Bitsight and Lokker report

Support for Your Privacy Risk Assessment Report


We want to provide context for how best to interpret your Privacy Risk Assessment Report. Your report provides insights for both privacy and cybersecurity risks. Below, you will find general report details, or you can visit our tailored guidance specific to your use case

LOKKER web privacy software solutions, Bitsight overview

Privacy Risk Report Details and Definitions

Have questions about your report? Here’s a clear breakdown of each element—what we check, why it matters, how we calculate it, and how to act on your results.
Privacy Risk by Category

Privacy Risk by Category

Lokker’s Web Privacy Risk Score™ offers organizations a clear and quantifiable way to evaluate, identify and mitigate web privacy risks that may result in a privacy breach, enforcement action or lawsuit. This tool provides a detailed view of risks across website domains or portfolios of domains, allowing companies to pinpoint risks by webpage, severity, and frequency.

Lokker’s risk model uses advanced scanning capabilities to evaluate websites without requiring integration or code modifications. The baseline risk scores are based on an analysis of over 80,000 websites across various S&P industry sectors. The scoring model measures overall risks and breaks them down into seven specific categories described below.

Cookies

Cookies represent one of the most fundamental mechanisms for data sharing on websites. They can store user information that is later shared with or accessed by third parties. Risks in this category are identified under the following conditions:

  • Third party cookies were set before obtaining explicit user consent. This practice can lead to data being shared with advertisers or other entities to track user behavior.
  • Third party cookies were loaded without obtaining explicit user consent.

 

Data being stored in a third-party cookie indicates that data has been shared with a third party. As a result, the cookie can later be used to reference this data for showing ads to the user, merge with data shared from other sites or other online / offline transactions.

This category also includes:

  • First party cookies that were set before or without obtaining explicit user consent.


First-party cookies are generally intended for website use, while third-party cookies are for use by third parties. However, a JavaScript workaround exists that allows third parties to set first-party cookies. This can create first-party cookie risk by enabling third parties to store user information using first-party cookies.

Why it matters:
Cookies facilitate data sharing between websites and third parties. This data can be used for targeted advertising, user profiling, or merging with other datasets, potentially exposing users to privacy violations.

This category evaluates the presence and sharing of sensitive user information, such as personally identifiable information (PII), financial details, or health-related data. The type of data being shared affects the risk score depending on the sensitivity of the data, as does the type of site and page factors on which it is found. For example, sending credit card data is more sensitive than sending the user’s first name.

How it’s assessed: Lokker tests for data loss by filling out forms with fake data, and then does a lookup to see if any of that data is sent to a third party, and if so, where did it go and to whom.

Why it matters:
Unauthorized sharing of sensitive data increases the risk of identity theft, fraud, and regulatory penalties under laws like GDPR or CCPA.

The session replay risk category includes session replay tools from third parties like Dynatrace or Hotjar being detected on a website. These tools record user interactions (e.g., clicks, keystrokes, and navigation) to help site owners understand user behavior. Risk occurs when data is being shared with these third parties, especially when the proper notice has not been given and/or the proper consent has not been received from the user. Improper notice or lack of user consent exacerbates privacy risks.

Why it matters: When sensitive user interactions are recorded and shared without consent, it can lead to significant privacy concerns and legal repercussions.

This category assesses third-party tracking technologies embedded on your website, which can monitor user behavior and share data with external entities which you may not have approved for sharing. There are several types of risks:

Fingerprinting. Scripts taking a unique “fingerprint” of a user’s browser in order to track their activity across different websites.. Lokker looks at all of the methods called by a script and assigns a weighting to the ones commonly used for browser fingerprinting. The severity and number of methods used will impact the score.

Trackers detected. The presence, number and type of third-party code (Trackers) found on your site affects the score.

User Ids (keys) sent. Lokker assesses the data sent to a third-party to check if there is any high risk data like user_ids sent back to the third party.

User behavior sent. Lokker assesses the data sent to a third party to check if there is any sensitive behavior sent back to the third party. E.g. newsletter subscription provided by the user.

Third-party iframes found. This check looks for iframes created on your site by third parties. When these are found the risk score is increased accordingly because it is difficult for your site monitoring and logging systems to view activity within these iframes.

Why it matters:
Trackers can compromise user privacy and undermine trust by sharing data without user awareness or consent.

