The Times Australia
The Times World News

.

Tech companies’ proposed new safety codes won’t protect all kids online

  • Written by Toby Murray, Professor of Cybersecurity, School of Computing and Information Systems, The University of Melbourne

In July last year, Australia’s eSafety Commissioner, Julie Inman Grant, directed[1] tech companies to develop codes of practice to keep children safe from online porn and harmful content. Now, after seven months, the industry has submitted draft codes[2] to eSafety for approval.

eSafety is currently assessing the draft codes.

Assuming Grant approves the new codes, what can we expect the future to look like for children and teens online? And how effective will the proposed codes be at protecting children?

A coordinated approach

The codes submitted for approval were developed by a group of industry associations[3].

They cover social media platforms such as Facebook and Snapchat. But they also cover internet service providers, search engines such as Google, online messaging services such as WhatsApp, online gaming platforms, as well as the manufacturers of the computers, mobile phones and software we use to access online services.

The codes will also cover online app stores such as those operated by Apple and Google. However, app store codes aren’t expected to be released until late March.

As well as covering a range of companies, the codes also cover a range of harms. They aim to protect kids not only from online pornography but also content that promotes self-harm, eating disorders, suicide and violence.

Given the difficulty of protecting kids from this kind of content, this coordinated approach is absolutely essential[4].

If the draft codes are approved, companies will have six months[5] to implement the proposed safety measures. They will face fines of up to A$50 million for non-compliance.

What’s in store?

The draft codes are broken up across different parts of the tech ecosystem. The requirements they place on individual tech platforms depend on the danger harmful content on each platform poses to children.

Large social media platforms such as Facebook, Instagram and X (formerly Twitter) are likely to be categorised among the most dangerous. That’s because it’s possible for users to access extremely harmful content such as child sexual abuse or terrorist material on these platforms. Plus, these platforms serve millions of people and also allow users to create public profiles, maintain “friend” lists, and share content widely.

According to the draft codes, these platforms will need to implement the most stringent safety measures. These include using age-assurance[6] measures to prevent children under the minimum age allowed to access the service from doing so, having an appropriately resourced trust and safety[7] team, and using automated systems to detect and remove child abuse and pro-terror material.

On the other hand, less risky platforms won’t be subject to any requirements under the draft codes. These include online platforms that allow only limited communication within a specific group of people and without social media features such as friends lists and public profiles. Platforms for communication within a primary school such as Compass[8] would be among the least risky.

Online search engines such as Google and Bing – which provide access to adult and self-harm content, but are legitimately used by children – will be required to implement appropriate measures to prevent children accessing that content.

This may include enabling safe-search features and establishing child-user accounts. These accounts would include features that automatically blur harmful content and filter such content from search results and recommendation algorithms

The codes also cover emerging harmful technology, such as deepfake porn apps powered by generative artificial intelligence. Like traditional porn sites, these will be required to implement age-assurance technology to prevent children using these services.

A woman with blond hair, wearing a pink blazer, seated before a microphone.
The eSafety commissioner, Julie Inman Grant, is currently assessing the proposed online safety codes. Mick Tsikas/AAP

What about age assurance?

The codes specifically define[9] what age-assurance measures are considered “appropriate”.

Importantly, just because an age-checking system can be bypassed doesn’t disqualify it. Instead, age assurance measures must include “reasonable steps” to ensure someone is of age, while balancing privacy concerns[10].

Requiring users to self-declare their age is not appropriate. So expect to see porn sites do away with click-through dialogs asking visitors to declare they are really adults.

Instead, sites will have a range of options for assuring their users’ ages, including photo ID, estimating age based on facial images or video, having a parent attest to a child’s age, leveraging credit card checks, or AI-based methods for age inference.

Different measures are likely to be used by different companies and systems.

For example, Apple has already announced a range of new child safety measures[11] that appear to align with many parts of the draft codes. These include making it easier for parents to set up child safety features on kids’ iPads and iPhones, using a parent’s payment information to ensure they can safely attest to their child’s age, as well as app store integration of child safety features to enable app developers to make their apps safer for children.

On the other hand, adult sites and apps are likely to adopt age-assurance mechanisms that users perceive to be more private. For paying subscribers, they are likely to leverage the credit information already stored to assure the users’ age.

Non-subscribers may instead be required to submit to a facial scan or other AI-based methods to estimate their age.

Publicly available data[12] on state-of-the-art systems for age estimation from facial images suggests the best systems have an average error of 3.7 years.

Whether eSafety will agree such technology is “appropriate” remains to be seen. However, if it is adopted, there is a real risk many teens will remain able to access online porn and harmful deepfake apps despite these new codes.

References

  1. ^ directed (theconversation.com)
  2. ^ draft codes (onlinesafety.org.au)
  3. ^ group of industry associations (onlinesafety.org.au)
  4. ^ essential (theconversation.com)
  5. ^ six months (www.theguardian.com)
  6. ^ age-assurance (theconversation.com)
  7. ^ trust and safety (www.forbes.com.au)
  8. ^ Compass (www.compass.education)
  9. ^ define (onlinesafety.org.au)
  10. ^ privacy concerns (pursuit.unimelb.edu.au)
  11. ^ new child safety measures (techcrunch.com)
  12. ^ Publicly available data (archive.is)

Read more https://theconversation.com/tech-companies-proposed-new-safety-codes-wont-protect-all-kids-online-251266

Times Magazine

Why Social Media Marketing Matters for Businesses in Australia

Today social media is a big part of daily life. All over Australia people use Facebook, Instagram, TikTok , LinkedIn and Twitter to stay connected, share updates and find new ideas. For businesses this means a great chance to reach new customers and...

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

The Times Features

Could we one day get vaccinated against the gastro bug norovirus? Here’s where scientists are at

Norovirus is the leading cause[1] of acute gastroenteritis outbreaks worldwide. It’s responsible for roughly one in every five cases[2] of gastro annually. Sometimes dubbed ...

Does running ruin your knees? And how old is too old to start?

You’ve probably heard that running is tough on your knees – and even that it can cause long-term damage. But is this true? Running is a relatively high-impact activity. Eve...

Jetstar announces first ever Brisbane to Rarotonga flights with launch fares from just $249^ one-way

Jetstar will start operating direct flights between Brisbane and Rarotonga, the stunning capital island of the Cook Islands, in May 2026, with launch sale fares available today...

Introducing the SE 2 and Mini hair dryers from Laifen

The Mane Attractions for Professional Styling at Home Without the Price Tag Fast, flawless hair is now possible with the launch of Laifen’s two professional quality hair dryers th...

Home Gym Recovery Routines: What Pro Athletes Do After Workouts

Training is only half the equation. What you do after your workout has just as much impact on your progress, performance, and long-term health. Professional athletes know this, w...

Flipping vs. Holding: Which Investment Strategy Is Right for You?

Are you wondering whether flipping a property or holding onto it is the better investment strategy? The answer isn’t one-size-fits-all. Both strategies have distinct advantages a...