ISO/IEC 27566-1
ISO/IEC 27566-1 — Information security, cybersecurity and privacy protection — Age assurance systems — Part 1 — Framework
[DRAFT]
Abstract
ISO/IEC 27566 part 1 "establishes core principles, including privacy, for the purpose of enabling age related eligibility decisions, by setting out a framework for indicators of confidence about age or an age range of a natural person.”
[Source: ISO/IEC JTC 1/SC 27 Committee Doc 11, May 2025]
Introduction
This standard will lay out the core principles and a framework for determining someone’s age or age-range independently of their identity, for use in age-related eligibility decisions.
Scope
Age assurance framework
Structure
Main sections (in draft):
4: Overview
5: Functional characteristics (~functional requirements)
6: Performance characteristics (~assurance and metrics)
7: Privacy characteristics (~privacy requirements)
8: Security characteristics (~cybersecurity requirements)
9: Acceptability characteristics (~nondiscrimination requirements)
10: Practice statements (~documenting the arrangements)
Status
The standard development project set out in 2022.
Part 1 is at Final Draft International Standard stage and may be published this year or 2026, hopefully free of charge.
Commentary
Whereas self-assertion (e.g. “Click here if you are an adult”) is a simple and commonplace but clearly very weak control, the standard aims to standardise and where necessary strengthen the process of determining someone’s age or age-range without (necessarily) requiring them to disclose their identity and thereby risk compromising their privacy.
The cunning plan is to develop and incorporate appropriate assurance controls into the framework indicating confidence in the determined age or age-range, giving policy- and law-makers options when defining age-related criteria for various purposes. In situations where age is particularly important, additional confidence in the age determination is warranted, even if that implies completing a more involved and lengthy process of age verification, perhaps utilising a third party age-verification service or aggregating multiple age indicators taking account of any contraindications, inconsistencies or doubts. Conversely, if age verification is relatively unimportant, simpler, quicker, cruder approaches may suffice.
Spoofing (e.g. where an older person pretends or claims to be, and completes the age-verification process on behalf of, a youngster, or a child simply presents a fake credential) is just one of the challenges for this project. There are also identities, credentials, tokens and age-verification subsystems and services, plus individual rights and freedoms to protect (such as privacy and inclusivity), in a framework that allows communication and collaboration between age-verifiers.
