MORE INFORMATION ON PRIVACY






HOME




MORE INFORMATION RELATING TO PRIVACY TAKEN FROM INTERNET EXPLORER 8 HELP

Cookies: frequently asked questions Cookies are small text files that some websites put on your computer to store a variety of information about you and your preferences. Here are answers to some common questions about cookies.

What are cookies used for?

Websites use cookies to offer a personalized experience to users and to gather information about website use. Many websites also use cookies to store information that provides a consistent experience between sections of the site, such as a shopping cart or customized pages. With a trusted website, cookies can enrich your experience by allowing the site to learn your preferences or allowing you to skip having to sign in every time you go to the website. However, some cookies, such as those saved by banner ads, might put your privacy at risk by tracking sites you visit.

Can I block cookies?

Yes, you can block or allow cookies on all websites or you can choose which websites' cookies are allowed. For more information, click Related Topics.

Should I block all cookies?

Not necessarily. Blocking all cookies can help protect your privacy, but it might limit your experience on some websites. Be selective about which websites you allow cookies for. You can start by blocking all cookies, then allow cookies as needed for websites that you trust.

How do I delete cookies?

To delete all cookies, follow these steps:

In Internet Explorer, click the Tools button, and then click Internet Options. On the General tab, under Browsing history, click Delete. Select the Cookies check box, and then click Delete. Notes

Deleting all cookies might cause some webpages to work incorrectly. For more information about cookies, including information about how to delete an individual cookie, click Related Topics. What are Temporary cookies?

Temporary cookies (or session cookies) are removed from your computer after you close Internet Explorer. Websites use them to store temporary information, such as items in your shopping cart.

What are Persistent cookies?

Persistent cookies (or saved cookies) remain on your computer after you close Internet Explorer. Websites use them to store information, such as your sign-in name and password, so that you don't have to sign in each time you go to a particular site. Persistent cookies can remain on your computer for days, months, or even years.

What are First-party cookies?

First-party cookies come from the website that you're viewing and can be either persistent or temporary. Websites might use these cookies to store information that they'll reuse the next time you go to that site.

What are Third-party cookies?

Third-party cookies come from other websites' advertisements (such as pop-up or banner ads) on the website that you're viewing. Websites might use these cookies to track your web use for marketing purposes.

Where are cookies stored?

Cookies are stored is in a folder named Cookies which is stored inside the Documents and Settings folder. By default, the path is C:\\\\Documents and Settings\\\\your user name\\\\Cookies.

Related Topics.

Change your privacy settings

Cookies are files that are stored on your computer by some websites. They're usually used to keep track of information about you (for example, your user name, password, or the contents of your shopping cart). Internet Explorer privacy settings let you specify which cookies you want to allow to be stored on your computer.

To change your privacy settings

In Internet Explorer, click the Tools button, and then click Internet Options. Click the Privacy tab, and then move the slider to the level of privacy you prefer. Select this To specify this.

Block All Cookies

Cookies from all websites will be blocked. Cookies that are already on your computer cannot be read by websites.

High

Cookies from all websites that do not have a compact policy (a condensed, computer-readable privacy statement) will be blocked.

Cookies from all websites that use information that can be used to contact you without your explicit consent will be blocked.

Medium High

Cookies from third-party websites that do not have a compact policy (a condensed, computer-readable privacy statement) will be blocked.

Cookies from third-party websites that use information that can be used to contact you without your explicit consent will be blocked.

Cookies from first-party websites that use information that can be used to contact you without your implicit consent will be blocked.

Medium

Cookies from third-party websites that do not have a compact policy (a condensed, computer-readable privacy statement) will be blocked.

Cookies from third-party websites that use information that can be used to contact you without your implicit consent will be blocked.

Cookies from first-party websites that use information that can be used to contact you without your implicit consent will be deleted from your computer when you close Internet Explorer.

Low

Cookies from third-party websites that do not have a compact policy (a condensed, computer-readable privacy statement) will be blocked.

Cookies from third-party websites that use information that can be used to contact you without your implicit consent will be deleted from your computer when you close Internet Explorer.

Accept

All Cookies All websites will be allowed to save cookies on your computer.

Cookies that are already on your computer can be read by the websites that created them.