This category evaluates the geographic location of third-party servers receiving data from your site. Some countries are considered high-risk due to their regulatory environment, cyber practices, or political climate.

High-risk countries:
Russia, China, Belarus, Venezuela, Cuba, Turkmenistan, Syria, Eritrea, North Korea.
How it’s assessed:
Lokker examines the IP addresses of third-party servers to determine their geographic location.

Why it matters:
Data sent to high-risk jurisdictions may be vulnerable to surveillance, hacking, or misuse, leading to significant privacy concerns.

This category examines whether your website complies with legal requirements for obtaining user consent. Checks include:

  1. Is the user presented with a privacy consent banner when they enter your site?
  2. Do the pages on your site have the regulatory message for ‘Do Not Sell My Information’?
    If either of these are true, the score risk is increased.

Why it matters:
Failure to provide proper consent mechanisms can lead to legal penalties under privacy regulations such as GDPR and CCPA.

This category includes checks against the domain name used by any third-parties on your site and their associated risks.

Checks include:
Malicious Domains. Lokker cross reference check third-party requests against a malware database to identify risky domains.
Security certificate issues. Lokker evaluates if a third party is using a server without a functional security certificate. If not, the risk score is increased accordingly.
Domain registration age: Lokker identifies if domains were registered within the past 30 or 180 days.These could be higher risk, as an actor could register a new domain and use it before it could be flagged as malicious or be included onto session replay or risky third party lists.
Why it matters:
Newly registered domains or those with inadequate security measures can pose significant risks to user data and site integrity.
By breaking down privacy risks into these categories, Lokker’s Web Privacy Risk Score™ provides actionable insights to help organizations safeguard user data, enhance compliance, and build trust and integrity.

Risk Summary

Understanding the Web Privacy Risk Summary

CIPA Wiretapping Risk

Why We Look for This
The California Invasion of Privacy Act (CIPA) prohibits wiretapping, which may occur when session replay tools record user interactions without proper consent. Having a session replay tool on your site, without 100% correct notice and consent creates privacy risk. Session Replay = Wiretapping tools.
How We Check for This
We scan your website to identify session replay tools and assess whether they are active or collecting data.

Understanding the Report Results

No session replay tools were detected.
No risk was identified.

Potential wiretapping risk under CIPA: Session replay capability found.
High risk. Confirm tools are disabled or ensure proper consent is collected.

Why We Look for This
Over 10 states and 120 countries around the world have consumer data privacy laws which impact if and how your business uses a consent banner.

How We Check for This

The Lokker scanner simulates a user going to your site and checks if a consent banner is presented on all the scanned pages.

Understanding the Report Results
Consent banner found on all pages.
No risk was identified.
No consent banner detected on >90% of pages. Data collection enabled before consent requested.
The majority of your pages are missing a consent banner. Data is being collected by one or more third parties prior to receiving consumer consent.
No consent banner detected on any page. Data collection enabled before consent requested.
A consent banner does not exist on your site. Data is being collected by one or more third parties without receiving consumer consent.

Why We Look for This
Malicious domains which contain malware can indicate privacy risk or a data breach.

Recently registered domains are considered risky because cybercriminals often use newly registered domain names to host malicious content like phishing sites, malware distribution points, or command-and-control servers. They are taking advantage of the fact that these domains lack an established reputation and can easily slip past security filters, making them a potential threat when the domain name of a tag on your site is a recently registered domain.
How We Check for This
Malicious Domains: We check third parties on your site against a database of known malicious sites.
Recently Registered Domains: We check the domain registration date of all third parties on your site.
Understanding the Report Results
No malicious or recently registered domains detected.
None of the third parties on your site is using a recently registered domain or a domain which has been flagged as malicious.
Third party malware or recently registered domains detected.
Recently registered domains or a domain which has been flagged as malicious has been detected. Take action to verify and remediate as needed.

Why We Look for This
Tags on your site from servers in certain high risk countries, as designated by the US government, are considered high-risk due to their regulatory environment, cyber practices, or political climate.
How We Check for This
Lokker examines the IP addresses of third-party servers to determine their geographic location. is from any of these “Countries of Concern”:
– Russia, China, Belarus, Venezuela, Cuba, Turkmenistan, Syria, Eritrea, North Korea.
Understanding the Report Results
No third parties detected from countries of concern.
None of the third party tags on your site originate from a country of concern.
Restricted Geographies: Third parties detected from countries of concern.
Some of the third party tags on your site originate from a country of concern.

