{"id":1720,"date":"2020-01-21T10:20:39","date_gmt":"2020-01-21T09:20:39","guid":{"rendered":"https:\/\/87adsf68asd7f6.tatooine.link\/?p=1720"},"modified":"2025-03-24T13:37:45","modified_gmt":"2025-03-24T12:37:45","slug":"data-protection-children-internet","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet","title":{"rendered":"Data protection of children on the Internet"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4dlh5k-85ab4c2a6e4a26e478b39e81ce435ecd\">\n.flex_column.av-4dlh5k-85ab4c2a6e4a26e478b39e81ce435ecd{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4dlh5k-85ab4c2a6e4a26e478b39e81ce435ecd av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4o6pv5-4197637bfe4d7bff795edb3de0c4ad87'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Data protection of children on the Internet<\/strong><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcbphg2x-3b6a9ff5c4e8986d00e01cf4c8a26f03\">\n.avia-image-container.av-kcbphg2x-3b6a9ff5c4e8986d00e01cf4c8a26f03 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kcbphg2x-3b6a9ff5c4e8986d00e01cf4c8a26f03 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kcbphg2x-3b6a9ff5c4e8986d00e01cf4c8a26f03 av-styling- avia-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_textblock'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-14064 avia-img-lazy-loading-not-14064 avia_image' src=\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\" alt='A child is sitting on a sofa watching a video about data protection on the internet on a mobile phone.' title=''  height=\"343\" width=\"685\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg 685w, https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder-300x150.jpg 300w, https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder-18x9.jpg 18w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-kbc3cuv2-bc65890ce63227bd08edea262f36b4bf'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><span style=\"color: #303440;\">Data protection of children on the Internet<\/span><\/h1>\n<p>When a child takes its first independent steps in the real world, its parents take precautions to protect it. Similarly, parents should take similar action in the online world so that their children can enjoy the fun of surfing the Internet without harm. Going online together is a good start.<\/p>\n<p>Children are exposed to many dangers on the Internet. They can access inappropriate content such as violent scenes, extremism or even pornography. Report objectionable websites to appropriate authorities such as the police, youth welfare services, school administrators. Authorities must follow up the report.<\/p>\n<p>Children carelessly give their <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/personal-data\">personal data<\/a> on the Internet, which can fall into the wrong hands. They receive unwanted messages and, in the worst case, are contacted by strange adults. Encourage your children to use \"nicknames\", for example in their e-mail address. The real mail address is only for the child's friends. Set the smartphone so that only you can install new apps.<\/p>\n<h2>Great dangers lurk in private chats<\/h2>\n<h3>Children should only use chats that are suitable for their age group<\/h3>\n<p>In web chats, for example on Facebook, children can be harassed or sexually harassed. A particular danger can arise when children are lured into private chat rooms and are confronted with inappropriate content. A child can barely tell if he or she is chatting with another child or an adult pretending to be a child.<\/p>\n<h3>Inform your child about rip-offs on the Internet and the subject of data protection<\/h3>\n<p>When surfing the internet or using apps, children can sign up for subscriptions and contracts that cause high costs, for example, when billed via the mobile phone contract. Children on the internet often do not recognise bait offers and do not understand the long-term costs of subscriptions.<\/p>\n<p>Activate the \"third party blocking\" function with your mobile phone provider, which prevents third parties from booking charges to your mobile phone contract. Check your mobile phone bill regularly for unclear cost items and block 0900 and 0800 numbers. Appeal against rip-off tariffs.<\/p>\n<h3>Inform your child that the illegal use of digital media is punishable by law<\/h3>\n<p>Children use, offer and share videos, music and pictures online that are protected by copyright. Warning lawyers are specialized in identifying and warning users of illegal download platforms. Especially platforms that offer new games, videos and music for free are illegal. It is precisely here that viruses and other malware, cost and data traps often lurk. YouTube on the other hand usually blocks illegal content. Encourage your child to use legal platforms such as suitable media libraries.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2rcn1k-1cdd065665a32b62257127814cbecde6\">\n.flex_column.av-2rcn1k-1cdd065665a32b62257127814cbecde6{\npadding:35px 25px 30px 25px;\nbackground-color:#b3dff1;\n}\n<\/style>\n<div  class='flex_column av-2rcn1k-1cdd065665a32b62257127814cbecde6 av_one_full  avia-builder-el-4  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><section  class='av_textblock_section av-ky8kqgt2-2472500fbad344bb2468ed2a00256fbf'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"font-size: 20px;\"><strong>External Data Protection Officer<\/strong><\/p>\n<p>You are welcome to contact us as\u00a0<strong>external data protection officer (DPO)\u00a0<\/strong>order. We also offer individual consulting services as well as audits and will be happy to provide you with a non-binding offer. You can find more information about our external data protection officers on our website.