skip to main content
10.1145/3463676.3485611acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper
Open Access

Cookie Banners, What's the Purpose?: Analyzing Cookie Banner Text Through a Legal Lens

Published:15 November 2021Publication History

ABSTRACT

A cookie banner pops up when a user visits a website for the first time, requesting consent to the use of cookies and other trackers for a variety of purposes. Unlike prior work that has focused on evaluating the user interface (UI) design of cookie banners, this paper presents an in-depth analysis of what cookie banners say to users to get their consent. We took an interdisciplinary approach to determiningwhat cookie banners should say. Following the legal requirements of the ePrivacy Directive (ePD) and the General Data Protection Regulation (GDPR), we manually annotated around 400 cookie banners presented on the most popular English-speaking websites visited by users residing in the EU. We focused on analyzing the purposes of cookie banners and how these purposes were expressed (e.g., any misleading or vague language, any use of jargon). We found that 89% of cookie banners violated applicable laws. In particular, 61% of banners violated the purpose specificity requirement by mentioning vague purposes, including "\emphuser experience enhancement ''. Further, 30% of banners used positive framing, breaching the freely given and informed consent requirements. Based on these findings, we provide recommendations that regulators can find useful. We also describe future research directions.

Skip Supplemental Material Section

Supplemental Material

WPES.mp4

mp4

100.7 MB

References

  1. Ruba Abu-Salma. 2020. Designing User-Centered Privacy-Enhancing Technologies. Ph.D. Dissertation. UCL (University College London).Google ScholarGoogle Scholar
  2. Ruba Abu-Salma and Benjamin Livshits. 2020. Evaluating the End-User Experience of Private Browsing Mode. In Proc. Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, et al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Computing Surveys (CSUR) 50, 3 (Aug 2017), 1--41. https://doi.org/10.1145/3054926Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice inWarningland: A Large- Scale Field Study of Browser Security Warning Effectiveness. In Proc. USENIX Security Symposium.Google ScholarGoogle Scholar
  5. Rami Al-Rfou. 2015. Polyglot Natural Language Processor. (2015). http://polyglot. readthedocs.org/.Google ScholarGoogle Scholar
  6. Article 29 Working Party. 2013. Opinion 03/2013 on Purpose Limitation (WP203). Technical Report.Google ScholarGoogle Scholar
  7. Article 29 Working Party. 2018. Guidelines on Consent under Regulation 2016/679 (WP259 rev.01). Technical Report. https://ec.europa.eu/newsroom/article29/itemdetail. cfm?item_id=623051.Google ScholarGoogle Scholar
  8. Autorité de Protection des Données (Data Protection Commission). 2020. Guidance on Cookies and Other Tracking Technologies. Technical Report. https: //www.autoriteprotectiondonnees.be/cookies.Google ScholarGoogle Scholar
  9. Jan M. Bauer, Regitze Bergstrøm, and Rune Foss-Madsen. 2021. Are You Sure, You Want A Cookie? -- The Effects of Choice Architecture on Users' Decisions About Sharing Private Online Data. (2021). https://doi.org/10.1016/j.chb.2021.106729Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ingolf Becker, Alice Hutchings, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Steven J Murdoch, M Angela Sasse, and Gianluca Stringhini. 2017. International Comparison of Bank Fraud Reimbursement: Customer Perceptions and Contractual Terms. Journal of Cybersecurity 3, 2 (2017), 109--125.Google ScholarGoogle ScholarCross RefCross Ref
  11. Omri Ben-Shahar and Carl E Schneider. 2011. The Failure of Mandated Disclosure. University of Pennsylvania Law Review (2011), 647--749.Google ScholarGoogle Scholar
  12. European Data Protection Board. 2018. EDPS Opinion 8/2018 on the Legislative Package "A New Deal for Consumers". (2018). https://edps.europa.eu/sites/edp/ files/publication/18--10-05_opinion_consumer_law_en.pdf.Google ScholarGoogle Scholar
  13. European Data Protection Board. 2020. Guidelines 05/2020 on Consent under Regulation 2016/679. Technical Report. https://edpb.europa.eu/sites/edpb/files/ files/file1/edpb_guidelines_202005_consent_en.pdf.Google ScholarGoogle Scholar
  14. European Data Protection Board. 2020. Guidelines 4/2019 on Article 25 Data Protection by Design and by Default. Technical Report. https://edpb.europa.eu/sites/default/files/files/file1/edpb_guidelines_201904_ dataprotection_by_design_and_by_default_v2.0_en.pdf.Google ScholarGoogle Scholar
