Feeds

W3C announces web-tracking privacy protection group

Google, Opera do not back Do Not Track

High performance access to file storage

The World Wide Web Consortium (W3C) has announced the creation of a Tracking Protection Working Group to address online privacy concerns, but the task of getting all the players to agree on what standards should be adopted could yet be a sticking point.

It said the group had ambitious plans to publish standards as early as mid-2012.

The first meeting of the collective takes place on 21-22 September.

"Our task here is to deliver a set of standards that enables individuals to express their preferences and choices about online tracking, and enables transparency concerning online tracking activities for users and the public alike," said the W3C in a blog post yesterday.

"Mechanisms that enable the enforcement of these preferences will be another important element of the work. At the same time, many business models on the web as we know it rely heavily on advertising revenue."

The group noted that data watchdogs in Europe and the US were asking online publishers and advertisers to agree on a so-called Do-Not-Track standard.

Microsoft and Mozilla have already been working on what some might consider to be "technical solutions" to the problem many netizens have with being tracked by ad outfits online.

The W3C said that Microsoft and Mozilla's proposals would provide the basis for the group's work.

However, as is so often the case with establishing standards industry-wide, not everyone agrees on the Do-Not-Track mechanism that's already available, for example, in Mozilla's Firefox 6 browser.

Google and Opera Software don't support DNT.

"A critical element of the group's success will be broad-based participation: we look forward to having browser vendors, search engines, advertising networks, regulators, civil society actors, and many other interested parties involved in the work that we'll do," said the W3C.

The Tracking Protection collective has taken on a pair of "industry-sponsored co-chairs" to lead the group.

It said that Aleecia M McDonald, who recently joined Mozilla as senior privacy researcher, had signed up to the task.

However, the other chair remains anonymous for now. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.