{"id":31628,"date":"2025-05-14T13:51:39","date_gmt":"2025-05-14T17:51:39","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=31628"},"modified":"2025-11-09T20:28:49","modified_gmt":"2025-11-10T01:28:49","slug":"canadian-childrens-privacy-code","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/canadian-childrens-privacy-code\/","title":{"rendered":"Promesses num\u00e9riques, pi\u00e8ges analogiques : Les risques et les avantages d'un code canadien de protection de la vie priv\u00e9e des enfants"},"content":{"rendered":"<style>.kb-row-layout-id31628_b8c8c3-7b > .kt-row-column-wrap{align-content:center;}:where(.kb-row-layout-id31628_b8c8c3-7b > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:center;}.kb-row-layout-id31628_b8c8c3-7b > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-none, 0rem );max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-lg, 3rem);padding-bottom:var(--global-kb-spacing-md, 2rem);grid-template-columns:minmax(0, calc(45% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)))minmax(0, calc(55% - ((var(--global-kb-gap-md, 2rem) * 1 )\/2)));}.kb-row-layout-id31628_b8c8c3-7b > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_b8c8c3-7b > .kt-row-column-wrap{row-gap:var(--global-kb-gap-lg, 4rem);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-right:30px;padding-bottom:80px;padding-left:30px;grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_b8c8c3-7b > .kt-row-column-wrap{padding-top:50px;padding-right:15px;padding-bottom:50px;padding-left:15px;grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_b8c8c3-7b alignfull has-theme-palette8-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-row-layout-equal kt-tab-layout-row kt-mobile-layout-row kt-row-valign-middle kb-theme-content-width\">\n<style>.kadence-column31628_6f9223-be > .kt-inside-inner-col{display:flex;}.kadence-column31628_6f9223-be > .kt-inside-inner-col,.kadence-column31628_6f9223-be > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_6f9223-be > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31628_6f9223-be > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column31628_6f9223-be{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31628_6f9223-be > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_6f9223-be{position:relative;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column31628_6f9223-be{align-self:center;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 1024px){.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 1024px){.kadence-column31628_6f9223-be, .kt-inside-inner-col > .kadence-column31628_6f9223-be:not(.specificity){margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column31628_6f9223-be{align-self:center;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;}.kadence-column31628_6f9223-be{text-align:left;}.kadence-column31628_6f9223-be > .kt-inside-inner-col{flex-direction:column;justify-content:center;align-items:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_6f9223-be inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89, .wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89[data-kb-block=\"kb-adv-heading31628_c53c9a-89\"]{font-weight:200;font-style:normal;font-family:var( --global-body-font-family, inherit );}.wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89[data-kb-block=\"kb-adv-heading31628_c53c9a-89\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_c53c9a-89[data-kb-block=\"kb-adv-heading31628_c53c9a-89\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_c53c9a-89 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading31628_c53c9a-89\"><em>By Claudiu Popa, for the KnowledgeFlow Cybersafety Foundation<\/em><br><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2, .wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2[data-kb-block=\"kb-adv-heading31628_86a950-d2\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2[data-kb-block=\"kb-adv-heading31628_86a950-d2\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_86a950-d2[data-kb-block=\"kb-adv-heading31628_86a950-d2\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_86a950-d2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_86a950-d2\">Canada\u2019s Office of the Privacy Commissioner has floated a bold idea: a Children\u2019s Privacy Code designed to rein in digital platforms and protect young users. It&#8217;s a hopeful concept reminiscent of the UK\u2019s Age Appropriate Design Code but in a country where meaningful enforcement has the consistency of a disappearing Snapchat, there\u2019s reason for both cautious optimism and grounded skepticism.<br><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a, .wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a[data-kb-block=\"kb-adv-heading31628_803159-2a\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a[data-kb-block=\"kb-adv-heading31628_803159-2a\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_803159-2a[data-kb-block=\"kb-adv-heading31628_803159-2a\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_803159-2a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_803159-2a\">Below, we explore what could go wrong, and right, from three critical perspectives: the enforcers, the families, and the stewards of public education.<br><\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column31628_d2f58c-ba > .kt-inside-inner-col{padding-top:10px;padding-right:10px;padding-bottom:10px;padding-left:10px;}.kadence-column31628_d2f58c-ba > .kt-inside-inner-col,.kadence-column31628_d2f58c-ba > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_d2f58c-ba > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_d2f58c-ba > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_d2f58c-ba > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_d2f58c-ba > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_d2f58c-ba{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_d2f58c-ba > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_d2f58c-ba > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_d2f58c-ba inner-column-1\"><div class=\"kt-inside-inner-col\"><style>.kb-image31628_d53d76-cd .kb-image-has-overlay:after{opacity:0.3;border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;}.kb-image31628_d53d76-cd img.kb-img, .kb-image31628_d53d76-cd .kb-img img{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image31628_d53d76-cd size-large kb-image-is-ratio-size\"><div class=\"kb-is-ratio-image kb-image-ratio-land32\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-1024x665.png\" alt=\"person writing a privacy code\" class=\"kb-img wp-image-31629\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-1024x665.