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-ky8kqu6t-ceee415cd8e82eb24c45ee3c4eeac6fd-wrap avia-button-left  avia-builder-el-6  el_after_av_textblock  avia-builder-el-last'><a href='https:\/\/www.robin-data.io\/en\/data-protection-as-a-service'  class='avia-button av-ky8kqu6t-ceee415cd8e82eb24c45ee3c4eeac6fd av-link-btn avia-icon_select-no avia-size-large avia-position-left avia-color-theme-color'   aria-label=\"Discover DSB services\"><span class='avia_iconbox_title' >Discover DSB services<\/span><\/a><\/div><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38czso-33dc9c0bc9b34d2a38fafca2fe509090\">\n.flex_column.av-38czso-33dc9c0bc9b34d2a38fafca2fe509090{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-38czso-33dc9c0bc9b34d2a38fafca2fe509090 av_one_full  avia-builder-el-7  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kbc3huep-eb9d925a078ba1cde9343f3c137954e9'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Bullying on the Internet is widespread<\/h2>\n<h3>Educate your children about bullying on the Internet<\/h3>\n<p>Many children on the internet become victims of bullying on social networks through embarrassing or intimate content such as photos, videos or text messages. Make it clear to your child that sharing embarrassing or intimate pictures, videos and texts is not funny, but causes a lot of stress and sadness for those involved.<\/p>\n<p>Ask your child how he or she would feel if they were in the other child's place. If your child is a victim of cyberbullying himself or herself, contact the school, the operator of the website or service where the bullying takes place or, if the incident is serious or ongoing, contact the police directly and ask for help.<\/p>\n<p>Furthermore, photos, videos and texts posted online are virtually impossible to delete. This content may not have a negative effect on your child until years later, for example in an application process. Employers are increasingly checking applicants online.<\/p>\n<h3>Sharenting<\/h3>\n<p>But not only children, but also their parents often use the Internet carelessly. A widespread phenomenon is called Sharenting. It is an artificial word made up of share and parenting. All too often, parents take photos of their children and distribute them via Facebook &amp; Co. This can have serious consequences for these children in the future.<\/p>\n<p>Many people are likely to feel that their privacy has been violated if, at a later date, they come across pictures of them as a child half naked, taking a nap or wearing swimwear at the beach. Beach photos, pictures of embarrassing situations or extensive partying have no place on the Internet. Cute photos of naked babies or children bathing in the garden should also remain private, as such images attract paedophiles. The <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/general-data-protection-regulation-eu-gdpr\">GDPR<\/a> does not apply to the processing of personal data by natural persons for the exercise of personal or family activities (<a href=\"https:\/\/help.robin-data.io\/artikel-2-dsgvo?hsLang=de\" target=\"_blank\" rel=\"noopener\">Article 2<\/a>\u00a0paragraph 2c GDPR). This applies, for example, to pictures of a family celebration. However, as soon as they are uploaded to social networks, this exception no longer applies.<\/p>\n<h2>Surfing the Internet together helps parents and children<\/h2>\n<h3>Encourage a conscious use of digital media.<\/h3>\n<p>Instead of complete bans, it is better to teach children step by step how to use digital media consciously and to strengthen it over time.<\/p>\n<p>Therefore, you should talk to your child regularly about his or her Internet experiences. Surfing together gives you an insight into the child's online world. Parents should be around when their children are surfing until their twelfth birthday. Parents are responsible for downloading, installing programs and registering on platforms. It is important that they also inform themselves about the legal situation when streaming and downloading and discuss with their son or daughter what is legal on the net.<\/p>\n<h3>Agree on clear rules for media use<\/h3>\n<p>It is important that parents talk to their child about the risks of surfing and agree together which offers on the net he\/she may use for how long and how often. These rules can also be written down. Fixed surfing times ensure that other interests are not neglected. As a guideline, a limit of ten minutes per year of age per day or one hour per year of age per week applies. This is limited to media use in leisure time and not when the child is learning with media.<\/p>\n<p>Parents also have to take care of the welfare of their offspring in technical terms. Tools are the activation of security settings and the installation of youth protection programs.<\/p>\n<p>They sort out unsuitable websites by filters or allow only checked websites. Parents are well advised to check the settings regularly, adjust them according to age and block access with a secure password. These measures complement attentive media education by parents, but do not replace it. It is also advisable to set up an account for the offspring via the operating system and to restrict functions such as the installation of programs and content according to age. Internet access can also be restricted on mobile phones.