Logo

Online Tracking (2025)

A practical 2025 guide for Australian businesses and everyday web users

You search for hiking boots once and they “follow” you around the internet for a week. That’s online tracking at work. This guide explains—clearly and calmly—what’s happening under the hood, how businesses use it, and what both site owners and users can do to keep things transparent, lawful, and respectful.

What is online tracking?

Online tracking (or website tracking) is the process of observing and recording how people interact with websites and apps—pages visited, features used, content viewed, and outcomes such as sign-ups or purchases. Done well, it helps organisations:

Done poorly—without transparency, consent, or restraint—it becomes intrusive and may breach privacy laws.

Why organisations track: legitimate use cases

1. Analytics & UX: Spot friction, crashes, and confusing flows to improve usability.

2. Security & fraud prevention: Detect suspicious logins, bot traffic, or credential-stuffing.

3. Personalisation: Remember preferences, accessibility settings, or past interactions.

4. Marketing & attribution: Measure which campaigns drove visits, leads, or sales.

5. Compliance & auditing: Maintain consent logs and produce privacy records.

Key principle: You don’t need everything. Collect only what’s necessary for a clear purpose—then protect and delete it responsibly.

What data do websites typically collect?

The specifics depend on the service and consent you provide. Common categories include:

How tracking works: the main technologies

1. Cookies (first-party & third-party)

Small text files a site stores in your browser.

User controls: Clear cookies; block third-party cookies; use privacy modes.

2. Local Storage & Session Storage

Browser storage areas websites can write to; larger than cookies and not sent with every request. Good for preferences and performance, but still subject to consent and minimisation.

3. Tracking Pixels & Web Beacons

Tiny (often invisible) images or network requests that load from a server when a page or email is opened. They log events like page views, conversions, device info, IP, and timestamps.

Email marketing routinely uses pixels to measure open rates. Some mail clients now block or pre-fetch images to blunt this tracking.

4. JavaScript Tags & SDKs

Snippets provided by analytics/ads vendors execute in the browser or in an app’s  SDK to record events (e.g., “Add to Cart”, “Form Submit”). Powerful—but must be audited to avoid over-collection and performance drag.

5. Browser Fingerprinting

Combines a soup of seemingly generic attributes— fonts, plugins, screen resolution, timezone, canvas/webGL rendering quirks—to create a probabilistic identifier. It’s harder for users to control and is frowned on by regulators unless it’s strictly necessary (e.g., fraud prevention) and disclosed.

6. HTTP Referrer

When you click a link, the referrer header may tell the destination which page you came from. Useful for analytics and attribution. Browsers and sites can limit this via Referrer-Policy (e.g., strict-origin-when-cross-origin).

7. User-Agent Strings & Client Hints

Used to identify browser/OS for compatibility and analytics. Modern Client Hints reduce passive fingerprinting by sharing only what’s needed and only when the site asks for it.

8. Campaign Parameters (UTM & friends)

utm_source, utm_medium, utm_campaign and similar query parameters tag marketing links, letting analytics tools attribute traffic and conversions to a channel or ad.

9. Mobile Advertising IDs

Apple’s IDFA and Android’s Advertising ID enable app-to-app ad attribution—subject to user permission (e.g., ATT prompts on iOS). Users can reset or limit these in system settings.

10. Wi-Fi, Bluetooth & Location Analytics

In physical spaces (stores, venues), anonymised device probes can indicate foot-traffic patterns. Lawful use requires strong de-identification, signage, and (where required) consent.

11. Server-Side Tagging & CDPs

Data collection increasingly shifts from the browser to the server, giving site owners better security, rate limits, and data minimisation control. Customer Data Platforms (CDPs) unify first-party data (with consent) across systems

First-party vs third-party tracking (and why it matters)

The big shift: Browsers and regulators now limit third-party tracking. Expect first-party data (with consent) + contextual advertising + on-device privacy APIs to dominate.

Australian legal backdrop: APPs in plain English

If your organisation handles personal information in Australia, you’re likely bound by the Australian Privacy Principles (APPs) under the Privacy Act 1988 (Cth). In practice that means:

Not legal advice. If you target residents in other jurisdictions (EU, UK, US states), you may also need to comply with GDPR, UK GDPR, or CCPA/CPRA, which have stricter consent and data subject rights.

Myths vs facts

Practical guidance for website owners

What is online tracking and how do websites do it-Computing Australia Group

1. Map your data flows

2. Minimise by default

3. Implement a Consent Management Platform (CMP)

4. Prefer first-party and server-side

5. Tighten security

6. Be transparent

7. Set sensible retention

8. Enable user rights

9. Test & monitor

10. Prepare for incidents

Practical guidance for everyday users

Glossary (Jargon Buster)

FAQ

Some email clients block remote images by default; you can also switch to plain-text view or disable image loading. Marketers now rely more on click and conversion signals instead.

Typically yes—cookies strictly necessary for a service you requested (logins, baskets, load balancing). You still need to disclose them.

It’s risky. Many regulators expect explicit justification (e.g., fraud prevention) and clear disclosure. For marketing, it’s usually discouraged.

Expect a pivot to first-party data, contextual ads, aggregated measurement, and on-device privacy APIs.