Policies requiring age verification are violations of free speech. However, they have been utilized globally and domestically to assuage public outcry about minors accessing sexually explicit material online1 , but most of this legislation is ineffective, insecure, or both. These laws require proof of age via disclosure of personal information, identification document uploads, or facial recognition software before accessing websites with sexual material. However, these laws unilaterally hinder First Amendment rights online for both users and websites2 3 and often fail to keep consumers’ personal information safe.
Some states have also proposed legislation requiring parental consent and age verification for social media sites to confirm the age of the minor and the relationship to the parent giving consent.4 These policies would similarly require the sharing of personal ID documents and other sensitive information to prove a caregiver-child relationship.
Courts have repeatedly invalidated laws requiring age verification on First Amendment grounds due to the burden imposed on adults attempting to access protected speech.5 6
Myth 1: Can you protect the First Amendment while implementing age verification?
No. Sexual content is fully protected by the First Amendment and age verification would inhibit all consumers, regardless of age, from accessing such material. Material at risk fromage verification restrictions include pornography or erotic content, information about sex education and sexual health, and spaces where LGBTQ+ individuals, sex workers, and other sexuality-based communities connect or share information.
Age verification laws intend to protect minors but inevitably affect all internet users and prohibit access to information for adults.7 While these policies will pose obstacles to or deter some adults from accessing certain websites, age verification will also completely block adults who do not have the necessary identification to pass the requirements. Those least likely to have necessary identification include people without financial means to purchase replacements of lost IDs, those without citizenship, and adults with disabilities who do not have driver’s licenses, causing skewed ability to access sexual content based on various privileges.8 9
A similar hierarchy of access occurs when sites use facial recognition software instead of identification uploads. This technology has been found to have biased accuracy depending on the users’ gender, race, and age,10 and it could incorrectly restrict adult users from accessing constitutionally protected content.
Even for adults who are able to provide accurate age verification, the elimination of anonymity impedes First Amendment rights. The right to remain nameless and maintain anonymity is a firmly established First Amendment right,11 but age verification would require all users to forgo this right. Once the personal information is provided, it becomes a treasure trove for hackers and scammers seeking to prey on users forced to disclose their identity.
Finally, age verification laws for pornography sites also risk setting a precedent to implement similar laws for social media platforms, as many states have already begun to propose and some have adopted.12 This effort runs the risk of blocking access to LGBTQ+ affirming spaces and reproductive and sexual health information,13 which have been shown to elevate safety for people without access to these communities or information offline.14 15
Myth 2: Is age verification the most effective way to ensure safety online?
No, age verification software often fails to keep minors away from explicit content, fails to keep minors or adults’ personal information safe, and overlooks alternative methods that are more effective.16 17 Content restrictions on individual devices or networks allow for tailored and effective parental control without exposing the general public to censorship and potential data breaches.
Age verification software often fails to effectively stop minors from accessing pornographic content online because age verification is relatively easy to bypass. Many consumers simply utilize a Virtual Private Network (VPN) and select a different state or county where age verification isn’t required to view the material. In fact, searches for VPNs notably spiked in states after age verification or bans on pornographic websites were announced.18 Age verification can also be bypassed by utilizing an older friend’s identification to obtain approval from a third-party verifier.
AV also fails to keep all users’ data secure. There is currently no technology that ensures total privacy and security of data19 20 21 because no software company is currently able to guarantee safety from data breaches or hackers, even if they strive for rigorous security measures. Even if the AV provider kept the information secure, the information must pass through countless online intermediaries before reaching the provider, with the attendant threat of data breach at each point. Even companies that immediately delete data could be hacked in between a user’s ID being uploaded and the vendor company removing the private information from their data.22
The judicial system has likewise found age verification’s insecurity to be a problem — several courts have determined that age verification requirements deter users from entering these websites because they do not trust their information and identity will be safe.23 Other countries have also found age verification tools unrealistic. Australia’s eSafety Commissioner, for example, recommended increased media literacy and education instead of relying on age verification after finding age verification to pose risks to security and privacy.24 The UK attempted to implement similar age verification policies but found it to be ineffective at guaranteeing citizens’ privacy given the inability to eliminate data breaches.25 France also said it was unable to identify a third-party service that accurately verifies age while respecting the privacy and security of users.26
Alternatively, filters or parental controls implemented at the user end would allow selective restrictions for minors without a universal restriction that could prohibit adults from accessing content and speech protected by the First Amendment.