Why We Look for This

Unauthorized sharing of sensitive data increases the risk of identity theft, fraud, and regulatory penalties under laws like GDPR or CCPA.

How We Check for This

Lokker tests for data loss by filling out forms with fake data, and then does a lookup to see if any of that data is sent to a third party, and if so, where did it go and to whom.

Understanding the Report Results

No high-risk sensitive data sharing with third parties detected.

High-Risk Data: Includes personal details such as name, address, email, phone number, credit card information, medical terms, and social security numbers.

Extremely sensitive data sent to third party.

Extremely Sensitive Data: Flags are triggered if passwords, credit card numbers, or SSNs are shared with third parties.

Why We Look for This
When third party tags from some social media are used on healthcare sites, privacy risk is increased.

How We Check for This
If the site has been designated a healthcare site in the Lokker system configuration, then the Lokker scanner examines the site content to determine if any third party tags originate from Social media, e.g. Meta (Facebook/Instagram), TikTok, LinkedIn, Snapchat, or Pinterest

Understanding the Report Results
No social media domain requests detected.
The use of a social media tag on a healthcare site has not been detected.
Meta pixel found on a healthcare page.
Social media request on a healthcare site.
Meta and TikTok pixels found on a healthcare page.
Social media request.
The use of a social media tag on a healthcare site has been detected.

Why We Look for This
This category assesses third-party tracking technologies embedded on your website, which can monitor user behavior and share data with external entities which you may not have approved for sharing. This can compromise user privacy and undermine trust by sharing data without user awareness or consent.

How We Check for This
We look for Fingerprinting. Scripts taking a unique “fingerprint” of a user’s browser in order to track their activity across different websites.. Lokker looks at all of the methods called by a script and assigns a weighting to the ones commonly used for browser fingerprinting. The severity and number of methods used will impact the score.

We consider the presence, number and type of third-party trackers found on your site.

We look for User Ids (keys) sent. Lokker assesses the data sent to a third-party to check if there is any high risk data like user ids being sent back to the third party.

We look for User behaviour being sent. Lokker assesses the data sent to a third party to check if there is any sensitive behavior sent back to the third party. E.g. newsletter subscription requested by the user.

We examine for the presence of Third-party iframes on your site. When these are found the risk score is increased accordingly because it is difficult for your site monitoring and logging systems to view activity within these iframes.

Understanding the Report Results

No High risk tracker detected.

None of the checks listed above were found to be true.

High risk tracker detected.
Trackers that have been identified as malicious or named in a lawsuit.
Significantly more 3rd party domains than S&P 500 average.

Having a large number of trackers on your site could indicate risk.

Why We Look for This
The Video Privacy Protection Act (VPPA) prohibits the disclosure of personally identifiable information about users’ video-watching habits without explicit consent. It is a federal law originally passed to protect people’s video rental histories. This law was passed in the late 1980s regarding VHS videotape rental history, but it has been repurposed by plaintiffs to file cases against companies. Due to the lack of statute clarity, there are multiple instances of plaintiff-led litigation referencing alleged VPPA violations.
How We Check for This
Consider this scenario: a consumer views a website with video content and the consumer’s video-watching behavior is shared with a third party without explicit consent. Lokker looks for combinations of events that lead to examples like these to help companies avoid these cases. We also analyze how these pixels are configured to see if they share sensitive video analytics, such as video titles or watch times, with third parties.
Understanding the Report Results
No VPPA Violations Detected

There are NO pages on your site with video content that is being shared with third parties without user consent.

Potential VPPA Violations Detected

There are ONE OR more pages on your site with video content that is being shared with third parties without user consent.

Critical Risks

Understanding Critical Risk Remediation

Risks that have been identified as critical have the potential to result in monetary or reputation damages to your company. These risks should be mitigated immediately.
Domain Hijacking

Domain hijacking is the unauthorized takeover of a domain name, usually by exploiting security weaknesses or administrative loopholes. Attackers gain control of a domain and can redirect traffic, disrupt services, or use it for malicious activities. Consequences of domain hijacking include:

  • Traffic Redirection → Attackers redirect visitors to malicious websites.
  • Brand Reputation Damage → Users may lose trust in the hijacked domain.
  • Email Spoofing & Phishing → Cybercriminals can send fake emails from the hijacked domain.
  • Data Theft → If the domain hosts a website, user data may be compromised.
  • Financial Loss → Ransom demands or loss of business due to website downtime.

