate a
personal identification number (PIN) or
password to the applicant. |
| 3.
|
Access
|
To
gain access to Internet content subject
to the system, the applicant will need to
input in full the issued PIN or password.
A registered user should not encounter
Internet content that is likely to be
classified 'R' until entered PIN or
password has been verified. |
3.
Registration
3.1.
A person will apply for registration with the
system electronically, for example, via a website
or email; or in hard copy form, for example, by
letter or fax.
3.2.
Application forms must specify data items
that are mandatory and those that are
'optional'.
3.2.1.
Mandatory data items for the electronic
lodgement of an application are:
- name
of applicant;
- declaration
that applicant is 18 years of age
or over; and either
- credit
card details; or
- digital
signature.
3.2.2.
Mandatory data items for the lodgement of
a hard copy application are:
- name
of applicant;
- declaration
that applicant is 18 years or
over; and either credit
card details; or
- evidence
of age, for example, a copy of
passport, birth certificate,
driver's licence, senior's card
or student card.
4.
Qualification/validation
4.1.
The system will 'qualify' an application for
registration if all mandatory information
requirements are provided.
4.2.
The following rules will be used to invalidate an
application:
- if
applicant has not declared that he/she is
at least 18 years of age; or
- if
credit card details cannot be validated;
or
- if
digital signature cannot be authenticated
in the case of an electronic application;
or
- if
evidence of age has not been produced in
the case of a hard copy application.
4.3.
Upon valid registration, a PIN or password is to
be issued to the registered user. It should be a
condition of use that the allocated PIN or
password should not be passed on to a third
person under the age of 18.
4.4.
An allocated PIN or password can be changed if
the user and/or system administrator suspects the
integrity of the data is compromised.
5.
Access
5.1.
A registered user must input allocated PIN or
password to gain access to any website subject to
the system.
5.2.
Access is to be denied if entered PIN or password
does not match registered record of PIN or
password.
6.
System compliance
6.1.
System compliance will be tested if the ABA
receives a complaint about Internet content
subject to the system.
7.
Privacy and security requirements
7.1.
The handling of personal information should
comply with the privacy standards contained in
the National Principles for the Fair Handling of
Personal Information issued by the Federal
Privacy Commissioner.
7.2.
It is highly desirable that the electronic
transfer of credit card information be protected
with reasonable data security mechanisms. For
example, the use of Secure Sockets Layer (SSL) in
online registration processes.
What
we do l What's
new l Search l Publications l Contact
us l Home

|