Securiti+Veeam Will Accelerate Safe Enterprise Al at Scale

View

What To Know About New York State Attorney General Website Privacy Controls

Contributors

Anas Baig

Product Marketing Manager at Securiti

Muhammad Ismail

Assoc. Data Privacy Analyst at Securiti

Sadaf Ayub Choudary

Data Privacy Analyst at Securiti

CIPP/US

Published November 19, 2024

Listen to the content

Internet users are now more diligent and aware of how their data is collected and used online than ever before. They expect clarity and transparency from the websites they visit. Global regulatory developments within the data privacy space will further increase these expectations.

In such a world, websites must ensure they have appropriate privacy controls and disclosures in place that are not only easily accessible but also understandable by the users visiting their website to provide them a clear idea of how a website plans on collecting, storing, using, sharing, and potentially selling their data.

New York's Office of the Attorney General (OAG) has recently published a resource meant to be a guide on website privacy controls that it hopes can serve as a comprehensive framework for businesses operating within New York. The guidelines offer not just actionable information for effective privacy controls but also potential mistakes websites may be committing and their own observations about businesses' data collection practices. Read on to learn more.

OAG's Findings

The OAG's findings focused on various on-page practices by various businesses on their websites.

The most important of these findings were related to tags. These tags are snippets of code inserted in the webpage that redirect a visitor's browser to connect to a third-party service. The third-party replies with a unique identifier that the visitor's browser saves in a cookie, allowing the user to be identified during future browsing sessions. Hence, most websites use these tags to track user activity on their site.

The OAG's investigation analyzed various third-party tags on several websites. At least 13 major websites had privacy controls that were not operating as they claimed to. These 13 sites had almost 75 million visitors in March 2024 alone, highlighting the sheer scale of potential data privacy violations.

These potential violations include tags remaining active even after users had disabled them via the privacy control, leading to user activity being monitored when it should not have been.

However, after the OAG alerted them, each of the 13 websites amended its practices and mitigated the potential violations.

Key Mistakes to Avoid

Some key mistakes the OAG's investigation found and that require corrective actions include the following:

Uncategorized/Miscategorized Tags & Cookies

Most websites use consent management tools to implement privacy controls. These tools allow users to turn off and on categories of tags and cookies depending on their unique needs and the tags' purposes. For example, users can choose to disable tags related to marketing but enable tags used for fraud detection and analytics.

However, the effectiveness of such tools relies entirely on the tags being appropriately categorized within the tool. If a tag is miscategorized or not categorized at all, it will not respond to the choices being made. For example, the user may make a decision to disable a tag and it may remain active.

Misconfigured Tools

Many websites use consent management tools and tag management tools to simplify tag management. However, using these tools together may often cause more problems than they solve, as they can lead to technical and operational complexities if not properly configured to integrate seamlessly.

The guide illustrates examples of this by pointing out that the consent management tool might not pass out proper opt-out signals to the tag management tool, leading to marketing cookies still being active when the user had explicitly asked for them to be disabled.

Cookieless Tracking

Websites often use tracking technologies beyond third-party cookies, such as directly passing visitor data to advertisers without cookies or consent tools. Regardless of the method, businesses must not mislead consumers about privacy or choice. Privacy controls should honor visitors’ choices across all tracking technologies, ensuring consistent application of preferences.

Incomplete Understanding of Data Tags Collection and Use

Before implementing a new tag, businesses must fully understand what data the tag collects and how that data is used or shared. However, this process can be challenging, as marketing materials and technical documentation for tags are often incomplete or unclear, leaving businesses with gaps in knowledge about the tag's functionality.

Tag privacy settings

Many widely used tags include configurable settings that allow website operators to control how collected data is used. The guidance illustrates this with an example of how Meta and Google have options that enable businesses to manage their data collection and also dictate how third-party tag providers may collect data, such as limited data use (LDU) and restricted data processing (RDP).

However, these options only work in states with comprehensive data privacy laws. In states without such laws, such as New York, these features may not prevent tags from collecting and using visitor data. This has led to cases where businesses mistakenly relied on these settings, assuming they would limit data collection for all users, including those who opted out of marketing activities in states without comprehensive privacy laws.

Hardcoded Tags

Many websites may also have tags that are not properly configured to work with the privacy controls deployed on the website and were hardcoded into the website. Because of their hardcoding, the consent management tools and the users' decisions via these tools will not apply to the tags, and they will continue to function regardless of the users' choices.

Best Practices to Adapt

Some practices that businesses can adopt to alleviate most of the aforementioned mistakes include the following:

Designate

Arguably, the most effective way to ensure a website has the appropriate mechanisms in place to manage its tracking technologies is to have a qualified individual overseeing such operations.

By having such an individual in charge of website tracking, a business can rest assured that the technical aspects will be taken care of. Such individuals may also prove helpful in facilitating relevant training for employees using the tracking technologies and regularly reviewing the website's data collection practices to ensure compliance with regulatory requirements.

Understand the Technology

Far too many businesses often fall into the trap of simply adapting and implementing the latest technology without fully understanding its implications. Hence, before a new tag or tool is deployed, businesses must thoroughly understand how their existing tag and tool works and, more importantly, whether its usage is in line with how they wish to manage their data collection activities.