 

Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Spread 

This is the number of scanned pages(20) and the number of pages on your site(3) with this risk was found.

Found on 3 of 20 pages inspected

Description

This is the act of changing the registration of a domain name without the permission of its original registrant.

Domain Hijacking

Example Page 

This is an example of a page with a hijacked domain. There may be additional pages with risk.

https://farrelldistributing.com/rtd-cocktails

Example Request URL 

The complete URL of the third party which has hijacked this page. 

https://polyfill.io/v2/polyfill.min.js?features

Count 

Number of pages where this risk was found

3

Pages Impacted

The names of one or pages on your site where this risk was found.

https://example.com/beer/
https://example.com/non-alcoholic
https://example.com/rtd-cocktails

 

Lokker performs checks to prevent the sharing of highly sensitive data with third parties. This includes personal information such as passwords, social security numbers, and credit card information, which can be used to compromise an individual’s privacy or commit identity theft.

AttributeAdditional InformationDescription
RiskCritical is the highest level of risk.Critical
SpreadThis is the number of scanned pages (20) and the number of pages on your site (1) with this risk found.Found on 1 of 20 pages inspected
DescriptionExtremely sensitive data has been shared with a third party, including passwords, credit card numbers, or social security numbers.Use extreme caution when collecting and sharing this information. Review your agreement with this partner to ensure appropriate security measures. If unsure, block data sharing via the Manage Third Parties dashboard.
FieldThis identifies the type of data shared.Password
DomainThe third-party website receiving the data. Engage your engineering team to understand why.formstack.com
ScriptWhen a script is used to share data, this shows the user action that initiates the sharing.Button Click
Target URLThe URL of the third-party website receiving the data.https://eternityweb.formstack.com/forms/index.php
Fake Data FieldLokker simulates a “fake” user entering data on your site for testing.orBOxAAzW6d@Ejm7
Example PageAn example of a page where sensitive data is sent to a third party.https://farrelldistributing.com/rtd-cocktails
CountNumber of pages where this risk was found.1
Pages ImpactedNames of the pages on your site where this risk was found.https://farrelldistributing.com/request-a-donation

This risk occurs when a pixel from Meta is placed on a page that provides health care information to the user.

The Meta pixel, when placed on a webpage that displays healthcare information, sends data to Facebook. This data includes the Facebook user ID and details of the page viewed. Because Facebook also has access to email addresses and other personal information, it can link a real person to the specific healthcare information viewed. As a result, Facebook gains knowledge of the user’s healthcare interests or conditions.


Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Spread 

This is the number of scanned pages(20) and the number of pages on your site(3) with this risk was found.

Found on 3 of 20 pages inspected

Description

While this risk is referred to as the Meta Pixel risk, it is the Facebook website that is receiving information from your site. 

We detected the Meta Pixel on the page, on a website we believe to be in a higher risk industry. 

Industry

Healthcare

Medical Devices and Supplies

Example Page 

This is an example of a page on your site with the Facebook pixel.  There may be additional pages with risk.

https://blueskybio.com/pages/bio-cut

Example Request URL 

The complete URL of the third party which is receiving information from your site. 

https://www.facebook.com/tr/?id

Meta Pixel ID

Facebook uses this Id to identify the user. 

232570173945555

Count 

Number of pages where this risk was found

3

Pages Impacted

The names of one or pages on your site where this risk was found.

https://example.com/pages/about-us
https://example.com/pages/bioconus-12
https://example.com/pages/bioconus-12_0

The Video Privacy Protection Act (VPPA) risk arises when a website with playable video content shares user data with a third-party that possesses personally identifiable information (PII) of those users. This creates a privacy risk as the third party can then associate specific individuals with their video viewing habits. The VPPA risk occurs when 3 conditions simultaneously exist:

  1. Website with Video Content: The first condition for VPPA risk is the presence of a video on a website that users can play or that plays automatically. This video content triggers the potential for data sharing and privacy concerns.
  2. Data Sharing with Third Party: When a user interacts with the video content, the website may send data to a third-party platform (e.g., social media, analytics provider). This data transfer can include information about the user’s activity on the page, potentially identifying them as having viewed the video.
  3. Third Party Possesses PII: The third-party receiving the data possesses PII of the user, such as their email address or other identifying information that “identifies a person”. This PII, combined with the video viewing data, enables the third party to create a profile linking specific individuals to their video viewing behavior.