<\/p>\n<p>Last but not least, parents should agree with their child to inform them if they see or hear questionable or inappropriate content. Children should know that they are not to blame if they have seen problematic websites and that they can count on support from their parents. Depending on the severity of the case, parents can also save the contribution via screenshot and send it to complaint centres such as\u00a0<a href=\"https:\/\/www.jugendschutz.net\/hotline\/\" target=\"_blank\" rel=\"nofollow noopener\">jugendschutz.net<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.internet-beschwerdestelle.de\/de\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">internet-complaints office.com<\/a>\u00a0report.<\/p>\n<h3>Parents should always follow two rules of thumb: You should respect the personal rights of your children to the best of your knowledge and belief! Since this is not your own personal data, ask yourself the control question whether you would consent to the collection of data if you yourself were affected!<\/h3>\n<\/div><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-9  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-11  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet&#038;t=Datenschutz%20von%20Kindern%20im%20Internet' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Datenschutz%20von%20Kindern%20im%20Internet&#038;url=https:\/\/www.robin-data.io\/en\/?p=1720' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Datenschutz%20von%20Kindern%20im%20Internet&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Datenschutz%20von%20Kindern%20im%20Internet&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-12  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h4 style=\"text-align: center;\">This might interest you too:<\/h4>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-14  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-15  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-11094 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' data-rel='slide-1' class='slide-image' title='The new EU standard contract clauses'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender-495x343.jpg\" class=\"wp-image-14058 avia-img-lazy-loading-not-14058 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The new EU standard contractual clauses\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers' title='The new EU standard contract clauses'>The new EU standard contract clauses<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >On 07 June 2021, the European Commission published the new version of the EU Standard Contractual Clauses for the international transfer of personal data.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-06-10T13:26:03+02:00\" >10 June 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/eu-standard-contractual-clauses-gdpr-international-data-transfers#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150314\/Drittlaender.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-01-21T10:20:39+01:00\" >2021-06-10 13:26:03<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:39:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The new EU standard contract clauses<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-9847 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' data-rel='slide-1' class='slide-image' title='Passwordless authentication via FIDO2'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Passwordless authentication via FIDO2\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' title='Passwordless authentication via FIDO2'>Passwordless authentication via FIDO2<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >What does passwordless authentication via FIDO2 mean? Why the password is obsolete and you should rely on the security standard!<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >26 April 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-01-21T10:20:39+01:00\" >2021-04-26 15:00:36<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:46:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Passwordless authentication via FIDO2<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-1720 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' data-rel='slide-1' class='slide-image' title='Data protection of children on the Internet'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder-495x343.jpg\" class=\"wp-image-14064 avia-img-lazy-loading-not-14064 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data protection for children on the internet\"><h3 class='slide-entry-title entry-title'  itemprop=\"headline\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet' title='Data protection of children on the Internet'>Data protection of children on the Internet<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/www.robin-data.io\/en\/category\/data-protection-and-data-security-academy\/wiki\" rel=\"tag\">Wiki<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Information by parents and concrete rules on media use are useful. How can the use of digital media be taught?<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2020-01-21T10:20:39+01:00\" >21 January 2020<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Ulrich Hottelet<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Ulrich Hottelet<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2020-01-21T10:20:39+01:00\" >2020-01-21 10:20:39<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:37:45<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data protection of children on the Internet<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Information by parents and concrete rules on media use are useful. How can the use of digital media be taught? <\/p>","protected":false},"author":9,"featured_media":14064,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[121],"class_list":["post-1720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-spezielle-themen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Datenschutz von Kindern im Internet: Tipps f\u00fcr Eltern | Wiki<\/title>\n<meta name=\"description\" content=\"Wie kann der Umgang mit digitalen Medien vermittelt werden? Aufkl\u00e4rung zur Datenschutz von Kindern und Regeln zur Mediennutzung. Jetzt lesen!