Privacy Policy Guide

How to disclose third-party tools in your privacy policy

Plain-language guidance for disclosing analytics, advertising, session replay, and CMP tools in a privacy policy or cookie notice. Includes illustrative example language, jurisdiction notes, and a checklist for verifying that technical controls match your disclosure.

Not legal advice GDPR and CCPA context CMP configuration checklist

Policy vs practice

A privacy policy describes. Technical controls enforce.

An accurate privacy policy is necessary. But the legal risk from third-party tools is not primarily a documentation problem. The risk is operational: tools that fire before consent, pixels that activate after opt-out, tag managers that ignore GPC signals.

Teams often review compliance only inside each SaaS console: the CMP dashboard shows categories assigned, the tag manager preview looks clean, the analytics vendor reports consent settings enabled. That view is incomplete. What matters is whether the visitor's browser actually loads the third party through your consent and tag stack, whether anything is listening to the consent signal, and whether the vendor still fires after opt-out.

Those questions can only be answered by testing the whole chain from the outside. Lokker Consent Validator runs real browser sessions across accept, reject, no-interaction, and GPC states and reports what reaches the network, not what each tool's admin UI claims.

Step 1

Privacy policy

Describes what tools you use, what data they collect, and what rights visitors have.

Step 2

Consent management platform

Records visitor consent decisions and categorizes which tools are permitted under each choice.

Step 3

Tag manager

Deploys tools conditionally based on consent state signals from the CMP.

Step 4

Network validation

Tests the live site from the outside: whether the CMP, tag manager, and each third party actually honor accept, reject, and GPC together. This is what Lokker does.

Vendor disclosure guides

Browse by tool category

Each guide covers what data the tool collects, where in a privacy policy to disclose it, example language for discussion with counsel, and a CMP configuration checklist.

Common questions

Privacy policy and disclosure FAQ

Do I need to list every sub-processor in my privacy policy?
Requirements vary by law. GDPR generally requires disclosure of categories of recipients and, under some interpretations, named sub-processors that handle personal data on your behalf. CCPA requires disclosure of categories of third parties to whom personal information is disclosed or sold. Most practitioners recommend a level of specificity that helps visitors understand what companies receive their data and for what purposes, without exhaustively listing every infrastructure vendor. Third-party marketing and analytics tools with their own data controller role should generally be named.
What is the difference between a cookie policy and a privacy policy?
A privacy policy covers all personal data processing: how you collect, use, store, and share data, and what rights individuals have. A cookie policy or cookie notice focuses specifically on cookies and similar tracking technologies, describing their names, purposes, durations, and opt-out mechanisms. Under the GDPR and ePrivacy Directive, a cookie notice or consent banner is required in addition to a privacy policy. Some organizations combine them; others keep them separate. The important point is that the disclosures are accurate and the consent mechanism is technically enforced.
What if my CMP says reject but pixels still fire?
This is one of the most common compliance gaps. A CMP records the rejection in its own system, but the actual blocking of tags depends on your tag manager reading that signal and on each vendor tag respecting it. If consent-based triggers are missing, if the CMP and tag manager are not wired together, or if a script loads outside the stack entirely, tags will fire regardless of visitor choice. A green status inside the CMP admin does not prove the browser behaved the same way. Lokker Consent Validator tests the full stack from the outside and shows which endpoints still receive data after reject.
Why is checking settings inside my CMP or tag manager not enough?
Each vendor tool shows you its own configuration, not the end-to-end behavior on your site. Your CMP can list GA4 under Analytics while GTM still fires the tag on every page. Consent Mode can be enabled in Google's UI while your tag manager never passes the signal. The only reliable test is holistic: run the site as a visitor would, change consent state, and observe whether the third party loads, whether the consent signal was received, and whether anything still calls out on opt-out. That is the network-layer view Lokker provides. Policy text and in-product checklists are inputs; they are not proof on their own.
Is a privacy policy update required every time I add a new tool?
Generally yes, if the new tool collects or processes personal data in a way not already covered by your policy. Under the GDPR, material changes to data processing require updating the privacy notice and, where the original legal basis was consent, potentially re-obtaining consent. Under the CCPA, material changes that affect the categories of data collected or the third parties to whom it is disclosed require a policy update. Keeping your CMP vendor list and your privacy policy synchronized is an ongoing compliance obligation.
Does example policy language make me compliant?
No. Example language is a starting point for discussion with your counsel. Compliance requires that the policy accurately reflects your actual technical practices and that those practices conform to applicable law. A policy can accurately describe a compliant implementation, or it can describe a compliant implementation that is not actually running that way. Both text accuracy and technical accuracy are required. Lokker validates the technical accuracy; your counsel validates the legal accuracy.

Close the gap

Verify that your policy and your technical controls agree

Consent Validator runs automated browser sessions across accept, reject, no-interaction, and GPC states and reports which third-party tools fire in each state. Confirm that the tools described in your policy are actually gated the way the policy claims.