Feeds

Many sites cookie-track users regardless of opt-outs

Google's clean, though, say researchers

Next gen security for virtualised datacentres

More than 10 per cent of companies that promise not to track internet users' online activity for behavioural advertising purposes still do so, according to new research.

Publishers and advertising networks use cookies to track user behaviour on websites in order to target adverts to individuals based on that behaviour. A cookie is a small text file that websites store on users' computers to remember their activity on a site.

Researchers at Stanford Law School investigated whether companies belonging to a voluntary scheme run by the Network Advertising Initiative (NAI) actually complied with the rules they had signed up to.

The NAI encourages online businesses to voluntarily adopt a set of rules governing online behavioural advertising. Those rules force member companies to tell users that cookies they store about them could be used to serve behavioural ads. The rules also state that member companies must stop using the cookies to serve ads if asked to by users.

The researchers claimed that at least eight NAI members out of the 64 they investigated continued placing behavioural ad cookies on researchers' machines after being asked not to.

"At least eight NAI members promise to stop tracking after opting out, but nonetheless leave tracking cookies in place," Jonathan Mayer, one of the Stanford researchers, said in a blog.

Mayer said that the researchers had performed three tests of the NAI members' cookie promises. In some of the cases the companies did delete the cookies but the researchers found that they were restored after they revisited content on the website, Mayer said in his blog. In other cases some of companies deleted some cookies and not others, he said.

One of the eight firms, Vibrant Media, did not delete any of the tracking cookies when asked, the researchers claimed.

More than half of NAI members tested left tracking cookies in place after researchers had told websites they were opting out. Researchers said that NAI members only have to allow users to opt out of behavioural ad targeting and not tracking.

"Of the 64 companies we studied, 33 left tracking cookies in place after opting out," the researchers said.

At least 10 NAI members, including Google, delete tracking cookies as well as behavioural ad targeting, the researchers said.

See the Stanford researchers' blog here.

Copyright © 2011, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.