For example, Android and iPhones allow parents to implement controls on content, screen time, and privacy for their children’s devices.27 Broadband companies also provide the option for parental controls to be used on any device connected to the home Wi-Fi network, ensuring any computers or tablets being used at home are also secure for minors. ASACP.org allows free use of its “RTA” (restricted to adults) tag to label adult sites that can be recognized by end-user filters to prevent access by minors.
Interestingly, this seems to be aligned with parents’ preferences. Globally, nearly 90% of parents also believe it is primarily their responsibility to regulate their children’s digital behavior.28 More so, the vast majority of parents set limits on their children’s digital habits and discuss safe online behaviors with them.29 However, only about half of American parents use parental control apps, while others utilize less automated oversight, such as checking their children’s digital history, providing digital education, and/or enforcing supervised screen time.30 Most parents surveyed believe this approach is working, as only 1% of these surveyed report their child is not using their device as expected.
Overall, the research suggests that clear communication between parents and children about digital safety combined with device- or network-side controls would significantly increase the safety of minors online without affecting the nation’s First Amendment rights.
See Also
How to Use the Parental Controls on a Smartphone
How to keep your child safe on their smartphone – the definitive guide
References
1. Stardust, Zahra, Abdul Obeid, Alan McKee & Daniel Angus. “Mandatory age verification for pornography access: Why it can’t and won’t ‘save the children.” Big Data & Society no. 11, 2 (2024). https://doi.org/10.1177/20539517241252129
2. Free Speech Coalition et al. Brief of Amici Curiae Supporting Plaintiff-Appellee in Free Speech Coalition v. Paxton, No. 21-50949 (5th Cir. Sept. 2024). https://www.woodhullfoundation.org/wp-content/uploads/2024/09/Amicus-Brief-Free-Speech-Coalition-v.-Paxton-.pdf
3. Free Speech Coalition. “Ineffective, Unconstitutional, and Dangerous: The Problem with Age Verification Mandates.” FSC Action Center (2023, February 16). https://action.freespeechcoalition.com/ineffective-unconstitutional-and-dangerous-the-problem-with-age-verification-mandates/
4. Athey, Philip. “Efforts to Shield Teenagers from Social Media Caught Up in First Amendment Protections.” Washington: National Journal Group, LLC (2023). https://ciis.idm.oclc.org/login?url=https://www.proquest.com/other-sources/efforts-shield-teenagers-social-media-caught-up/docview/2862603084/se-2.
5. Free Speech Coalition. “Ineffective, Unconstitutional, and Dangerous: The Problem with Age Verification Mandates.” FSC Action Center (2023, February 16). https://action.freespeechcoalition.com/ineffective-unconstitutional-and-dangerous-the-problem-with-age-verification-mandates/
6. Electronic Frontier Foundation. “Age Verification Bills Are Unconstitutional .” Electronic Frontier Foundation, (2024, September). https://www.eff.org/document/age-verification-bills-are-unconstitutional-09-2024
7. IBID
8. Blake, Pandora. “Age Verification for Online Porn: More Harm than Good?” Porn Studies 6, no. 2 (2019): 228–37. doi:10.1080/23268743.2018.1555054.
9. Free Speech Coalition et al. Brief of Amici Curiae Supporting Plaintiff-Appellee in Free Speech Coalition v. Paxton, No. 21-50949 (5th Cir. Sept. 2024). https://www.woodhullfoundation.org/wp-content/uploads/2024/09/Amicus-Brief-Free-Speech-Coalition-v.-Paxton-.pdf
10. Stardust, Zahra, Abdul Obeid, Alan McKee & Daniel Angus. “Mandatory age verification for pornography access: Why it can’t and won’t ‘save the children.” Big Data & Society no. 11, 2 (2024). https://doi.org/10.1177/20539517241252129
11. Cyberspace, Communications, Inc. v. Engler, 55 F. Supp. 2d 737 (E.D. Mich. 1999)
12. FIRE. “FIRE statement on age-based restrictions on social media access.” Foundation for Individual Rights and Expression. https://www.thefire.org/research-learn/fire-statement-age-based-restrictions-social-media-access
13. Bhatia, Aliya. “CDT’s Aliya Bhatia Testifies Before Colorado Senate Committee Raising Equity, Free Speech and Privacy Concerns with Mandating Use of Age Verification Tech.” Center for Democracy & Control. (March 20, 2024). Cdts-aliya-bhatia-testifies-before-colorado-senate-committee-raising-equity-free-speech-and-privacy-concerns-with-mandating-use-of-age-verification-tech
14. Berger, Matthew N., Melody Taba, Jennifer L. Marino, Megan S.C. Lim & S. Rachel Skinner. “Social Media Use and Health and Well-being of Lesbian, Gay, Bisexual, Transgender, and Queer Youth: Systematic Review.” Journal of Medical Internet Research no. 24, 9(2022):e38449. doi: 10.2196/38449.
