SECURITY

Cookie D'oh, I Scream

10/4/2012 3:10:04 PM

Most UK websites will fall foul of an EU directive on the use of cookies when it comes into force on 26 May, according to a report by KPMG - despite having a year’s notice.

The consultancy firm surveyed the sites of 55 major UK organizations and found 96% didn’t comply with the requirements.

Description: The ICO, responsible for enforcing the new rules, asks cookies on its own site (top). But how many users want browsing to be interrupted by these requests?

The ICO, responsible for enforcing the new rules, asks cookies on its own site (top). But how many users want browsing to be interrupted by these requests?

The EU directive on Privacy and Electronic Communications was implemented in a change to the Privacy and Electronic Communications Regulations that came into force on 26 May 2011. But the UK Government said it would take time for site owners to put the necessary ‘technical measures’ in place, and the Information Commissioner’s Office, which enforces the regulations, announced a 12-month ‘lead-in’ period. It stressed, though, that ‘organisation should be taking steps to ensure they can properly comply with the revised rules for cookies by May 2012’, after which those found to be in breach could be fined up to $775675.

The directive requires that before websites place cookies (small data files) on a user’s computer that pass information to third parties, they must first obtain explicit consent from the user. Of the websites surveyed by KPMG, only one of the 53 that used cookies asked users to opt in. Stephen Bonner, of KPMG’s Information Protection and Business Resilience team, said: ‘While the majority of the websites we analyses made a reference to the use of cookies... and some also state how the cookies are being used, this is not enough to ensure compliance.’

Bonner advised organisation to conduct an inventory of their websites and the cookies they use, evaluate their purpose and put together a plan, which should include adding consent requests to cookies related to logging in, registration and similar processes. Organisation should have a schedule for adding consent for other cookies, and should take legal advice on their obligations.

Description: The EU directive on Privacy and Electronic Communications was implemented in a change to the Privacy and Electronic Communications Regulations that came into force on 26 May 2011.

The EU directive on Privacy and Electronic Communications was implemented in a change to the Privacy and Electronic Communications Regulations that came into force on 26 May 2011.

Such use of cookies is widespread, and many in the industry doubt if the legislation is helpful. Copywriter Rachel McCombie, posting at SE Optimize, was ‘quite angry’ at ‘a pointless bit of bureaucracy that is disruptive to both users and webmasters’. But Jim Killock of the Open Rights Group pointed out that the purpose of cookies ‘has been extended to profile your movements around commercial sites purely to help advertisers’.

Although the directive will be enforced across the EU from 26 May, the Information Commissioner, Christopher Graham, said last year there would be no “wave of formal enforcement actions against those who are not yet compliant but are trying to get there.’ The key, then, is to be seen to be trying.

“I’m quite angry at a pointless bit of bureaucracy that is disruptive to users and webmasters’”

Other  
  •  More Malware Hits Macs By The Back Door
  •  The Hacked Man (Part 2) - Digital gold: passwords and mail addresses
  •  The Hacked Man (Part 1) - Facebook : Rummaging a digital rubbish bin
  •  Implementing Security in Windows 7 : Set the Junk E-mail Protection Level
  •  Implementing Security in Windows 7 : Delete Your Browsing History
  •  Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking
  •  Web Security : Attacking AJAX - Subverting AJAX with Injected XML, Subverting AJAX with Injected JSON
  •  .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
  •  .NET Security : Programming the Event Log Service (part 2) - Reading Event Logs, Writing Events
  •  .NET Security : Programming the Event Log Service (part 1) - Querying the Event Log System, Using Event Sources
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8