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-300x195.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-768x498.png 768w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-18x12.png 18w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-600x389.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/figure>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id31628_3d5ef7-de > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31628_3d5ef7-de > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31628_3d5ef7-de > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31628_3d5ef7-de > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_3d5ef7-de > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_3d5ef7-de > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_3d5ef7-de alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31628_a7b668-0f > .kt-inside-inner-col,.kadence-column31628_a7b668-0f > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_a7b668-0f > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_a7b668-0f > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_a7b668-0f > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_a7b668-0f > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_a7b668-0f{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_a7b668-0f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_a7b668-0f > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_a7b668-0f\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10, .wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10[data-kb-block=\"kb-adv-heading31628_8e3285-10\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10[data-kb-block=\"kb-adv-heading31628_8e3285-10\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_8e3285-10[data-kb-block=\"kb-adv-heading31628_8e3285-10\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading31628_8e3285-10 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_8e3285-10\"><br><strong><strong><strong><strong>1. From the Perspective of Enforcers: The Watchdogs with No Teeth<\/strong><\/strong><\/strong><\/strong><\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa, .wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa[data-kb-block=\"kb-adv-heading31628_1b7b35-aa\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa[data-kb-block=\"kb-adv-heading31628_1b7b35-aa\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_1b7b35-aa[data-kb-block=\"kb-adv-heading31628_1b7b35-aa\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_1b7b35-aa wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_1b7b35-aa\">The greatest existential threat to the Children\u2019s Privacy Code is not the absence of good ideas it\u2019s the bureaucratic anemia of enforcement.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65, .wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65[data-kb-block=\"kb-adv-heading31628_fa93a1-65\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65[data-kb-block=\"kb-adv-heading31628_fa93a1-65\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_fa93a1-65[data-kb-block=\"kb-adv-heading31628_fa93a1-65\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_fa93a1-65 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_fa93a1-65\"><br><strong>Risks<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Limited Enforcement Power<\/strong>: The OPC\u2019s current inability to levy meaningful penalties under PIPEDA makes any new Code look like a papier-m\u00e2ch\u00e9 firewall. Without statutory backing like the proposed CPPA (Bill C-27), this Code risks being another well-intentioned suggestion that companies ignore with impunity.<\/li>\n\n\n\n<li><strong>Under-Resourced Oversight<\/strong>: Privacy regulators are often expected to police an entire digital economy with the budget of a middle school AV club. Enforcement that depends on reactive complaint mechanisms rather than proactive audits guarantees unequal protection. Privilege becomes privacy.<\/li>\n\n\n\n<li><strong>Jurisdictional Mismatch<\/strong>: Tech giants headquartered in California but serving kids in Calgary laugh in Canadian jurisdiction. Unless the Privacy Code has extraterritorial bite and international cooperation, it won\u2019t touch the worst offenders.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22, .wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22[data-kb-block=\"kb-adv-heading31628_1e2e69-22\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22[data-kb-block=\"kb-adv-heading31628_1e2e69-22\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_1e2e69-22[data-kb-block=\"kb-adv-heading31628_1e2e69-22\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_1e2e69-22 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_1e2e69-22\"><br><strong>Opportunities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Symbolic and Legal Precedent<\/strong>: Even in its advisory form, the Privacy Code can serve as a benchmark for civil suits, class actions, and legislative advocacy. It creates a language of accountability where silence previously reigned.<\/li>\n\n\n\n<li><strong>Public Pressure and Civil Society<\/strong>: Enforcement doesn\u2019t always mean fines. Naming and shaming violators (think: a \u201cPrivacy Naughty List\u201d) could rally parents, educators, and policymakers alike.