This can be done by contacting the tag developer or tool directly and requesting relevant documentation.

Configure

Before a new tag or tool is deployed in real-time, it would be a good idea to ensure it is categorized and configured appropriately, as failure to do so can lead to some problems identified earlier.

Test

It goes without saying that businesses must ensure that any new tag or tool is rigorously tested to verify its functionality's consistency with their expectations. Furthermore, these tests must be conducted at regular intervals and should not be a one-time formality. Doing so can ensure that such a tag or tool's functionality complies with regulatory obligations.

Review

All deployed tags and tools must be regularly reviewed. The scope of these reviews will depend entirely on the website's use of such tags and tools and any other tools it may have deployed in tandem with them.

Complying with New York Law

Any privacy disclosures presented to users must comply with the relevant New York consumer protection laws. Some key considerations to take into account include the following:

Accurate Privacy Controls

It's one thing to empower users with choices about how they wish their data to be collected, stored, and used. However, it is the website's responsibility to appropriately honor the users' choices related to their data.

Hence, websites must ensure that all privacy controls operate and work as users understand in both express and implied forms through the design and implementation of the controls.

Clear & Simple Language

A website's exact language in its privacy policy disclosures can tremendously influence how users understand it and consent to the data being collected. Hence, it is critical to avoid any language that creates a misleading impression in the user's mind about how the website collects, stores, and uses their data.

The guidance mentions an example where a user may be presented with a button labeled "Accept Cookies" or "Accept All" with a description that clicking on the button means they agree to use the cookies. This implies that the cookies will only be used if the button is clicked, which can be misleading if the website uses an opt-out mechanism where cookies are deployed without user consent as soon as users visit a website.

User-Friendly Privacy Interface

This may seem more of a cosmetic choice rather than an operational one, but the exact design of the privacy controls, as users view them, can significantly impact their choices owing to how they convey information about the controls' functions and uses.

Hence, the functionality of the privacy controls must be simple enough for the user to understand without unnecessary complications that impede their ability to make straightforward decisions. Additionally, websites should strictly avoid the use of dark patterns where certain functionalities are intentionally made harder for the user to understand or use.

How Securiti Can Help

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls, and orchestration across hybrid multicloud environments. Numerous reputable global enterprises have come to rely on Securiti's Data Command Center for their data security, privacy, governance, and compliance needs.

This Data Command Center provides organizations access to various modules and solutions designed to ensure compliance with all major privacy-related obligations they may be subject to. This includes cookie consent management and privacy policy & notice management. With these solutions, organizations can ensure they have a reliable and robust automated mechanism in place that corresponds with user decisions and reflects their choices within the tools' functionality almost instantaneously.

Furthermore, organizations can gain real-time insights into compliance status via the centralized dashboard and make proactive interventions whenever necessary per their needs.

Request a demo today to learn more about how Securiti can help you comply with the New York State Attorney General's privacy control recommendations and other major data privacy-related regulations within the US and globally.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
Securiti+Veeam Will Accelerate Safe Enterprise Al at Scale
We started Securiti Al with the strong conviction that in the Information Age, the Information aka Data, is the life blood of businesses and a unified platform was needed to provide all essential controls and deep intelligence around...
View More
DataAI Security for Financial Services: Turn Risk Into competitive Advantage
Financial services run on sensitive data. AI is now in fraud detection, underwriting, risk modelling, and customer service, raising both upside and risk. Institutions...
View More
Navigating China’s AI Regulatory Landscape in 2025: What Businesses Need to Know
A 2025 guide to China’s AI rules - generative-AI measures, algorithm & deep-synthesis filings, PIPL data exports, CAC security reviews with a practical compliance...
View More
All You Need to Know About Ontario’s Personal Health Information Protection Act 2004
Here’s what you need to know about Ontario’s Personal Health Information Protection Act of 2004 to ensure effective compliance with it.
The 5 Tenets of Modern DSPM for Financial Services View More
The 5 Tenets of Modern DSPM for Financial Services
Learn the 5 tenets of modern DSPM for financial services: continuous discovery, access governance, real-time risk visibility, automated remediation, and continuous compliance.
Maryland Online Data Privacy Act (MODPA) View More
Maryland Online Data Privacy Act (MODPA): Compliance Requirements Beginning October 1, 2025
Access the whitepaper to discover the compliance requirements under the Maryland Online Data Privacy Act (MODPA). Learn how Securiti helps ensure swift compliance.
DSPM vs Legacy Security Tools: Filling the Data Security Gap View More
DSPM vs Legacy Security Tools: Filling the Data Security Gap
The infographic discusses why and where legacy security tools fall short, and how a DSPM tool can make organizations’ investments smarter and more secure.
Operationalizing DSPM: 12 Must-Dos for Data & AI Security View More
Operationalizing DSPM: 12 Must-Dos for Data & AI Security
A practical checklist to operationalize DSPM—12 must-dos covering discovery, classification, lineage, least-privilege, DLP, encryption/keys, policy-as-code, monitoring, and automated remediation.
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New