Tuesday, 6 May 2025
25.3 C
Singapore
28.8 C
Thailand
21 C
Indonesia
28.6 C
Philippines

UK introduces AI age checks for online pornography

The UK proposes AI-based age verification for online pornography access, focusing on child safety while considering privacy and data security. Final guidelines are expected in early 2025.

In a significant move to safeguard children, the UK government has proposed using artificial intelligence (AI) for age verification to prevent underage access to online pornography.

Implementing the Online Safety Act

This initiative is a part of the recently passed Online Safety Act, which mandates that websites and apps displaying pornographic material take stringent measures to block access by children. Recognising the importance of this issue, the UK has set the legal age for viewing pornography at 18 years or older. The Act represents a significant step in the government’s ongoing efforts to create a safer online environment for young people.

Proposed verification methods

The media regulator Ofcom has put forward several methods for age verification. The primary suggestion is AI-driven facial age estimation, involving users uploading selfies for age analysis. This innovative approach uses the latest technology for more accurate age verification. Additionally, Ofcom suggests other methods like photo ID matching, where users upload government-issued identification and credit card checks. Another forward-thinking option is open banking, where users give consent for their banks to share age-verification information with pornographic websites.

Addressing privacy concerns

While these measures aim to protect children, they have also raised concerns about privacy and data security. The Institute of Economic Affairs has highlighted the potential risks associated with collecting and storing sensitive personal data. In response, Ofcom acknowledges the need for a balanced approach that ensures robust age verification while protecting user privacy. The regulator also emphasised that simpler methods, such as self-declared age or non-age-specific online payment methods, would no longer suffice under the new guidelines. The final version of the guidelines, expected in early 2025, will likely address these concerns while upholding the Act’s objectives.

Hot this week

Financial sector outages cost US$2.2 million per hour, says New Relic report

Financial firms face US$2.2M/hour in outage costs; New Relic report shows AI-led observability as key to resilience and digital success.

Apple may change the iPhone launch schedule to prepare for foldable release

Apple may change its iPhone release schedule in 2026 to launch a foldable model and introduce other updates across the iPhone range.

You have until June 30 to update your old LG phone

LG will shut down its phone update servers and LG Bridge software on June 30, 2025, marking the end of support for older LG phones.

AirPlay flaws could let hackers spread malware through your network

AirPlay bugs could let hackers attack your devices and spread malware on your network. Update your Apple gear now to stay safe.

Canon launches compact RF75-300mm telephoto lens for beginner photographers

Canon introduces the RF75-300mm f/4-5.6 lens, a lightweight and affordable telephoto zoom option for beginner photographers.

Nintendo sues Genki over Switch 2 accessory mockups and trademark use

Nintendo sued Genki for showing Switch 2 mockups before launch, claiming trademark misuse and misleading promotion.

Grand Theft Auto VI release has been delayed to 2026, with an official date now confirmed

Rockstar confirms GTA VI will now be released on May 26, 2026, moving from its original 2025 window for more polish and quality.

Half-Life 3 could be fully playable and announced this year

Half-Life 3 may finally arrive. Valve insiders say it’s fully playable and could be announced this summer and released this winter.

ASUS IoT secures IEC 62443-4-1 cybersecurity certification for industrial systems

ASUS IoT earns IEC 62443-4-1 certification, strengthening cybersecurity in industrial systems through secure development lifecycle practices.

Related Articles

Popular Categories