Remove tag children
article thumbnail

Burger King forgets to put a password on their systems, again

Security Affairs

In 2019, due to a similar misconfiguration, the France branch reportedly leaked personally identifiable information (PII) of children who bought Burger King menus. Another piece of sensitive information that the research team observed included a Google Tag Manager ID. It’s not the first time Burger King has leaked sensitive data.

article thumbnail

Social Media Platform Fined 100,000 USD by Washington State AG for COPPA Violations

Hunton Privacy

users, allowed children under the age of 13 (“U13”) to create accounts, collected U13 users’ personal information, and allowed third-party advertisers to collect data from U13 users, all without obtaining COPPA-compliant verifiable parental consent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Popular Webkinz World online children’s game hacked, 23M credentials leaked

Security Affairs

ZDNet reported that a hacker has leaked 23 million credentials from the Webkinz World online children’s game. Each Webkinz toy has an attached tag with a unique “Secret Code” printed on it that allows you to play with your pet in the “ Webkinz World” website. . Pierluigi Paganini.

Passwords 108
article thumbnail

Give a Hoot! Don’t Pollute: Earth Day with Woodsy Owl

Unwritten Record

The musical film follows Woodsy Owl and his friend Mr. Music as they teach elementary school children how to recognize pollution problems and their solutions. His catchy tag line, “Give a hoot; don’t pollute!” Clip from 95-General-94, Help Woodsy Spread the Word. Woodsy Owl was created in 1971 by the U.S.

article thumbnail

Data privacy examples

IBM Big Data Hub

The price tag can add up quickly. Under the Children’s Online Privacy Protection Act (COPPA), organizations must obtain a parent’s permission before collecting and processing data from anyone under 13. Organizations face fines of up to USD 7,500 per violation.

article thumbnail

Real-life examples of social engineering

IT Governance

When we were children it’s likely that we played one parent off against the other to get our own way, telling each that the other had said we could do something we couldn’t – like have another packet of crisps. As he was in uniform and was wearing the company’s name tag, no one doubted him.

IT 81
article thumbnail

Shifting the Lens on WWI: Stories from the Home Front

Unwritten Record

I was surprised by the number of photos in NARA’s collection devoted to children’s activities on the home front. Children of all ages became active participants in the war effort, raising money for various wartime campaigns, making toys for refugee children abroad, and marching in parades. Add your own tags! .