Connected: An Internet Encyclopedia
12.3 Abuse of Server Log Information

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1945
Up: 12. Security Considerations
Prev: 12.2 Safe Methods
Next: 12.4 Transfer of Sensitive Information

12.3 Abuse of Server Log Information

12.3 Abuse of Server Log Information

A server is in the position to save personal data about a user's requests which may identify their reading patterns or subjects of interest. This information is clearly confidential in nature and its handling may be constrained by law in certain countries. People using the HTTP protocol to provide data are responsible for ensuring that such material is not distributed without the permission of any individuals that are identifiable by the published results.


Next: 12.4 Transfer of Sensitive Information

Connected: An Internet Encyclopedia
12.3 Abuse of Server Log Information