Notes

A first-party website is the website that you are currently viewing. A third-party website is a website other than the one you are currently viewing. Third-party websites usually provide some content on the website you are currently viewing. For example, many sites use advertising from third-party websites and those third-party websites might use cookies. Some websites require cookies. If you select a privacy setting that does not allow cookies to be saved on your computer, you might not be able to view certain websites. When you change your privacy settings, the changes might not affect cookies that are already on your computer. To help ensure that all of the cookies on your computer meet your privacy settings, you should delete all of the existing cookies on your computer. When you return to websites that previously had saved cookies on your computer, the websites that meet your privacy settings will save cookies on your computer again. The websites that do not meet your privacy settings will not be allowed to save cookies on your computer. For information about how to delete cookies, click Related Topics. You can specify custom privacy settings for websites. For more information, click Related Topics.

Related Topics

What is active content and why does Internet Explorer restrict it?

Active content is interactive or animated content used on websites. It includes ActiveX controls and web browser add-ons, which are small programs that are used extensively on the Internet. Active content can make web browsing more enjoyable by providing toolbars, stock tickers, video, animated content, and more.

Why does Internet Explorer restrict active content?

Internet Explorer restricts this content because occasionally these programs can malfunction or give you content you don't want. In some cases, these programs can be used to collect information about you, damage information on your computer, install software without your consent, or allow someone else to control your computer remotely. Given these risks, you should only allow active content if you completely trust the publisher or the website it's coming from.

How to decide if you can trust a website.

Knowing when to trust a website depends in part on who publishes the website, what information they want, and what you want from the site. If you're not sure whether to trust a website, consider these questions:

Are you visiting a secure site?

If you are visiting the website with a secure connection, you will be able to identify the website through the site's certificate. A secure or encrypted website address will begin with HTTPS rather than HTTP, and you will see a lock icon in the Address bar. Secure connections use certificates to identify the website and to encrypt your connection so that it will be more difficult for a hacker to view. You can also click the lock icon in the Address bar to see more information about the website. For more information on secure websites, see How to know if an online transaction is secure.

When you click the lock icon in the Address bar, you can see the security report. Depending on the type of certificate the website has, you can see the website address or the company address that the certificate was issued to. Extended Validation (EV) certificates will turn the Address bar green, and will contain a confirmed name and address for the website owner. Non-EV certificates will display the website address or the domain of the site. If the security report only shows the website's address, be sure it is the address you wanted to visit. Phishing or fraudulent websites will often use similar website names to trick visitors into believing they are visiting trusted sites. For more information on phishing, see What is phishing?

Certificates are issued by companies called certification authorities (CA). Windows contains a list of the most common certification authorities. If Windows doesn't recognize the issuer of the certificate, you will get a warning. However, Windows can be configured to trust any certification authority, so you should not rely solely on receiving a warning message when a website is potentially fraudulent.

Is the website certified by an Internet trust organization?

Sites that display privacy certification logos have agreed to follow certain practices, such as providing a comprehensive privacy statement. If you read these statements, you should be able to determine what information the site collects and what the site does with that information (for example, whether it shares it with any other companies or uses it to display personalized advertisements). The certification does not indicate that the site collects no information. It means that the privacy statement will tell you what information (if any) the site does collect so you can decide if you want to use that website.

An Internet trust organization is a company that verifies that a website has a privacy statement (a posted notification of how your personal information is used) and that the website gives you a choice of how they use your information. Websites approved by Internet trust organizations are able to display the privacy certification seals, usually somewhere on their home page or order forms. However, these seals don't guarantee that a website is trustworthy; it just means the website complies with the terms acceptable to the Internet trust organization. Additionally, some unscrupulous websites might display the trust logos fraudulently. If you are not sure whether a trust logo is legitimate, contact the trust organization to see if the website is registered with them.

To learn more about these trust organizations, you can go to the TRUSTe (http://www.truste.com) website, the BBB Online (http://www.bbbonline.org) website, or the WebTrust (http://www.webtrust.org) website.

Is the website owned by a company or organization that you know well?

For example, if you bought merchandise from a physical store and were happy with the experience, you might want to try the store's website as well. However, even if you trust the company, always read the website's privacy or terms of use statement. Sometimes a company's website is independent of its stores, and it might have different privacy terms. Look for terms you don't agree with, such as requirements to accept e-mail offers or advertising from the website, or that your information is shared with the company's partners. If you are not comfortable with the terms or behaviors (for example, you do not want to be tracked or to see advertisements), do not use the site.

Does the website have a valid certificate?

