Connected: An Internet Encyclopedia
15.3 Abuse of Server Log Information
Up:
Connected: An Internet Encyclopedia
Up:
Requests For Comments
Up:
RFC 2068
Up:
15 Security Considerations
Prev: 15.2 Offering a Choice of Authentication Schemes
Next: 15.4 Transfer of Sensitive Information
15.3 Abuse of Server Log Information
15.3 Abuse of Server Log Information
A server is in the position to save personal data about a user's
requests which may identify their reading patterns or subjects of
interest. This information is clearly confidential in nature and its
handling may be constrained by law in certain countries. People using
the HTTP protocol to provide data are responsible for ensuring that
such material is not distributed without the permission of any
individuals that are identifiable by the published results.
Next: 15.4 Transfer of Sensitive Information
Connected: An Internet Encyclopedia
15.3 Abuse of Server Log Information