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Datenschutz von Kindern im Internet\" \/>\n<meta property=\"og:description\" content=\"Wie kann der Umgang mit digitalen Medien vermittelt werden? Aufkl\u00e4rung zur Datenschutz von Kindern und Regeln zur Mediennutzung. Jetzt lesen!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-21T09:20:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:37:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ulrich Hottelet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ulrich Hottelet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet\"},\"author\":{\"name\":\"Ulrich Hottelet\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"headline\":\"Datenschutz von Kindern im Internet\",\"datePublished\":\"2020-01-21T09:20:39+00:00\",\"dateModified\":\"2025-03-24T12:37:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet\"},\"wordCount\":2515,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\",\"keywords\":[\"Spezielle Themen\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet\",\"name\":\"Datenschutz von Kindern im Internet: Tipps f\u00fcr Eltern | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\",\"datePublished\":\"2020-01-21T09:20:39+00:00\",\"dateModified\":\"2025-03-24T12:37:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\"},\"description\":\"Wie kann der Umgang mit digitalen Medien vermittelt werden? Aufkl\u00e4rung zur Datenschutz von Kindern und Regeln zur Mediennutzung. Jetzt lesen!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Datenschutz von Kindern im Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515\",\"name\":\"Ulrich Hottelet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g\",\"caption\":\"Ulrich Hottelet\"},\"description\":\"Freier IT-Journalist mit den Schwerpunkten Datenschutz, IT-Sicherheit und K\u00fcnstliche Intelligenz.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/support\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Children's data protection on the internet: Tips for parents | Wiki","description":"How can the use of digital media be taught? Education on children's data protection and rules on media use. Read now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet","og_locale":"en_GB","og_type":"article","og_title":"Datenschutz von Kindern im Internet","og_description":"Wie kann der Umgang mit digitalen Medien vermittelt werden? Aufkl\u00e4rung zur Datenschutz von Kindern und Regeln zur Mediennutzung. Jetzt lesen!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/data-protection-children-internet","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2020-01-21T09:20:39+00:00","article_modified_time":"2025-03-24T12:37:45+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg","type":"image\/jpeg"}],"author":"Ulrich Hottelet","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Ulrich Hottelet","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet"},"author":{"name":"Ulrich Hottelet","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"headline":"Datenschutz von Kindern im Internet","datePublished":"2020-01-21T09:20:39+00:00","dateModified":"2025-03-24T12:37:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet"},"wordCount":2515,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg","keywords":["Spezielle Themen"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet","name":"Children's data protection on the internet: Tips for parents | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg","datePublished":"2020-01-21T09:20:39+00:00","dateModified":"2025-03-24T12:37:45+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515"},"description":"How can the use of digital media be taught? Education on children's data protection and rules on media use. Read now!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150323\/Kinder.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/datenschutz-von-kindern-im-internet#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Datenschutz von Kindern im Internet"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/de6bda5732577bc67c77f10d329ad515","name":"Ulrich Hottelet","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/495064e7627f3d4e58956b5abfcb5fb961fbae7277080db4d21a7ff311e4fefb?s=96&d=mm&r=g","caption":"Ulrich Hottelet"},"description":"Freelance IT journalist specialising in data protection, IT security and artificial intelligence.","url":"https:\/\/www.robin-data.io\/en\/author\/support"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=1720"}],"version-history":[{"count":15,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1720\/revisions"}],"predecessor-version":[{"id":9813,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/1720\/revisions\/9813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14064"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=1720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=1720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=1720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}