  15. Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. "I am definitely manipulated, even when I am aware of it. It's ridiculous!" - Dark Patterns from the End-User Perspective. Proc. ACM Conference on Designing Interactive Systems (DIS) (2021). https://doi. org/10.1145/3461778.3462086Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. In Proc. Privacy Enhancing Technologies (PoPETs). 237--254.Google ScholarGoogle ScholarCross RefCross Ref
  17. David M. Boush, Marian Friestad, and Peter Wright. 2009. Deception in the Marketplace: The Psychology of Deceptive Persuasion and Consumer Self-Protection. Rouledge.Google ScholarGoogle Scholar
  18. Harry Brignull. 2010. Dark Patterns. (2010). https://www.darkpatterns.org.Google ScholarGoogle Scholar
  19. Régis Chatellier, Geoffrey Delcroix, Estelle Hary, and Camille Girard- Chanudet. 2019. Shaping Choices in the Digital World. (2019). https://linc.cnil.fr/sites/default/files/atoms/files/cnil_ip_report_06_shaping_ choices_in_the_digital_world.pdf.Google ScholarGoogle Scholar
  20. Commission Nationale de l'Informatique et des Libertés (French Data Protection Authority). 2019. Deliberation of the Restricted Committee SAN-2019-001 of 21 January 2019 Pronouncing a Financial Sanction against GOOGLE LLC. (2019). https://www.cnil.fr/sites/default/files/atoms/files/san-2019-001.pdf.Google ScholarGoogle Scholar
  21. Commission Nationale de l'Informatique et des Libertés. 2020. CNIL: Délibération de la Formation Restreinte n° SAN-2020-008 du 18 Novembre 2020 Concernant la Société. (2020). https://www.legifrance.gouv.fr/cnil/id/CNILTEXT000042563756.Google ScholarGoogle Scholar
  22. Commission Nationale de l'Informatique et des Libertés (French Data Protection Authority). 2020. Deliberation of the Restricted Committee n° SAN-2020-013 of 7 December 2020 Concerning AMAZON EUROPE CORE. (2020). https://www. cnil.fr/sites/default/files/atoms/files/deliberation_of_restricted_committee_ san-2020-013_of_7_december_2020_concerning_amazon_europe_core.pdf.Google ScholarGoogle Scholar
  23. Commission Nationale de l'Informatique et des Libertés (French Data Protection Authority). 2020. On the Practical Procedures for Collecting the Consent Provided for in Article 82 of the French Data Protection Act, Concerning Operations of Storing or Gaining Access to Information in the Terminal Equipment of a User (Recommendation "Cookies and Other trackers"). (2020). https://www.cnil.fr/sites/default/files/atoms/files/draft_recommendation_ cookies_and_other_trackers_en.pdf.Google ScholarGoogle Scholar
  24. Agencia Española de Protección de Datos. 2020. Guía Sobre El Uso De Las Cookies. Technical Report. https://www.aepd.es/sites/default/files/2020-07/guia-cookies. pdfGoogle ScholarGoogle Scholar
  25. Rachna Dhamija, J. Doug Tygar, and Marti Hearst. 2006. Why Phishing Works. In Proc. Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Serge Egelman, Lorrie Faith Cranor, and Jason Hong. 2008. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proc. Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Serge Egelman and Stuart Schechter. 2013. The Importance of Being Earnest [In Security Warnings]. In Proc. Conference on Financial Cryptography and Data Security.Google ScholarGoogle ScholarCross RefCross Ref
  28. Steven Englehardt, Chris Eubank, Peter Zimmerman, Dillon Reisman, and Arvind Narayanan. 2015. OpenWPM: An Automated Platform for Web Privacy Measurement. Manuscript. March (2015).Google ScholarGoogle Scholar
  29. ePD-09 2009. Directive 2009/136/EC of the European Parliament and of the Council. (2009). https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L: 2009:337:0011:0036:En:PDF.Google ScholarGoogle Scholar
  30. Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, and Jeff Grimes. 2015. Improving SSL Warnings: Comprehension and Adherence. In Proc. Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Adrienne Porter Felt, RobertW. Reeder, Hazim Almuhimedi, and Sunny Consolvo. 2014. Experimenting At Scale With Google Chrome's SSL Warning. In Proc. Conference on Human Factors in Computing Systems (CHI).Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Hamburg Commissioner for Data Protection and Freedom of Information. 2021. Cross-Border Check: Consents to Websites of Media Companies Are Mostly Ineffective - Improvements Are Required. Technical Report. https://datenschutzhamburg. de/pressemitteilungen/2021/06/2021-06--30-medienwebsites.Google ScholarGoogle Scholar
  33. Imane Fouad, Cristiana Santos, Feras Al Kassar, Nataliia Bielova, and Stefano Calzavara. 2020. On Compliance of Cookie Purposes with the Purpose Specification Principle. In Proc. International Workshop on Privacy Engineering (IWPE). https://hal.inria.fr/hal-02567022.Google ScholarGoogle ScholarCross RefCross Ref
