Privacy Requirements in Toy Computing

This chapter outlines the privacy requirements for a toy computing environment. The unique architecture of toy computing requires consideration of several different factors. In this chapter we investigate the privacy requirements through formal threat modeling techniques to help the reader to get more comfortable with the toy computing architecture and how it maps to privacy threats. Next, we identify privacy requirements at legislative level, identifying privacy laws and regulations which apply to this context. The toy industry has also issued regulations for toy safety; however these regulations have no mention of privacy. While parents aim to protect the privacy of their children, we investigate the unique requirements of end users. Lastly, a demo is presented as an interface for parents to configure privacy settings for their children using mobile toy computing apps.