Feeds

FTC sanctions behavioural ads firm over deceptive 'opt-outs'

Sing a new song, Chiquitita Chitika

Reducing security risks from open source software

The FTC has settled a complaint with a behavioural advertising firm alleged to have misled consumers into believing they had opted out of its services.

Chitika uses cookies to track surfers' actions on the web as well as the searches they make in order to serve them with ads that more closely match their perceived interests. The firm's privacy policy states that it allows web users to opt out of receiving cookies or receiving targeted ads.

However, according to the FTC complaint, from at least May 2008 until February 2010, users who went to the trouble of going to Chitika's website and opting out were only excluded for 10 days. After that time, Chitika would begin using cookies to serve them with targeted ads all over again, contrary to their clearly expressed preference.

The FTC launched a complaint against Chitika on the basis of its investigation, arguing its "opt-out mechanism was deceptive and violated federal law". Chitika has agreed to settle this complaint, on a no-fault basis, with a promise that it will provide a much clearer opt-out mechanism that it will honour for at least five years. The firm also agreed to get rid of user information harvested during the period of its previously ineffective opt-out as well as refraining from making statements on its privacy policies that might be construed as misleading.

Breaches to the agreement, which strengthens the FTC's hand in case any further legal action is needed, are liable to lead to fines of $16,000 per incident, as explained in an FTC statement on the settlement.

Chitika claims to serve 3 billion page impressions every month from 100,000 websites. ®

Bootnote

Chitika, means “snap of the fingers” in Telugu (a South Indian language). So, slightly disappointingly, the name of the firm is not a tribute to the similarly sounding song Chiquitita, by 70s Swedish pop legends ABBA.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.