A certificate is used primarily to help you identify the company or owner of the website. Extended Validation (EV)certificates turn the Address bar green, and provide more in-depth validation of the identity of a website. For more information see How to know if an online transaction is secure.

Does the website ask you for personal information?

If you are asked for personal information, such as credit card numbers or bank information, only provide it if there is a good reason to do so. Also, make sure there is a secure entry form for recording information. Look for a message stating that the information will be encrypted and check for the lock icon in the Security Status bar in the Internet Explorer Address bar (do not enter confidential information if there is no lock icon in the Address bar). Also, try to find out what the website's policy is about storing information: Do they keep your credit card number on file? Do they have partners that they share information with? You should be confident that the site is using your information properly and in a secure manner before providing any information.

On a retail website, is there a way to contact someone by phone or mail?

Do they have a phone number that you can call if you have a problem, or that you can use to place an order? Does the website list a street address? Is there a posted return policy with acceptable terms? If the site doesn't provide a phone number or physical address, try contacting the company by e-mail to ask for that information.

If you don't recognize the site, do you have other information to help you decide?

If you are not familiar with a website or it does not have a privacy certification seal, that might not necessarily mean that you cannot trust it. Ask reliable friends or colleagues about the site. Search for references to the site on the Internet to see if a source, such as a magazine or company that you do trust, has referred to it. Read the website's privacy statements or other disclosures (but keep in mind that the site might not necessarily abide by them).

A website might not be trustworthy if:

The site is referred to you through an e-mail message from someone you don't know. The site offers objectionable content, such as pornography or illegal materials. The site makes offers that seem too good to be true, indicating a possible scam or the sale of illegal or stolen products. You are lured to the site by a bait and switch scheme, in which the product or service is not what you were expecting. You are asked for a credit card as a verification of identity or for personal information that does not seem necessary. You are asked to provide a credit card number without proof that the transaction is secure.

Related Topics

What is phishing?

Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through an e-mail message or website. A common online phishing scam starts with an e-mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e-mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then typically used for identity theft.

What is spyware?

Spyware is software that can display advertisements (such as pop-up ads), collect information about you, or change settings on your computer, generally without obtaining your consent.

Understanding security and privacy features.

Internet Explorer offers a number of features to help protect your security and privacy when you browse the web.

Privacy features in Internet Explorer include settings that allow you to control how your computer handles cookies, privacy alerts that let you know when you try to go to a site that doesn't meet the criteria in your privacy settings, and ability to view a website's privacy policy.

What security features does Internet Explorer have?

Internet Explorer includes the following security features:

SmartScreen Filter, which can help protect you from online phishing attacks, fraud, spoofed, and malicious websites. For more information, see SmartScreen Filter: frequently asked questions.

Pop-up Blocker, which can help block most pop-up windows. For more information, see Pop-up Blocker: frequently asked questions.

Add-on Manager, which lets you disable or allow web browser add-ons and delete unwanted ActiveX controls. For more information, see How do browser add-ons affect my computer?

Notification when a website is trying to download files or software to your computer, or run programs other than Internet Explorer.

Digital signatures, which tell you who published a file and whether it has been altered since it was digitally signed. For more information, see What's a digital signature?

A 128-bit secure (SSL) connection for using secure websites. This helps Internet Explorer create an encrypted connection with websites run by banks, online stores, medical sites, or other organizations that handle sensitive customer information. For more information, see How to know if an online transaction is secure.

How can I protect my privacy when I'm online?

Internet Explorer provides the following features that can help protect your privacy when you're online:

InPrivate Browsing, which allows you to browse the web without recording a history in the browser. For more information, see What is InPrivate Browsing?

Privacy settings that specify how your computer handles cookies. For more information, see Change Internet Explorer Privacy settings.

The ability to view a website's privacy statement. For more information, see View a website's computer-readable P3P privacy policy.

How can I keep websites and programs from changing my default search provider?

Some websites and add-ons might try to change your default search provider. To learn how to prevent this, see How do I prevent programs from changing my default search provider?

Why am I getting the message Your security setting level puts your computer at risk?

You are getting this message because certain security settings are at a lower level than is recommended. By default, Internet Explorer has a minimum level for some settings that can help protect your computer from websites that are trying to install malicious or unwanted software without your knowledge or permission.

How do I know which settings are not at recommended levels?

