ence of recording without consent, (3) study the lia-
bility of session recording companies for recordings
without consent, and (4) propose incentives to audit
data collection on websites.
ACKNOWLEDGEMENTS
This work was supported by the Brno University of
Technology grant Smart information technology for a
resilient society (FIT-S-23-8209).
REFERENCES
Aas, J., Barnes, R., Case, B., Durumeric, Z., Eckersley,
P., Flores-L
´
opez, A., Halderman, J. A., Hoffman-
Andrews, J., Kasten, J., Rescorla, E., Schoen, S., and
Warren, B. (2019). Let’s encrypt: An automated cer-
tificate authority to encrypt the entire web. In Pro-
ceedings of the 2019 ACM SIGSAC Conference on
Computer and Communications Security, CCS ’19,
page 2473–2487, New York, NY, USA. Association
for Computing Machinery.
Acar, G., Englehardt, S., and Narayanan, A. (2020). No
boundaries: data exfiltration by third parties embed-
ded on web pages. Proceedings on Privacy Enhancing
Technologies, 2020:220–238.
Bortz, A., Barth, A., and Czeskis, A. (2011). Origin cook-
ies: Session integrity for web applications. In Web 2.0
Security and Privacy (W2SP).
Brookman, J., Rouge, P., Alva, A., and Yeung, C. (2017).
Cross-device tracking: Measurement and disclosures.
volume 2017, pages 133–148.
Chatzimpyrros, M., Solomos, K., and Ioannidis, S. (2020).
You shall not register! detecting privacy leaks across
registration forms. In Computer Security, pages 91–
104, Cham. Springer International Publishing.
CJEU (2018). Case C-210/16: Unabh
¨
angiges Lan-
deszentrum f
¨
ur Datenschutz Schleswig-Holstein v.
Wirtschaftsakademie Schleswig-Holstein GmbH.
ECLI:EU:C:2018:388.
CJEU (2019a). Case C-40/17: Fashion ID GmbH
& Co. KG v. Verbraucherzentrale NRW eV.
ECLI:EU:C:2019:629.
CJEU (2019b). Case C-708/18: TK v. Asociat¸ia de Propri-
etari bloc M5A-ScaraA. ECLI:EU:C:2019:1064.
Dao, H. and Fukuda, K. (2021). Alternative to third-
party cookies: Investigating persistent pii leakage-
based web tracking. In Proceedings of the 17th Inter-
national Conference on Emerging Networking EXper-
iments and Technologies, CoNEXT ’21, pages 223—-
229, New York, NY, USA. Association for Computing
Machinery.
EDPB (2021). Guidelines 07/2020 on the concepts of con-
troller and processor in the GDPR. https://edpb.europ
a.eu/system/files/2021-07/eppb guidelines 202007 c
ontrollerprocessor final en.pdf, Version 2.1.
Filip, P. and
ˇ
Cegan, L. (2019). Comparing tools for web-
session recording and replaying. In 2019 International
Conference on Sustainable Information Engineering
and Technology (SIET), pages 257–260.
Fowler, A. (2013). Mozilla’s new Do Not Track dashboard:
Firefox users continue to seek out and enable DNT.
Available online at https://blog.mozilla.org/netpolicy
/2013/05/03/mozillas-new-do-not-track-dashboard-f
irefox-users-continue-to-seek-out-and-enable-dnt/.
Grodzinsky, F. S., Miller, K. W., and Wolf, M. J. (2022).
Session replay scripts: A privacy analysis. The Infor-
mation Society, 38(4):257–268.
Hils, M., Woods, D. W., , and B
¨
ohme, R. (2021). Privacy
preference signals: Past, present and future. Proceed-
ings on Privacy Enhancing Technologies, 2021:249–
269.
Kaur, K. and Singh, H. (2015). Analysis of website using
click analytics. International Journal of Science, En-
gineering and Computer Technology, 5(6):185.
Kontaxis, G. and Chew, M. (2015). Tracking protection
in firefox for privacy and performance. In Web 2.0
Security & Privacy Workshop.
Krishnamurthy, B. and Wills, C. (2011). Privacy leakage vs.
protection measures: the growing disconnect. In Pro-
ceedings of the Web 2.0 Security and Privacy Work-
shop.
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Ne-
uner, S., Schmiedecker, M., and Weippl, E. (2017).
Block me if you can: A large-scale study of tracker-
blocking tools. In 2017 IEEE European Symposium
on Security and Privacy (EuroS P), pages 319–333.
Selzer, A., Woods, D., and B
¨
ohme, R. (2021). Practition-
ers’ corner: An economic analysis of appropriateness
under Article 32 GDPR. European Data Protection
Law Review, 7(3).
Senol, A., Acar, G., Humbert, M., and Borgesius, F. Z.
(2022). Leaky forms: A study of email and pass-
word exfiltration before form submission. In 31th
USENIX Security Symposium (USENIX Security 22),
pages 1813–1830. USENIX Association.
Starov, O., Gill, P., and Nikiforakis, N. (2016). Are you
sure you want to contact us? Quantifying the leakage
of PII via website contact forms. volume 2016, pages
20–33.
W3C (2019). Tracking preference expression (DNT). The
World Wide Web Consortium (W3C), Tracking Pro-
tection Working Group, https://www.w3.org/TR/trac
king-dnt/.
WEBIST 2023 - 19th International Conference on Web Information Systems and Technologies
354