Connected: An Internet Encyclopedia
15.3 Abuse of Server Log Information

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 2068
Up: 15 Security Considerations
Prev: 15.2 Offering a Choice of Authentication Schemes
Next: 15.4 Transfer of Sensitive Information

15.3 Abuse of Server Log Information

15.3 Abuse of Server Log Information

A server is in the position to save personal data about a user's requests which may identify their reading patterns or subjects of interest. This information is clearly confidential in nature and its handling may be constrained by law in certain countries. People using the HTTP protocol to provide data are responsible for ensuring that such material is not distributed without the permission of any individuals that are identifiable by the published results.


Next: 15.4 Transfer of Sensitive Information

Connected: An Internet Encyclopedia
15.3 Abuse of Server Log Information