The legal risk exists
because the third party gains knowledge of the email addresses (or other PII) of individuals who had access to the video on the website. This can be a significant privacy breach, as it allows the third party to associate specific people with their video viewing habits. In a legal action, the website owner could be held responsible for enabling this breach by allowing the third-party tracking on their site.

Key points for preventing this risk include:

  • User Awareness: Users may not be aware that their video viewing activity is being shared with third parties and linked to their PII. This lack of transparency raises privacy concerns.
  • Data Control: The website owner has a responsibility to control the data that is shared with third parties and to ensure that user privacy is protected.

Compliance: Websites that include video content must be mindful of VPPA compliance and take steps to mitigate the risk of data sharing and privacy breaches.

 

Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Spread 

This is the number of scanned pages(20) and the number of pages on your site(1) with this risk was found.

Found on 1 of 20 pages inspected

Description

VPPA is the law which could be used to bring legal action. 

Almost certainly a breach of the Video Privacy Protection Act (VPPA).

Example Page 

This is an example of a page containing the video and a tag which shares data. There may be additional pages with risk.

https://example.com/2023/02/08/drayage/

Video Provider

Hosting website of the video found on the page.

facebook.com

Example Request URL 

The complete URL of theThird Party which is informed that the user is on a page with a video. 

https://px.ads.linkedin.com/collect?video=titanic

Social Tracker 

Third Party which is informed that the user is on a page with a video. 

linkedin.com

Shared Data Name

Parameter used in the URL sending information to a third party  or “URL” if no data name is used. 

video  – (px.ads.linkedin.com/collect?video=titanic)

Shared Data Value

The value of the data being shared.

tiitanic – (px.ads.linkedin.com/collect?video=titanic)

Count 

Number of pages where this risk was found

1

Pages Impacted

The names of one or pages on your site where this risk was found.

https://example.com/2023/02/08/drayage/
https://example.com/shipping/ 

The Global Privacy Control (GPC) is a setting that can be enabled within a user’s web browser. When active, it transmits a signal to websites when a user visits the site. This signal communicates the user’s preference for privacy, indicating that their personal data should not be sold or shared with third parties, except when necessary to provide the requested service.

The GPC signal is intended to streamline the process of exercising privacy rights online. By enabling GPC, users can avoid having to manually adjust their privacy settings on each website they visit. Instead, the GPC signal automatically conveys their privacy preferences to websites that recognize and honor the signal.

The mechanism for honoring Global Privacy Control (GPC) on a website is typically the consent banner system as most consent banner systems can be configured to honor GPC signals. GPC signals may be ignored if this system is not configured correctly, which creates risk. 

Lokker detects if your website is honoring the GPC signal. If your website is not respecting GPC, it is flagged here. There are potential legal and regulatory actions for this including fines, penalties, and lawsuits. Additionally, your company could face reputational damage, loss of customers, and increased scrutiny from regulatory bodies. In severe cases, there could be criminal charges and imprisonment for individuals responsible for the non-compliance.


Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Page Count

This is the number of scanned pages(20) and the number of pages on your site(3) with this risk was found.

Found on 3 of 20 pages inspected

Example Page 

This is an example of a page which is not checking for GPC. 

https://example.com/careers

Example Request URL 

The complete URL  of the page which is not checking for GPC.  

https://polyfill.io/v2/polyfill.min.js?features

Count 

Number of pages where this risk was found

3

Lokker checks to ensure that sensitive data is not being shared with a third party. This type of data includes elements like: first name, middle name, last name, full name, password, email address, company name, phone number, credit card, street address, state, city, country, zip, sex, diagnosis, credit card name, credit card expiry month, credit card expiry year, credit card expiry, or age. This type of personal information data can be used to expose an individual’s private information or help steal their identity.

 

Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Spread 

This is the number of scanned pages(20) and the number of pages on your site(1) with this risk was found.