15. Craig, Shelley L., Andrew D. Eaton, Lauren B. McInroy, Vivian W. Y. Leung, and Sreedevi Krishnan, S. “Can Social Media Participation Enhance LGBTQ+ Youth Well-Being? Development of the Social Media Benefits Scale.” Social Media + Society 7, no. 1 (2021). https://doi.org/10.1177/2056305121988931
16. Weissman, Shoshana. “The technology to verify your age without violating your privacy does not exist.” RStreet. May 16, 2023 https://www.rstreet.org/commentary/the-technology-to-verify-your-age-without-violating-your-privacy-does-not-exist/
17. Kaspersky. “Raising the smartphone generation.” Kaspersky Daily. (2021). https://www.kaspersky.com/blog/digital-habits-report-2021/
18. Cole, Samantha. “Accessing Porn In Utah Is Now a Complicated Process That Requires a Picture of Your Face.” Vice. (May 3, 2023). https://www.vice.com/en/article/z3mnqx/utah-age-verification-pornhub-xhamster-laws
19. Weissman, Shoshana. “The technology to verify your age without violating your privacy does not exist.” RStreet. May 16, 2023 https://www.rstreet.org/commentary/the-technology-to-verify-your-age-without-violating-your-privacy-does-not-exist/
20. Lively, Taylor K. “Facial Recognition in the United States: Privacy Concerns and Legal Developments.” AsisOnline. December 1, 2021. https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2021/december/facial-recognition-in-the-us-privacy-concerns-and-legal-developments/
21. Roth, Emma. “Online age verification is coming, and privacy is on the chopping block.” May 15, 2023. TheVerge.
https://www.theverge.com/23721306/online-age-verification-privacy-laws-child-safety
22. Athey, Philip. “Efforts to Shield Teenagers from Social Media Caught Up in First Amendment Protections.” Washington: National Journal Group, LLC (2023). https://ciis.idm.oclc.org/login?url=https://www.proquest.com/other-sources/efforts-shield-teenagers-social-media-caught-up/docview/2862603084/se-2.
23. American Civil Liberties Union v. Gonzales, 478 F. Supp. 2d 775 (E.D. Pa. 2007)
24. eSafety Commissioner.“Roadmap for age verification.” eSafety Commissioner. (2023)
https://www.esafety.gov.au/sites/default/files/2023-08/Age-verification-background-report.pdf
25. Yar, Majid. “Protecting Children from Internet Pornography? A Critical Assessment of Statutory Age Verification and its Enforcement in the UK.” Policing 43, no. 1 (2020): 183-197. doi:https://doi.org/10.1108/PIJPSM-07-2019-0108.
26. Weissman, Shoshana. “The technology to verify your age without violating your privacy does not exist.” RStreet. May 16, 2023 https://www.rstreet.org/commentary/the-technology-to-verify-your-age-without-violating-your-privacy-does-not-exist/
27. Pinola, Melanie. “How to Use the Parental Controls on a Smartphone.” Consumer Reports (2022, January 22). https://www.consumerreports.org/electronics-computers/cell-phones/how-to-use-parental-controls-on-a-smartphone-a4120021016/
28. Kaspersky. “Raising the smartphone generation.” Kaspersky Daily. (2021). https://www.kaspersky.com/blog/digital-habits-report-2021/
29. IBID
30. IBID
Let us know how you’re using the information. Just drop us a note at [email protected] and share your experience.
P.S. Don’t forget to credit Fact Checked by Woodhull when citing this work.