Feeds

EU agency calls for clear consent on indelible and zombie cookies

Don't just go shoving them down people's throats

Boost IT visibility and business value

New, more persistent cookies pose an increasing risk to the privacy of consumers online, according to an EU security agency report released on Friday.

The advertising industry is pushing the adoption of new, more "persistent and powerful cookies" which profile users, often without users' awareness about what's happening.

Surfers should only be offered these cookies under a system of informed consent, according to ENISA (the European Network and Information Security Agency), which is calling on the industry to explain what it is doing and make it easier to delete unwanted advertising cookies.

Cookies were initially used to manage browser-server interaction but this role has been expanded over time to include advertising management, profiling and tracking. Most of the developments were driven by the advertising industry.

The new cookies support persistent user-identification. How this technology is being applied is less than clear, especially to users, so it is therefore hard to quantify privacy and security implications that arise from their use.

ENISA wants the industry to move towards informed consent so that, for example, the utility and the data stored in cookies is clear to users.

Surfers should be given the ability to either manage or remove cookies as they see fit, it says. The EU security agency also wants cookies to be stored within browser control, a reference to Flash-type so-called zombie cookies that stay on a system even if a user clears their browser history and cache.

Finally, surfers should be given secondary mechanisms to access web services if they choose not to accept cookies from a website, it says.

Professor Udo Helmbrecht, executive director of ENISA, said: ”Much work is needed to make these next-generation cookies as transparent and user-controlled as regular HTTP cookies, so as to safeguard the privacy and security aspects of consumers and business alike.”

The EU has put forward a directive that partly covers the use of cookies (Directive 2009/136/EC) and set a timetable for this to be incorporated into the national law of member states by 25 May. The rules emphasise the need for clear consent from a user, underpinned by clear up-front explanations, before cookies are installed on a user's machine. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Sin COS to tan Windows? Chinese operating system to debut in autumn – report
Development alliance working on desktop, mobe software
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
(Not so) Instagram now: Time-shifting Hyperlapse iPhone tool unleashed
Photos app now able to shoot fast-moving videos
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.