Found on 1 of 20 pages inspected

Description

Sensitive data has been shared with a third party.  This includes any of the following information: First name, middle name, last name, full name, password, email address, company name, phone number, credit card, street address, state, city, country, zip, sex, diagnosis, credit card name,  credit card expiry month,  credit card expiry year,  credit card expiry,  or age.

  

Use extreme caution when collecting and sharing this information with a third-party. Review your agreement with this partner to ensure they have appropriate security measures to keep this data private and safe, as a data leak could have severe consequences for the subject, including possible identity  theft or fraud. If you don’t recognize the partner receiving the data or have yet to be able to verify their security practices are sufficient measures, block data sharing with this partner through the Manage Third Parties dashboard for partners that are subscribed to Lokker Privacy Edge. 

Field

This identifies the type of data which has been shared. 

State [the user resides in]

Domain

Here we can see the third party website receiving the data. It is recommended to engage your engineering staff to understand  why this third party is receiving this data. 

formstack.com

Script

When a script is used to share data, this contains the user action which initiates the sharing. 

Button Click

Target URL

Here we can see the URL of the third party website receiving the data. 

https://eternityweb.formstack.com/forms/index.php

Fake Data Field

Lokker simulates a “fake” user to your site which enters fake data in places on your site where data is collected.  This is the fake data used on your site.  

Alaska

Example Page 

This is an example of a page where extremely sensitive data is sent to a third party. There may be additional pages with this risk.

https://example.com/rtd-cocktails

Count 

Number of pages where this risk was found

1

Lokker checks page to assure a consent banner is displayed.  This report indicates a consent banner is missing on one or more pages.   Having a privacy consent banner on your site is crucial for several reasons:

  • Legal Compliance: More than 120 countries and 15 US states have data protection laws that require websites to obtain explicit consent from users before collecting and processing their personal information. A privacy consent banner ensures that your website complies with these legal requirements and avoids potential fines or legal action.
  • Transparency and Trust: A privacy consent banner demonstrates transparency and respect for user privacy. It clearly communicates to users what data is being collected, how it will be used, and gives them the choice to consent or decline. This fosters trust and builds positive relationships with your website visitors.
  • User Control: A privacy consent banner empowers users to control their personal data. It allows them to make informed decisions about whether or not they want to share their information with your website. This enhances user experience and gives them a sense of control over their online privacy.
  • Data Protection: By obtaining explicit consent through a privacy consent banner, you can ensure that you are collecting and processing user data in a lawful and ethical manner. This helps protect user privacy and reduces the risk of data breaches or misuse.
  • Brand Reputation: Respecting user privacy and demonstrating compliance with data protection laws through a privacy consent banner can enhance your brand’s reputation. It shows that you value your users and their privacy, which can attract more visitors and customers to your website.

Overall, a privacy consent banner is an essential element of a website that values user privacy and complies with data protection laws. It is a simple yet powerful tool that can help you build trust, enhance user experience, and protect your brand’s reputation.


Attribute

Additional Information

Description

Risk

Critical is the highest level of risk.

Critical

Page Count

Number of pages where this risk was found

20

Example Page 

This is an example of a page which is missing a consent banner. 

https://example.com/careers

Count 

Number of pages where this risk was found.

20

High Risks

Understanding Verification Risks

Risks that have been identified as requiring additional information from you to verify the risk to your company.

Social Media Domain

This risk assessment indicates that a social media website is currently receiving data from a specific page on your website. This data has been classified by Lokker as containing sensitive consumer Health Care information. Several US states, e.g. Washington, have explicitly blocked this type of data sharing. The transmission of this data to an external social media site raises concerns around data privacy and potential non-compliance with relevant healthcare regulations.

 

Attribute

Additional Information

Description

Risk Factor

Verification is the second highest level of risk.

Verification

Spread 

This is the number of scanned pages(20) and the number of pages on your site(20) with this risk was found.

Found on 20 of 20 pages inspected

Description

A social media third party tag was found on a page on your site with consumer health care information.  

Social Media Domain Critical

Industry

This indicates the industry classification of the page on your site with the risk. 

Medical Devices and Supplies

Example Page 

This is an example of a page containing healthcare information and a tag which shares data. There may be additional pages with risk.

https://blueskybio.com/pages/cache-test

Example Request Domain

Hosting website of the video found on the page.

facebook.net

Example Request URL 

Third Party which is informed that the user is on a page with a video – complete URL  

https://connect.facebook.net/en_US/all.js#appId

Social Media Site 

Third Party which is informed that the user is on a page with a video. 

