A Privacy by Design Framework for Large Language Model-Based Applications for Children

📅 2026-02-19
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses the significant privacy risks children face when using large language model (LLM) applications, exacerbated by the absence of actionable design guidance in existing regulations. To bridge this gap, the work proposes the first comprehensive privacy-by-design framework that systematically integrates key privacy laws—including GDPR, COPPA, and PIPEDA—with children’s rights standards from the UNCRC and the Age Appropriate Design Code (AADC). The framework spans the entire LLM application lifecycle, embedding compliance and child-friendly mechanisms across data collection, model training, runtime monitoring, and ongoing validation. It synergistically combines privacy-enhancing technologies, organizational controls, and age-appropriate interaction design. Validation through an educational tutoring application demonstrates that the framework effectively mitigates privacy risks while ensuring regulatory compliance and robust protection of children’s digital rights.

Technology Category

Application Category

📝 Abstract
Children are increasingly using technologies powered by Artificial Intelligence (AI). However, there are growing concerns about privacy risks, particularly for children. Although existing privacy regulations require companies and organizations to implement protections, doing so can be challenging in practice. To address this challenge, this article proposes a framework based on Privacy-by-Design (PbD), which guides designers and developers to take on a proactive and risk-averse approach to technology design. Our framework includes principles from several privacy regulations, such as the General Data Protection Regulation (GDPR) from the European Union, the Personal Information Protection and Electronic Documents Act (PIPEDA) from Canada, and the Children's Online Privacy Protection Act (COPPA) from the United States. We map these principles to various stages of applications that use Large Language Models (LLMs), including data collection, model training, operational monitoring, and ongoing validation. For each stage, we discuss the operational controls found in the recent academic literature to help AI service providers and developers reduce privacy risks while meeting legal standards. In addition, the framework includes design guidelines for children, drawing from the United Nations Convention on the Rights of the Child (UNCRC), the UK's Age-Appropriate Design Code (AADC), and recent academic research. To demonstrate how this framework can be applied in practice, we present a case study of an LLM-based educational tutor for children under 13. Through our analysis and the case study, we show that by using data protection strategies such as technical and organizational controls and making age-appropriate design decisions throughout the LLM life cycle, we can support the development of AI applications for children that provide privacy protections and comply with legal requirements.
Problem

Research questions and friction points this paper is trying to address.

privacy risks
children
large language models
AI applications
regulatory compliance
Innovation

Methods, ideas, or system contributions that make the work stand out.

Privacy by Design
Large Language Models
Children's Privacy
Regulatory Compliance
Age-Appropriate Design
🔎 Similar Papers
No similar papers found.
D
Diana Addae
Systems and Computer Engineering, Carleton University, Ottawa, Canada
D
Diana Rogachova
School of Information Technology, Carleton University, Ottawa, Canada
Nafiseh Kahani
Nafiseh Kahani
Carleton University
AI-based System TestingFormal VerificationTrustworthy AI
Masoud Barati
Masoud Barati
PhD in Computer Science, SMIEEE | Assistant Professor, Carleton University
CybersecurityBlockchainDistributed systemsGenerative AIService integration
M
Michael Christensen
Department of Law and Legal Studies, Carleton University, Ottawa, Canada
Chen Zhou
Chen Zhou
School of Electronic Information, Wuhan University
Complex NetworksData MiningHuman DynamicsWireless Communication