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id31628_942fd1-fe > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31628_942fd1-fe > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31628_942fd1-fe > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31628_942fd1-fe > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_942fd1-fe > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_942fd1-fe > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_942fd1-fe alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col,.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_ef40fb-d5{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_ef40fb-d5 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_ef40fb-d5\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e, .wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e[data-kb-block=\"kb-adv-heading31628_b2dbe6-9e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e[data-kb-block=\"kb-adv-heading31628_b2dbe6-9e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_b2dbe6-9e[data-kb-block=\"kb-adv-heading31628_b2dbe6-9e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading31628_b2dbe6-9e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_b2dbe6-9e\"><br><strong><strong><strong>2. From the Perspective of Families and Children: Caught in the Data Dragnet<\/strong><\/strong><\/strong><\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc, .wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc[data-kb-block=\"kb-adv-heading31628_81f05b-fc\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc[data-kb-block=\"kb-adv-heading31628_81f05b-fc\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_81f05b-fc[data-kb-block=\"kb-adv-heading31628_81f05b-fc\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_81f05b-fc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_81f05b-fc\">For families, especially those with young children navigating online education, games, and social media, the risks aren\u2019t theoretical, they\u2019re home invasions by telemetry.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed, .wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed[data-kb-block=\"kb-adv-heading31628_a94449-ed\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed[data-kb-block=\"kb-adv-heading31628_a94449-ed\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_a94449-ed[data-kb-block=\"kb-adv-heading31628_a94449-ed\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_a94449-ed wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_a94449-ed\"><br><strong>Risks<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>False Sense of Security<\/strong>: A Code that appears protective without real enforcement could lull families into trusting platforms that continue to vacuum up children&#8217;s data for behavioral profiling, algorithmic manipulation, and future debt marketing.<\/li>\n\n\n\n<li><strong>Opaque Consent Mechanisms<\/strong>: Parents already struggle to understand privacy policies written like end-of-level bosses in a lawyer RPG. Adding age-verification popups and cookie banners without clear controls only increases \u201cconsent fatigue\u201d and undermines meaningful choice.<\/li>\n\n\n\n<li><strong>Digital Discrimination<\/strong>: Children from marginalized communities may face disproportionate impacts. AI-fueled risk scores, surveillance-based discipline tools, and location tracking in edtech deepen inequalities instead of narrowing them.<\/li>\n\n\n\n<li><strong>Emotional and Developmental Harms<\/strong>: Algorithmic recommendation engines are addictive by design. The monetization of attention turns children into commodities before they\u2019ve developed the critical thinking skills to recognize coercion.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1, .wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1[data-kb-block=\"kb-adv-heading31628_4d2f29-a1\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1[data-kb-block=\"kb-adv-heading31628_4d2f29-a1\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_4d2f29-a1[data-kb-block=\"kb-adv-heading31628_4d2f29-a1\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_4d2f29-a1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_4d2f29-a1\"><br><strong>Opportunities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Empowered Parenting Tools<\/strong>: If implemented correctly, the Privacy Code could demand dashboards, privacy settings, and tools that genuinely empower families to supervise without surveilling.<\/li>\n\n\n\n<li><strong>Baseline Expectations<\/strong>: Much like nutrition labels, the Privacy Code could set default protections and transparency that guide parental decisions, even among tech-savvy teens.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.kb-row-layout-id31628_c120ed-ae > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31628_c120ed-ae > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31628_c120ed-ae > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31628_c120ed-ae > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_c120ed-ae > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_c120ed-ae > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_c120ed-ae alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31628_377c3a-27 > .kt-inside-inner-col,.kadence-column31628_377c3a-27 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_377c3a-27 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_377c3a-27 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_377c3a-27 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_377c3a-27 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_377c3a-27{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_377c3a-27 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_377c3a-27 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_377c3a-27\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e, .wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e[data-kb-block=\"kb-adv-heading31628_c41d51-4e\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e[data-kb-block=\"kb-adv-heading31628_c41d51-4e\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_c41d51-4e[data-kb-block=\"kb-adv-heading31628_c41d51-4e\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading31628_c41d51-4e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_c41d51-4e\"><br><strong><strong>3. From