Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection

This study reveals that while Google trackers are more prevalent than Meta's, Meta's trackers are significantly more likely to be configured to collect sensitive Personally Identifying Information from web forms, a practice often encouraged by inaccurate documentation and default setup flows despite policy violations.

Julia B. Kieserman, Athanasios Andreou, Chris Geeng, Tobias Lauinger, Damon McCoy

Published 2026-03-06
📖 5 min read🧠 Deep dive

Here is an explanation of the paper "Tracker Installations Are Not Created Equal," broken down into simple concepts with creative analogies.

The Big Picture: The "Digital Spy" Setup

Imagine you run a lemonade stand (a website). You want to know who likes your lemonade so you can send them coupons later. To do this, you hire a "marketing assistant" (a tracker like Meta Pixel or Google Tag) to watch your customers.

Usually, these assistants just count how many people stop by. But the companies that own these assistants (Meta and Google) have a secret menu: they can be configured to scoop up personal details like names, phone numbers, and emails from the sign-up sheets your customers fill out.

This paper investigates a crucial question: Are website owners actually turning this "personal info scoop" on, and are the instructions given to them making it too easy to do so?


1. The Instruction Manuals are "Tricky"

The researchers looked at the instruction manuals and setup screens provided by Meta and Google. They found that these guides are designed like a salesperson trying to upsell you, rather than a neutral teacher.

  • The "Default" Trap: Imagine buying a new coffee machine. The default setting is "Brew the strongest, most expensive coffee possible," and you have to actively uncheck a box to make it weaker. Meta and Google do this with privacy. They set the machine to collect all your personal data by default. If you want to stop them, you have to know exactly which buttons to press.
  • The "Magic Hash" Lie: The manuals tell website owners, "Don't worry! We will scramble (hash) the names and emails so they are anonymous." It's like telling someone, "We'll put your name in a blender, so it's safe!" But the researchers found that the companies can still un-blend the smoothie. They can match the scrambled data back to real people. The FTC (the US consumer protection police) has actually warned that this "scrambling" isn't a real privacy shield.
  • The "Fear of Missing Out" (FOMO): The guides use language that makes website owners feel like they are losing money if they don't collect data. It's like a gym membership saying, "If you don't track every step you take, you'll never get fit." This pressures owners to turn on the data collection even if they don't fully understand the risks.

2. The Two Assistants: Meta vs. Google

The study compared the two biggest assistants: Meta Pixel (Facebook/Instagram) and Google Tag (Google Ads/Analytics).

  • Meta Pixel (The Pushy Salesperson): Meta's setup process is like a guided tour where the guide keeps pointing at the "Collect Everything" button. It's very easy to accidentally (or intentionally) turn on the scoop for names, phones, and emails.
    • Result: 62% of websites using Meta have this "scoop" turned on.
  • Google Tag (The Confusing Maze): Google's setup is a bit more complex. The "Collect Personal Info" button isn't right in your face during the main setup; you have to go digging for it.
    • Result: Only 11.6% of websites using Google have this "scoop" turned on.

The Twist: Even though Google is installed on way more websites (72% vs. 28%), Meta is the one actually stealing the data more often because its setup flow pushes you to do it.

3. The "Sensitive" Zones (Hospitals and Banks)

There are special rules for places dealing with sensitive data, like hospitals (Health) and banks (Finance). In the US, it's illegal to leak patient or financial data to advertisers.

  • The Self-Report System: Meta and Google have a rule: "If you are a hospital or bank, tell us, and we will turn off the data scoop."
  • The Loophole: It's like a "Honor System" at a candy store. The store asks, "Are you a kid?" If you say "No," they give you the candy. But they don't check your ID.
  • The Findings: The researchers found many hospitals and banks that should have been protected but weren't. They either didn't tell the tracker they were sensitive, or they were mislabeled.
    • Example: They found a drug rehab center and a credit card company that were configured to send patient names and financial data straight to Meta and Google.

4. What Data is Being Stolen?

When the "scoop" is turned on, what exactly is being taken?

  • The Big Three: Almost every time, the trackers are set to grab Emails, Names, and Phone Numbers.
  • The "Perfect Profile": By combining these three, the tracker can build a complete profile of a real human being, linking their online browsing habits to their real-world identity.

5. Why Does This Matter?

This isn't just about annoying ads.

  • Privacy Risks: If a hospital's tracker leaks a patient's name and condition to an advertiser, that patient could be targeted with ads for specific treatments or insurance, violating their privacy and potentially their legal rights (HIPAA).
  • The "Bad Defaults" Problem: The paper argues that the companies (Meta and Google) are designing their tools to make privacy the hard choice and data collection the easy choice. They are counting on website owners (who might be busy or not tech-savvy) to just click "Next" without reading the fine print.

The Takeaway

The paper concludes that tracker installations are not created equal.

  • Meta is aggressively guiding website owners to collect personal data, often hiding the risks.
  • Google is a bit more passive but still confusing.
  • The Solution: Website owners need to be more careful (and maybe hire experts to check their settings), and the government needs to step in because the "self-policing" by these tech giants isn't working.

In short: The instructions for installing these trackers are like a recipe that says, "Add a cup of your customer's private secrets to the mix for better flavor," and most website owners are just following the recipe without realizing they are cooking up a privacy disaster.