Facebook

Count 

Number of pages where this risk was found

20

Pages Impacted

The names of one or pages on your site where this risk was found.

https://example.com/pages/about-us
https://example.com/pages/bioconus-12

Lokker detects the number of third-party domains on websites and compares the overall number and type to the S&P 500 and other industries to determine if a website is better, comparable, or significantly worse than the baseline. These third parties increase the need for you to monitor for unauthorized data collection and proper governance. Often, third parties are not placed by you directly but are instead piggybacking on another script. The website owner remains responsible, even if they didn’t directly place the script themselves.

Attribute

Additional Information

Description

Risk Factor 

Verification is the second highest level of risk

Third-Party Domains tracker_domains

Page Count 

Number of pages where this risk was found.

20

Domain 

Hosting website of the video found on the page.

adnxs.com

Example Page 

This is an example of a page with one or more third party domains used for sharing data with the third party. There may be additional pages with this risk.

https://example.com/blog/why-automate/

Percent 

The percent of pages on your site containing third party domains. 

100

 

 session_replay_domains

The California Invasion of Privacy Act (CIPA) is a state law that safeguards the privacy rights of California residents by imposing strict regulations on the recording and monitoring of conversations and communications. This law applies to a broad range of mediums, including but not limited to telephone conversations, in-person discussions, and electronic communications. When third party session replay tools are used on a website, data sent to the third party enables it to know all the actions the user has taken on the web site.  The user actions are effectively recorded. HotJar and Dynatrace are examples of session replay tools. The key provisions of CIPA include:

  • Consent: CIPA generally mandates that all parties involved in a communication must provide consent before any recording can take place.This consent must be explicit and cannot be assumed or implied.
  • Notice: In situations where recording is permissible, CIPA may require that parties be given clear and conspicuous notice that the communication is being recorded.
  • Scope: The law’s scope extends beyond private conversations to encompass communications in public spaces and workplaces, provided that there is a reasonable expectation of privacy.
  • Penalties: Violations of CIPA can result in severe consequences, including civil lawsuits for damages, injunctions, and potentially criminal prosecution.


Businesses operating in California or interacting with California residents must be particularly mindful of CIPA’s requirements. Failure to comply can lead to legal action, reputational damage, and financial loss. Companies should implement clear policies and procedures for obtaining consent, providing notice, and handling recorded communications. Businesses must be mindful of compliance measures needed on your website that go along with adding  a sessions replay tool to your site. 

Attribute

Additional Information

Description

Risk Factor 

Verification is the second highest level of risk

CIPA Wiretapping Risk session_replay_domains

Page Count 

Number of pages where this risk was found.

20

Domain 

Hosting website of the session replay too found on the page.

clarity.ms

Example Page 

This is an example of a page with one or more third party domains identifying session replay tools.  There may be additional pages with this risk.

https://backbox.com/blog/eight-rules-of-backup/

Percent 

The percent of pages on your site containing session replay tools. 

100

 

This assessment checks for the presence of any of the following tags which have been identified as high risk:   

adnxs.com, bing.com, addthis.com, sharethis.com, bluekai.com

Attribute

Additional Information

Description

Risk Factor 

Verification is the second highest level of risk

Third-Party Domains tracker_domains

Page Count 

Number of pages where this risk was found.

20

Domain 

Hosting website of the high risk third party found on the page.

adnxs.com

Example Page 

This is an example of a page with one or more third party domains identifying session replay tools.  There may be additional pages with this risk.

https://example.com/2023/09/05/acertus-acquires-rcg-logistics/

Percent 

The percent of pages on your site containing session replay tools. 

100

 

Take Action on Your Privacy Risks Today

Need more details? If you have questions or want a deeper analysis, reach out—we’re happy to help.

  • Fix Privacy Issues Fast: We’ll identify and resolve risks from your report.
  • Stay Protected: Ongoing monitoring keeps your site secure.
  • Simplify Compliance: Upgrade consent management for a seamless, law-compliant experience.

Don’t wait—secure your site and protect your reputation today.

Additional Privacy Resources

Explore the latest trends, tips, and insights in our world. Get the knowledge to empower your business growth and increase productivity.