the Perspective of Public Education Administrators: Between Compliance and Complicity<\/strong><\/strong><\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2, .wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2[data-kb-block=\"kb-adv-heading31628_5e13aa-b2\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2[data-kb-block=\"kb-adv-heading31628_5e13aa-b2\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_5e13aa-b2[data-kb-block=\"kb-adv-heading31628_5e13aa-b2\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_5e13aa-b2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_5e13aa-b2\">Canadian school boards are increasingly reliant on cloud services, mobile apps, and analytics dashboards. But they are neither developers nor watchdogs. They are often unwitting conduits of digital exploitation.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea, .wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea[data-kb-block=\"kb-adv-heading31628_e190ee-ea\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea[data-kb-block=\"kb-adv-heading31628_e190ee-ea\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_e190ee-ea[data-kb-block=\"kb-adv-heading31628_e190ee-ea\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_e190ee-ea wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_e190ee-ea\"><br><strong>Risks<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vendor Non-Compliance<\/strong>: Without strong procurement rules tied to the Privacy Code, school boards will continue to adopt platforms that are educational in name only. Edtech companies rarely provide full data transparency or deletion rights, and schools often don\u2019t ask.<\/li>\n\n\n\n<li><strong>IT Capacity Deficits<\/strong>: Privacy compliance can\u2019t be delegated to overburdened IT staff with no training or budget for data protection. Administrators need technical standards, audit templates, and policy frameworks not just vague \u201cguidance.\u201d<\/li>\n\n\n\n<li><strong>Conflicted Interests<\/strong>: When free services are monetized through student data, public education becomes an adtech Trojan horse. The conflict between pedagogical goals and commercial incentives is profound, and no school should be left to navigate it alone.<\/li>\n<\/ul>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54, .wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54[data-kb-block=\"kb-adv-heading31628_7fa0d3-54\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54[data-kb-block=\"kb-adv-heading31628_7fa0d3-54\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_7fa0d3-54[data-kb-block=\"kb-adv-heading31628_7fa0d3-54\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h5 class=\"kt-adv-heading31628_7fa0d3-54 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_7fa0d3-54\"><br><strong>Opportunities<\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Procurement with Purpose<\/strong>: The Privacy Code could act as a litmus test for responsible edtech, forcing vendors to provide plain-language disclosures and data protection assurances.<\/li>\n\n\n\n<li><strong>Professional Development<\/strong>: The initiative could include funding and curricula for privacy and digital literacy training, not only for students but for educators and administrators.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-31628_717de3-b7 .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-31628_717de3-b7 .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-31628_717de3-b7\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kb-row-layout-id31628_18c9c8-9f > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31628_18c9c8-9f > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31628_18c9c8-9f > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31628_18c9c8-9f > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_18c9c8-9f > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_18c9c8-9f > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_18c9c8-9f alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31628_5df54f-e6 > .kt-inside-inner-col,.kadence-column31628_5df54f-e6 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_5df54f-e6 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_5df54f-e6 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_5df54f-e6 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_5df54f-e6 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_5df54f-e6{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_5df54f-e6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_5df54f-e6 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_5df54f-e6\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89, .wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89[data-kb-block=\"kb-adv-heading31628_56fa9a-89\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89[data-kb-block=\"kb-adv-heading31628_56fa9a-89\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_56fa9a-89[data-kb-block=\"kb-adv-heading31628_56fa9a-89\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading31628_56fa9a-89 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_56fa9a-89\"><br><strong>What Must Canada Do to Get This Right?<\/strong><\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af, .wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af[data-kb-block=\"kb-adv-heading31628_144b30-af\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af[data-kb-block=\"kb-adv-heading31628_144b30-af\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_144b30-af[data-kb-block=\"kb-adv-heading31628_144b30-af\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_144b30-af wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_144b30-af\">This is not just a consultation, it\u2019s a stress test for our national will. To avoid building another Potemkin privacy framework, Canada must:<br><strong>Legislate Real Consequences<\/strong>: The Privacy Code must be tethered to enforceable legislation with meaningful penalties. Without CPPA, it\u2019s a speech without a mic.