High-Risk Trackers Active Without Explicit Consent

GDPR classifies browser fingerprinting as personal data processing requiring prior consent, and session replay tools that capture form data or personal information require explicit, informed consent (GDPR Article 4). Non-compliance carries fines up to €20M or 4% of global annual revenue, whichever is higher (GDPR Article 83). These are the highest-risk trackers regulators look for because they're inherently invasive.

Start here

Before You Fix It: What This Check Means

Sensitive-tracker controls reduce risk from replay/chat-style tooling before explicit consent. In plain terms, higher-risk trackers should not run before explicit consent. Scavo evaluates one control.

Why this matters in practice: this signal influences reliability, trust, and diagnosability of your production setup.

How to use this result: treat this as directional evidence, not final truth. This result reflects what was observable at scan time and should be verified in your own production context. First, confirm the issue in live output: verify directly in live production output with browser/network tools Then ship one controlled change: Classify replay/chat/behavioral tools into high-risk consent categories. Finally, re-scan the same URL to confirm the result improves.

TL;DR: Session replay, fingerprinting, or invasive tracking tools are running without explicit consent — a serious GDPR and CCPA liability.

GDPR classifies browser fingerprinting as personal data processing requiring prior consent, and session replay tools that capture form data or personal information require explicit, informed consent (GDPR Article 4). Non-compliance carries fines up to €20M or 4% of global annual revenue, whichever is higher (GDPR Article 83). These are the highest-risk trackers regulators look for because they're inherently invasive.

What Scavo checks (plain English)

Scavo evaluates one control:

  • LC-S4: are high-risk tracker-family hosts observed in pre-consent runtime signals?

Current logic behavior:

  • Fail: matched high-risk hosts are seen pre-consent
  • Info/Inconclusive: high-risk provider signatures exist but runtime evidence is incomplete
  • Warning: high-risk provider family detected statically, but no pre-consent firing observed
  • Pass: no high-risk pre-consent exposure detected

How Scavo scores this check

Scavo assigns one result state for this check on the tested page:

  • Pass: baseline signals for this check were found.
  • Warning: partial coverage or risk signals were found and should be reviewed.
  • Fail: required signals were missing or risky behavior was confirmed.
  • Info: Scavo could not gather enough reliable evidence on this run to score pass/fail confidently.

In your scan report, this appears under What failed / What needs attention / What is working for legal_sensitive_tracker_risk, followed by Recommended next steps and Technical evidence (for developers) when needed.

  • Scan key: legal_sensitive_tracker_risk
  • Category: LEGAL_COMPLIANCE

Why fixing this matters

Users are especially sensitive to tools that can capture detailed behavior. If those tools run before consent, trust and legal risk both increase.

For teams, this check helps enforce "least invasive by default" behavior on sensitive journeys.

If you are not technical

  1. Ask for a list of high-risk tools currently installed and where they run.
  2. Require explicit consent gating proof for those tools on key routes.
  3. Review sensitive pages (signup, account, billing, support forms) first.
  4. Re-run Scavo and confirm this check improves.

Technical handoff message

Copy and share this with your developer.

Scavo flagged Sensitive tracker risk exposure (legal_sensitive_tracker_risk). Please prevent high-risk tracker families from firing pre-consent, especially on sensitive journeys, and provide route-level runtime evidence after remediation.

If you are technical

  1. Classify replay/chat/behavioral tools into high-risk consent categories.
  2. Default them to blocked until explicit opt-in.
  3. Disable them entirely on sensitive routes unless clearly justified.
  4. Apply vendor-side minimization controls (masking, reduced capture scope, retention limits).
  5. Add canary tests that fail when high-risk hosts appear pre-consent.

How to verify

  • In a clean session, load target route without consenting.
  • Confirm high-risk hosts do not appear in network requests.
  • Confirm they only activate after explicit opt-in (if enabled at all).
  • Re-run Scavo and inspect matched_high_risk_preconsent_hosts.

What this scan cannot confirm

  • It is not legal advice or a complete legal risk determination.
  • It cannot fully inspect provider-side processing beyond observable runtime evidence.
  • Custom/private tracker hostnames may need manual allow/deny mapping outside defaults.

Owner checklist

  • [ ] Assign one owner for high-risk tracker governance.
  • [ ] Keep route-level tracker policy documented.
  • [ ] Re-audit after adding new chat/replay/behavioral vendors.
  • [ ] Include sensitive-route checks in every major release QA cycle.

FAQ

Which tools are considered "high risk" here?

Tools with richer behavioral capture patterns (session replay-like tooling and surveillance-heavy chat stacks), especially when they load before consent.

Can we keep these tools and still pass?

Yes, if they do not fire pre-consent and your implementation is tightly controlled.

Why can this return warning instead of fail?

Warning can appear when static provider signatures exist but runtime evidence did not show pre-consent firing in that run.

Should sensitive routes have stricter policy than marketing pages?

Usually yes. Route-level risk controls are often the safest practical approach.

Sources


This guide is operational guidance, not legal advice.

More checks in this area

legal_post_reject_tracking

Tracking Continues After Cookie Rejection — GDPR Non-Compliance

The EDPB Cookie Banner Taskforce confirmed that when users reject cookies, all third-party tracking must stop immediately (EDPB Report, 2023-2024). Sweden's data authority ruled in March 2025 that even making the "accept" button more visually prominent than "refuse" violates compliance rules. If your trackers persist after rejection, you're not just non-compliant — you're creating audit evidence against yourself.

Open guide
legal_preconsent_tracking

Tracking Fires Before Cookie Consent — GDPR Violation Risk

CNIL fined Google €150M in 2021 for making cookie rejection harder than acceptance, then escalated to a €325M fine in September 2025 for inserting ads without valid consent (CNIL enforcement records). These aren't just big-company problems — the EDPB's 2024 guidelines confirm that any storage or access to information on user devices (cookies, URL tracking, pixel tracking) requires prior consent. Every unconsented tracker impression is a violation.

Open guide
legal_california_opt_out

CCPA "Do Not Sell" Opt-Out Link Missing or Broken

The California Privacy Protection Agency fined Tractor Supply $1.35M in September 2025 — the largest CCPA fine to date — because their "Do Not Sell" link routed to a form that didn't actually stop data selling (CPPA Final Order). Disney paid $2.75M for similar non-compliance. CCPA fines are $2,663 per negligent violation and $7,988 per intentional violation (adjusted 2024 rates).

Open guide