To see which security settings are not at recommended levels, follow these steps:

To view Internet Explorer security settings:

Click the Tools button, and then click Internet Options.

Click the Security tab.

Click the Internet icon, and then click the Custom level button.

Settings that are not at recommended levels are highlighted in red.

When you are finished reviewing your security settings, click OK twice.

What is changed when I click Fix settings for me on the Information bar when my computer is at risk?

When you click Fix settings for me on the Information bar, Internet Explorer will reset the security settings that put your computer at risk back to their recommended settings.

How can I change Internet Explorer security settings?

To change Internet Explorer security settings

In Internet Explorer, click the Tools button, and then click Internet Options.

Click the Security tab.

Click the Internet icon.

Do one of the following:

To pick a preset security level, drag the slider.

To change individual security settings, click Custom level.

Change the settings as desired and click OK when you are done.

To set Internet Explorer back to the default security level,

click Default level.

Click Reset all zones to default level to clear any custom settings.

When you are finished making changes, click OK.

How do I change my Internet Explorer privacy settings?

Security zones: adding or removing websites.

Internet Explorer assigns all websites to one of four security zones:

Internet, Local intranet, Trusted sites, or Restricted sites.

The zone to which a website is assigned specifies the security settings that are used for that site. You can choose which websites to assign to the Intranet, Trusted, or Restricted zones. By adding a website to a specific zone, you can control the level of security used on that site. For example, if you have a list of websites that you visit and you completely trust those sites, add those sites to the Trusted zone.

To add a website to a security zone.

In Internet Explorer, navigate to the website that you want to add to a specific security zone.

Click the Tools button, and then click Internet Options.

Click the Security tab, and then click a security zone (Local intranet, Trusted sites, or Restricted sites).

Click Sites.

If you clicked Local intranet in step 3, click Advanced.

The website should be shown in the Add this website to the zone field. Click Add.

If the site is not a secure site (HTTPS), clear the Require server verification (https:) for all sites in this zone check box.

Click Close, and then click OK (or click OK twice if you clicked Local intranet in step 3).

To remove a website from a security zone.

In Internet Explorer, click the Tools button, and then click Internet Options.

Click the Security tab, and then click a security zone (Local intranet, Trusted sites, or Restricted sites).

Click Sites.

If you clicked Local intranet in step 2, click Advanced.

In Websites, click the website that you want to remove.

Click Remove.

Click Close, and then click OK (or click OK twice if you clicked Local intranet in step 2).

Related Topics:

To change Internet Explorer privacy settings

In Internet Explorer, click the Tools button, and then click Internet Options.

Click the Privacy tab.

Under Settings, do either of the following:

To allow or block cookies from specific websites, click Sites.

To load a customized settings file, click Import. These are files that modify the rules that Internet Explorer uses handle cookies. Since these files can override default settings, you should only import them if you know and trust the source. When you are finished making changes to your privacy settings, click OK.

Where can I find more information about protecting my computer and my privacy when I'm online?

You can find information about these topics on the Microsoft Security (http://www.microsoft.com/security) website and the Microsoft Protect Your PC (http://www.microsoft.com/athome/security/protect/windowsxpsp2) website.

Related Topics

How can I allow active content?

If Internet Explorer restricts active content that you are sure you want to allow, click the Information bar, and then click Allow blocked content.

Related

To assign a website to a security zone:

In Internet Explorer, click the Tools button, and then click Internet Options.

Click the Security tab, and then click a security zone: Local intranet, Trusted sites, or Restricted sites.

Click the Sites button. If you clicked Local intranet in step 2, click Advanced.

Type the Internet address (URL) for the website that you want to add to this zone, and then click Add.

If you want to add a website to the list of trusted sites, but the site is not secured (the address begins with HTTP instead of HTTPS), clear the Require server verification (https:) for all sites in this zone check box before adding the address. If that option is selected, you can only add secure websites to the list.

Repeat step 4 for each site you want to add to the zone.

When you are finished adding sites, click Close, and then click OK.

Notes

You cannot add websites to the Internet zone. This zone automatically includes everything that does not belong to any other zone or is not stored on your computer.

To remove a website from a zone, complete steps 1 through 3. In the Websites list box, click the name of the website you want to remove, and then click Remove.

If you want Internet Explorer to help verify that the server for the website is secure before adding it to the Trusted sites zone, select the Require server verification (https:) for all sites in this zone check box.






HOME