  34. Frobrukerrådet. 2018. Deceived by Design: How Tech Companies Use Dark Patterns to Discourage Us from Exercising Our Rights to Privacy. (2018). https://www.forbrukerradet.no/undersokelse/no-undersokelsekategori/ deceived-by-design.Google ScholarGoogle Scholar
  35. GDPR 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/ec (General Data Protection Regulation). (2016). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32016R0679.Google ScholarGoogle Scholar
  36. Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. In Proc. Conference on Human Factors in Computing Systems (CHI). Article 534, 14 pages.Google ScholarGoogle Scholar
  37. Colin M. Gray, Cristiana Santos, Nataliia Bielova, Michael Toth, and Damian Clifford. 2021. Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective. In Proc. Conference on Human Factors in Computing Systems (CHI). Article 172, 1--18 pages. https://doi.org/10.1145/3411764. 3445779Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Paul Graßl, Hanna Schraffenberger, Frederik Zuiderveen Borgesius, and Moniek Buijzen. 2021. Dark and Bright Patterns in Cookie Consent Requests. Journal of Digital Social Research 3, 1 (Feb 2021), 1--38. https://doi.org/10.33621/jdsr.v3i1.54Google ScholarGoogle ScholarCross RefCross Ref
  39. Philip Hausner and Michael Gertz. 2021. Dark Patterns in the Interaction with Cookie Banners. In Proc. CHI Workshop on "What Can CHI Do About Dark Patterns?".Google ScholarGoogle Scholar
  40. Hellenic Data Protection Authority (HDPA). 2020. Recommendations on Controllers' Compliance with the Specific Legislation on Electronic Communications. Technical Report. [English translation by Katerina Tassi] https://iapp.org/media/ pdf/resource_center/Greek_DPA_Cookie_Guidance_IAPP.pdf.Google ScholarGoogle Scholar
  41. Georgios Kampanos and Siamak F. Shahandashti. 2021. Accept All: The Landscape of Cookie Banners in Greece and the UK. (2021). arXiv:cs.CR/2104.05750Google ScholarGoogle Scholar
  42. Farzaneh Karegar, John Sören Pettersson, and Simone Fischer-Hübner. 2020. The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. ACM Trans. Priv. Secur. 23, Article 5 (2020).Google ScholarGoogle Scholar
  43. Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy'ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Proc. Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle ScholarCross RefCross Ref
  44. Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan R. Mayer, Marshini Chetty, and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K ShoppingWebsites. Proc. ACM on Human-Computer Interaction.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Célestin Matte, Cristiana Santos, and Nataliia Bielova. 2020. Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework. In Proc. IEEE Symposium on Security and Privacy. 791--809.Google ScholarGoogle ScholarCross RefCross Ref
  46. Célestin Matte, Cristiana Santos, and Nataliia Bielova. 2020. Purposes in IAB Europe's TCF: Which Legal Basis and How Are They Used by Advertisers?. In Annual Privacy Forum (APF) (Lecture Notes in Computer Science). https: //hal.inria.fr/hal-02566891.Google ScholarGoogle Scholar
  47. Aleecia M. McDonald and Lorrie Faith Cranor. 2009. The Cost of Reading Privacy Policies. Journal of Law and Policy for the Information Society (2009).Google ScholarGoogle Scholar
  48. Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross Anderson, Nicholas Bohm, Alice Hutchings, M Angela Sasse, and Gianluca Stringhini. 2016. Are Payment Card Contracts Unfair?. In Proc. International Conference on Financial Cryptography and Data Security. Springer, 600--608.Google ScholarGoogle Scholar
  49. Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns After the GDPR: Scraping Consent Pop-ups and Demonstrating Their Influence. In Proc. Conference on Human Factors in Computing Systems (CHI). 1--13. https://doi.org/10.1145/3313831.3376321Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Court of Justice of the European Union. 2019. Judgment in Case C-673/17 Bundesverband der Verbraucherzentralen und Verbraucherverbände -- Verbraucherzentrale Bundesverband eV v Planet49 GmbH. (2019). http://curia. europa.eu/juris/documents.jsf?num=C-673/17.Google ScholarGoogle Scholar
  51. Information Commissioner's Office. 2019. Guidance on the Use of Cookies and Similar Technologies. Technical Report. https://ico.org.uk/media/fororganisations/ guide-to-pecr/guidance-on-the-use-of-cookies-and-similartechnologies- 1-0.pdf.Google ScholarGoogle Scholar