<br><strong>Centralize Oversight and Guidance<\/strong>: Schools and parents should not be left to interpret compliance in a vacuum. A national privacy clearinghouse for youth-focused tech is overdue.<br><strong>Mandate Privacy by Design<\/strong>: Every product marketed to children must be sandboxed, privacy-preserving by default, with opt-in only mechanisms for data sharing.<br><strong>Fund Independent Audits<\/strong>: Voluntary compliance should be subject to verification. If a company says it deletes children\u2019s data, they should prove it under penalty of law.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n<style>.wp-block-kadence-spacer.kt-block-spacer-31628_5c9f04-cc .kt-block-spacer{height:60px;}.wp-block-kadence-spacer.kt-block-spacer-31628_5c9f04-cc .kt-divider{border-top-width:1px;height:1px;border-top-color:#eee;width:80%;border-top-style:solid;}<\/style>\n<div class=\"wp-block-kadence-spacer aligncenter kt-block-spacer-31628_5c9f04-cc\"><div class=\"kt-block-spacer kt-block-spacer-halign-center\"><hr class=\"kt-divider\"\/><\/div><\/div>\n\n\n<style>.kb-row-layout-id31628_cac9df-f2 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id31628_cac9df-f2 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id31628_cac9df-f2 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);padding-top:var(--global-kb-spacing-sm, 1.5rem);padding-bottom:var(--global-kb-spacing-sm, 1.5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id31628_cac9df-f2 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){.kb-row-layout-id31628_cac9df-f2 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id31628_cac9df-f2 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id31628_cac9df-f2 alignnone wp-block-kadence-rowlayout\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top\">\n<style>.kadence-column31628_aad8d5-75 > .kt-inside-inner-col,.kadence-column31628_aad8d5-75 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column31628_aad8d5-75 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column31628_aad8d5-75 > .kt-inside-inner-col{flex-direction:column;}.kadence-column31628_aad8d5-75 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column31628_aad8d5-75 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column31628_aad8d5-75{position:relative;}@media all and (max-width: 1024px){.kadence-column31628_aad8d5-75 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column31628_aad8d5-75 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column31628_aad8d5-75\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90, .wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90[data-kb-block=\"kb-adv-heading31628_9625fb-90\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90[data-kb-block=\"kb-adv-heading31628_9625fb-90\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_9625fb-90[data-kb-block=\"kb-adv-heading31628_9625fb-90\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h3 class=\"kt-adv-heading31628_9625fb-90 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_9625fb-90\"><strong>Conclusion: Don\u2019t Let the Privacy Code Become a Cover<\/strong><\/h3>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee, .wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee[data-kb-block=\"kb-adv-heading31628_f34a38-ee\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee[data-kb-block=\"kb-adv-heading31628_f34a38-ee\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading31628_f34a38-ee[data-kb-block=\"kb-adv-heading31628_f34a38-ee\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading31628_f34a38-ee wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading31628_f34a38-ee\">The dream of a Children\u2019s Privacy Code is righteous. But without sharp tools, rigorous standards, and broad collaboration, it risks becoming just another marketing veneer for data-hungry platforms. Let\u2019s not mistake \u201cconsultation\u201d for completion. Canada has the opportunity to lead, not by following others, but by setting a higher bar.<br>If we truly believe in protecting children online, we must do more than whisper guidelines into the algorithm\u2019s ear. We must out-code, out-legislate, and outlast it.<\/p>\n<\/div><\/div>\n\n<\/div><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le Code de protection de la vie priv\u00e9e des enfants du Canada vise \u00e0 prot\u00e9ger les enfants en ligne. Claudiu Popa en explore les promesses - et les pi\u00e8ges - pour les r\u00e9gulateurs, les familles et les \u00e9coles.<\/p>","protected":false},"author":8,"featured_media":31629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[755],"class_list":["post-31628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-privacy-code"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":755,"label":"Privacy Code"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2025\/05\/2025-05-15-Claudiu-Digital-Promises-Blog-4-1024x665.png",1024,665,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":77,"filter":"raw","cat_ID":516,"category_count":77,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":755,"name":"Privacy Code","slug":"privacy-code","term_group":0,"term_taxonomy_id":755,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/31628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=31628"}],"version-history":[{"count":2,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/31628\/revisions"}],"predecessor-version":[{"id":31631,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/31628\/revisions\/31631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/31629"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=31628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=31628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=31628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}