Skip to main content

All you need to know about web cookies

Hello guys ,we all know as a web developers we need cookies ,i am not talking about the normal cookies , I'm talking of web cookies, it's a really good cookie for us 😋.All dynamic website uses cookies in one way or the other and we would be talking about all the types of cookies websites uses.

What are cookies?

Cookies are small text files placed on a user’s computer (or smartphone), which are commonly used to collect personal data.
Most website operators place cookies on the browser or hard drive of their user's computer. Cookies can gather information about the use of a website or enable the website to recognise the user as an existing customer when they return to the website at a later date. This file is neither a virus nor spyware.
The law protects website users and lets them opt-out from the use of cookies on their website browser.

What are the benefits of cookies?

Cookies are used to make the user's web experience faster, convenient and personalised. For example you can select a language to view a website the first time you visit it. When you visit the website again it will save your preference.With cookie,ecommerce websites can know your country's currency,they can know what sells most in your country and show you as recommendables.With cookies,you can get discounts on thungs based in your country and much more! Cookies are great for users and the devlopers to!
With cookies you can specifically block a user from viewing your site and lot more.

Types of cookies

Session cookies

Session cookies, also known as 'temporary cookies', help websites recognise users and the information provided when they navigate through a website. Session cookies only retain information about a user's activities for as long as they are on the website. Once the web browser is closed, the cookies are deleted. These are commonly used on shopping websites or e-commerce websites.Learn how to create Session cookies in php or

Permanent cookies

Permanent cookies, also known as 'persistent cookies', remain in operation even after the web browser has closed. For example they can remember login details and passwords so web users don't need to re-enter them every time they use a site. The law states that permanent cookies must be deleted after 12 months.

Third-party cookies

Third-party cookies are installed by third-parties with the aim of collecting certain information from web users to carry out research into, for example, behaviour, demographics or spending habits. They are commonly used by advertisers who want to ensure that products and services are marketed towards the right target audience.

Flash cookies

Flash cookies, also known as 'super cookies', are independent from the web browser. They are designed to be permanently stored on a user's computer. These types of cookies remain on a user's device even after all cookies have been deleted from their web browser.

Zombie cookies

Zombie cookies are a type of flash cookie that are automatically re-created after a user has deleted them. This means they are difficult to detect or manage. They are often used in online games to prevent users from cheating, but have also been used to install malicious software onto a user's device.

Law on cookies

The basic rule around cookies is that websites must:
  1. tell people the cookies are there and what cookies are being used.
  2. explain what the cookies are doing and why, and
  3. get the user's consent to store a cookie on their device
This can be set out and achieved in a Website privacy policy.

What counts as consent?

Consent must be freely given, specific and informed. It must involve some form of unambiguous positive action, for example by ticking a box or clicking a link. The user must fully understand that they are giving consent.
Therefore, consent cannot be given if the information is only provided as part of a privacy policy that is hard to find, difficult to understand, or rarely read.
Consent does not necessarily have to be explicit consent. However, consent must be given by a clear positive action. Users must fully understand that their actions will result in specific cookies being set, and have taken a clear and deliberate action to give consent. This must be more than simply continuing to use the website. To ensure that consent is freely given, users should be able to disable cookies.

Enforcement and penalties

The Information Commissioner's Office (ICO) is responsible for ensuring organisations comply with the law on cookies. They take a practical and proportionate approach to enforcing the rules on cookies. Where a business fails or refuses to comply with the rules, the ICO can take specific action as described below.

Information notices

The ICO can submit information notices which requires organisations to provide the ICO with specific information within a certain time period.

Undertakings

Undertakings force organisations to take a particular course of action in order to improve its compliance.

Enforcement notices

Enforcement notices compel an organisation to take action specified in the notice. For example, a notice may be served to compel an organisation to start gaining consent for cookies. Failure to comply with an enforcement notice can be a criminal offence.

Monetary penalty notice

A monetary penalty notice requires an organisation to pay a monetary penalty of an amount determined by the ICO, up to a maximum of £500,000. This power can be used if any person has seriously contravened the law and if the breach is likely to cause substantial damage or distress.

Comments

Popular posts from this blog

Ecommerce single item cart with php checkoit

email otp sms How to create an ecommerce single item cart with checkout integrations Guys today i am going to teach you guys how to build an ecommerce site with checkout integration but only with a single product, you can add more to it So we are building it using my favorite PHP ,Ajax and JQuery. I have already created a simple shopping cart code in PHP with the product gallery.let's get this over with What are we building? I am not meant to show you this but i would to make you exited about it.And look at the cool checkout page and it really works!!. Single product UI with buy now and Checkout controls This is the code of the landing page created for this example. It includes PHP snippets at the beginning. After that, it has the HTML for displaying only one product tile to users. This tile has the “ Buy now ” button. On clicking it will show an HTML form to collect the customer details, name and email address. By submitting the customer details, it calls the

Mobile SMS OTP

mobile otp sms How to build SMS otp for verification in php Today ,i am going to teach you something you cannot find easily on the web,which is sms otp . you can also learn email otp .You see that screenshot above? that's exactly what we are building,cool isn't it ? OTP is an effective way of validating users. This type of validation is widely followed by the banking applications, e-commerce software, and many more verticals. In this tutorial, we are going to see how to implement OTP SMS mobile number verification using PHP,isn't that fun?! There are various APIs available in the market for sending SMS via an application. In this code, I have used the Textlocal API for sending OTP SMS. Textlocal is one of the popular SMS services. It provides the SMS service for many programming languages. Download the API PHP class to integrate it into our application platform. For verifying a mobile number by sending OTP SMS with the use of Textlocal API, we need to create a Textlo

Email OTP

email otp sms Email OTP Login with an OTP code is a secure method for the user authentication process. In this method, a one-time password is generated dynamically and sent to the user who attempts login. OTP can be sent to the user’s email or his mobile phone. When the user enters the OTP code then the application will authenticate the user via this code. In this tutorial, we are going to see an example to authenticate user login via an OTP code using email. You can check our mobile sms otp too!  In this example, when the registered user enters email to login, an OTP code is sent to the email address. Using this OTP code the user will be validated. Once the user uses this code then it will be invalid, meaning it cannot be used again. Also, this token will be valid for a day, then it will be expired. Login form with OTP The following code shows login form to the user to enter his email address. On entering email, it shows an input to enter the OTP code sent to his email addres