  52. Office of the Data Protection Ombudsman. 2019. Guidelines on Confidential Communications. Technical Report. https://www.kyberturvallisuuskeskus.fi/en/ our-activities/regulation-and-supervision/confidential-communications.Google ScholarGoogle Scholar
  53. Article 29 Data Protection Working Party. 2013. Working Document 02/2013 Providing Guidance on Obtaining Consent for Cookies. Technical Report. https://ec.europa.eu/justice/article-29/documentation/opinionrecommendation/ files/2013/wp208_en.pdf.Google ScholarGoogle Scholar
  54. Article 29Working Party. 2012. Opinion 04/2012 on Cookie Consent Exemption (WP 194). Technical Report. https://ec.europa.eu/justice/article-29/documentation/ opinion-recommendation/files/2012/wp194_en.pdf.Google ScholarGoogle Scholar
  55. Article 29 Working Party. 2018. Guidelines on Transparency Under Regulation 2016/679 (WP260). Technical Report.Google ScholarGoogle Scholar
  56. Garante per la Protezione Dei Dati Personali. 2020. Provvedimento Correttivo e Sanzionatorio nei Confronti di Tim S.p.A. [9256486]. (2020). https://www.garanteprivacy.it/web/guest/home/docweb/-/docwebdisplay/ docweb/9256486?Google ScholarGoogle Scholar
  57. Irene Pollach. 2005. A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. Journal of Business Ethics 62, 3 (2005), 221.Google ScholarGoogle ScholarCross RefCross Ref
  58. Elissa M. Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L. Mazurek. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In Proc. USENIX Security Symposium. 89--108.Google ScholarGoogle Scholar
  59. Joel R. Reidenberg, Jaspreet Bhatia, Travis D. Breaux, and Thomas B. Norton. 2016. Ambiguity in Privacy Policies and the Impact of Regulation. Journal of Legal Studies 45, 2 Supplement (2016), S163--S190.Google ScholarGoogle Scholar
  60. Nancy Richter, Paul Jackson, and Thomas Schildhauer. 2018. Entrepreneurial Innovation and Leadership: Preparing for a Digital Future. Springer.Google ScholarGoogle Scholar
  61. Arianna Rossi, Rossana Ducato, Helena Haapio, and Stefania Passera. 2019. When Design Met Law: Design Patterns for Information Transparency. Droit de la Consommation = Consumenterecht: DCCR 122--123 (2019), 79--121.Google ScholarGoogle Scholar
  62. Cristiana Santos, Nataliia Bielova, and Célestin Matte. 2020. Are Cookie Banners Indeed Compliant with the Law? Deciphering EU Legal Requirements on Consent and Technical Means to Verify Compliance of Cookie Banners. Technology and Regulation (2020), 91--135. https://doi.org/10.26116/techreg.2020.009Google ScholarGoogle Scholar
  63. Cristiana Santos, Aldo Gangemi, and Mehwish Alam. 2017. Detecting and Editing Privacy Policy Pitfalls on the Web. In Proc. Workshop on Technologies for Regulatory Compliance.Google ScholarGoogle Scholar
  64. Selenium. 2020. Selenium Browser Automation Tool. (2020). https://www. selenium.dev/.Google ScholarGoogle Scholar
  65. Daniel J. Solove. 2013. Privacy Self-management and the Consent Dilemma. Harward Law Review 126, 1880 (2013).Google ScholarGoogle Scholar
  66. Andreas Sotirakopoulos, Kirstie Hawkey, and Konstantin Beznosov. 2011. On the Challenges in Usable Security Lab Studies: Lessons Learned From Replicating a Study on SSL Warnings. In Proc. Symposium On Usable Privacy and Security (SOUPS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Joanna Strycharz, Edith Smit, Natali Helberger, and Guda van Noort. 2021. No to Cookies: Empowering Impact of Technical and Legal Knowledge on Rejecting Tracking Cookies. Computers in Human Behavior 120 (2021), 106750. https: //doi.org/10.1016/j.chb.2021.106750Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proc. USENIX Security Symposium.Google ScholarGoogle Scholar
  69. Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research (2011).Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Joseph Turow, Michael Hennessy, and Nora Draper. 2018. Persistent Misperceptions: Americans' Misplaced Confidence in Privacy Policies, 2003--2015. Journal of Broadcasting & Electronic Media 62, 3 (2018), 461--478. https://doi.org/10.1080/ 08838151.2018.1451867Google ScholarGoogle ScholarCross RefCross Ref
  71. Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)informed Consent: Studying GDPR Consent Notices in the Field. In Proc. Conference on Computer and Communications Security (CCS).Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Shomir Wilson, Florian Schaub, Rohan Ramanath, Norman Sadeh, Fei Liu, Noah A. Smith, and Frederick Liu. 2016. Crowdsourcing Annotations forWebsites' Privacy Policies: Can It Really Work?. In Proc. World Wide Web Conference (WWW).Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cookie Banners, What's the Purpose?: Analyzing Cookie Banner Text Through a Legal Lens

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader