- Privacy |
- Fair Info Practices
- 4th Amendment
- - ECPA
- - FISA
- - Patriot Act
- - Expectation
- - Cybersecurity
- - Anonymity
- - ID Theft
- - Spyware
- - Children's Privacy
- - COPPA
- - Cookies
- - Social Networks
- - Advertising
- - Online Profiling
- - Privacy Policies
- - Enforcement
- - CPNI
- - Cable
- - CALEA
Dept of Commerce
- - NTIA
- - NIST
- - EU Safe Harbors
- The Feds
- - Pri.Protection Act
- - Privacy Act
- - Pri. Impact Statements
- - Info Law
- - The Press
- - Location Based Services
Derived From: - Know the Rules Use the Tools, Privacy in the Digital Age: A Resource for Internet Users, US Senate Judiciary Committee, p. 4-5 (n.d.)
"Many consumers have the mistaken impression that their conduct on the Internet is anonymous. This is often not the case. Many websites utilize various technologies, such as “cookies,” to collect information from consumers as they visit the website. “Cookies” are electronic tags that are placed on the hard drive of an individual user’s computer by Internet sites while the individual is on the Internet. Cookies can store information about the individual user, such as the user’s name, credit card numbers, websites visited, e-mail addresses, personal preferences or spending patterns. Although, this information generally is collected and stored (on the hard drive in a cookie file), and is used benignly to personalize a consumer’s visit to a website, it is often collected without the knowledge or consent of the user. Once a cookie is in place, the user’s Internet browser checks every time the user visits a particular site to see if there are any cookies for that site. If there are, the browser sends the cookie information to the site. The Cookie Central website provides a brief outline of the different ways companies utilize cookie technology:
- Targeted Marketing: Cookies allow sites to build a profile on where individuals go while on the Internet, the advertisements they click on, and their primary interests, and then target specific advertisements to particular consumers based on the profile.
- Website Tracking: Using cookies allows sites to track where consumers go while on the web, enables them to count accurately how many people have visited a site (distinguishing between 25 individuals and one person hitting the reload button), and lets sites see which users may have left the site because there were no interesting links.
- Online Ordering Systems: Known as “shopping baskets,” some cookies store information on individual buying preferences. When a consumer enters a site and spends time selecting items but exits abruptly without ordering, the items selected will be stored in cookies for weeks or even years.
- Site Personalization: Cookies also are used to customize websites, such as news sites, for the user. These cookies allow a user to select articles in subject areas of interest, such as news or sports.
See also Network Neutrality Deep Packet Inspection
"In addition to these widely used and often beneficial applications of cookie technology, other uses are conceivable and have been reported. For example, cookie technology could track and enable the sale of information regarding an individual’s Internet research on sensitive matters, such as a medical condition. The World Wide Web Consortium has explained:
Cookies cannot be used to “steal” information about you or your computer system. They can only be used to store information that you have provided at some point. To give a benign example, if you fill out a form giving your favorite color, a server can turn this information into a cookie and send it to your browser. The next time you contact the site, your browser will return the cookie, allowing the server to alter background color of its pages to suit your preferences.
However cookies can be used for more controversial purposes. Each access your browser makes to a website leaves some information about you behind, creating a gossamer trail across the Internet. Among the tidbits of data left along this trail are the name and IP address of your computer, the brand of browser you’re using, the operating system you’re running, the URL of the Web page you accessed, and the URL of the page you were last viewing. Without cookies, it would be nearly impossible for anyone to follow this trail systematically to learn much about your web browsing habits. They would have to reconstruct your path by correlating hundreds or thousands of individual server logs. With cookies, the situation changes considerably.
- FCC SETTLES VERIZON "SUPERCOOKIE" PROBE, REQUIRES CONSUMER OPT-IN FOR THIRD PARTIES. Verizon Wireless to Obtain Affirmative Consent from Consumers Before Sending Unique Identifier Headers to Third Parties. EB https://apps.fcc.gov/edocs_public/attachmatch/DOC-338091A1.docx https://apps.fcc.gov/edocs_public/attachmatch/DOC-338091A1.pdf
- DoubleClick Inc. Privacy Litigation, 154 F. Supp. 2d 497 (S.D.N.Y 2001) ("held that using cookies to gather information for behavioral advertisements did not violate U.S. privacy law" ECPA, Wiretap Act, CFAA).
- Know the Rules Use the Tools, Privacy in the Digital Age: A Resource for Internet Users, US Senate Judiciary Committee, p. 11-12 (n.d.
- SOLTANI , A., C ANTY , S., M AYO , Q., T HOMAS , L., AND H OOFNAGLE , C. J. Flash cookies and privacy, August 11 2009.
© Cybertelecom ::
- Privacy Lawsuit Targets Net Giants Over 'Zombie' Cookies, Wired 7/28/2010
- Privacy lawsuit targets 'Net giants over "zombie" cookies, Ars Technica 7/28/2010
- You Deleted Your Cookies? Think Again, Wired 8/11/2009