Feeds

Web Bugs – Here Are the Rules

AKA web 'beacons'

  • alert
  • submit to reddit

Remote control for virtualized desktops

ComputerWire: IT Industry Intelligence
The Network Advertising Initiative

, which comprises some of the internet's leading advertising and ad technology companies, yesterday said it has finalized a set of best practices for the use of web bugs.

Web bugs, aka web beacons, are single-pixel GIF image tags in HTML documents used to track web users. The invisible bugs allow the page owner to measure user activity based on image server logs.

The NAI rules, which represent the industry's attempt to self-regulate, ask companies using these techniques to provide a notice of web bug use that says what the bugs are used for and what data is transferred to third parties.

If the bug can be tied to personal data, such as via a cookie or an email address, and it will be disclosed to third parties, then there needs to be an opt-out for the user, but only when the disclosure is for purposes "unrelated" to the reason the data was collected.

Companies included in the development of the guidelines include IBM, Microsoft, the US Postal Service, DoubleClick, WebSideStory, Advertising.com, 24/7 RealMedia, Coremetrics, KeyLime Software and Guardent.

© ComputerWire

Spot the Web bug on The Register!

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.