16 April, 2026

Securing your digital footprint: Monitoring beyond registration

Insights

Beyond registration: Securing your digital assets

Owning a trademark certificate in the European Union provides a legal shield, but a shield only works if you are prepared to raise it when the arrows start flying. Many founders believe that obtaining a registration number marks the end of their intellectual property journey, yet the real battle for market share often takes place in the digital shadows. Our guide on scaling your business through strategic monitoring provides the theoretical foundation for this vigilance, but applying those principles to the internet’s vast landscape requires a more surgical approach.

Whether you are dealing with a direct competitor or learning how to fight trademark squatters in Europe who hijack your brand’s reputation for profit, your digital assets require constant surveillance. For fast-growing companies, utilizing specialized EU trademark monitoring services for startups is no longer a luxury—it is the baseline for operational survival. You must view your registration not as a final trophy, but as the primary tool for active enforcement across every digital touchpoint.

To effectively manage this risk, every business owner should follow a rigorous Digital Checklist to ensure no asset is left unprotected:

  • Audit all top-level domains (TLDs) related to your brand name.
  • Monitor social media handles across all major and emerging platforms.
  • Scan mobile app stores for unauthorized use of brand assets.
  • Review marketplace seller names on platforms like Amazon and eBay.
  • Track mentions in digital advertising and meta-tags.

This systematic approach transforms a static legal right into a dynamic defense mechanism, beginning with understanding the digital extension of your trademark rights.

The digital extension of trademark rights

Does your trademark protection end where the EUIPO’s official database stops? The short answer is no; your legal rights extend into every corner of the digital ecosystem where your brand is represented. While a legally sound trademark registration in the EU serves as the essential anchor for your digital assets, it remains merely the entry ticket to enforcement. This legal foundation allows you to assert ownership not just against rival products, but against domain hijackers and social media impersonators.

The following sections define the components of your digital footprint and explain why waiting for a problem to arise is the costliest mistake a business owner can make. Seeking legal help for trademark infringement in the EU is often a reactive response to a crisis, but a proactive stance can prevent the crisis entirely. By understanding how to fight trademark squatters in Europe before they gain a foothold, you protect your revenue and your customer’s trust. We will begin by identifying exactly what constitutes your brand’s digital presence in the eyes of the law.

Defining your brand digital footprint

A brand’s presence is no longer confined to a single website; it is a complex web of interconnected identifiers. In the context of the digital extension of trademark rights, your digital footprint consists of every instance where your brand name, logo, or likeness appears across the internet. If you are operating in highly competitive markets, such as e-commerce, knowing how to stop someone using your brand name in Germany or other key jurisdictions starts with identifying these specific touchpoints. Even if you have mastered the basics of how to fight trademark squatters in Europe, you cannot protect what you haven’t mapped.

Your digital footprint includes several critical categories of assets:

  • Domain Names: This encompasses not only your primary .com or .eu addresses but also country-code Top-Level Domains (ccTLDs) and generic TLDs (gTLDs) that might be registered by bad actors to divert your traffic.
  • Social Media Handles: Unique identifiers across platforms like LinkedIn, Instagram, and TikTok, where impersonation can lead to immediate and widespread reputational damage.
  • Mobile Application Stores: Unauthorized apps on the Apple App Store or Google Play that use your brand name to mislead users or harvest sensitive data.
  • Online Marketplaces: Seller accounts on Amazon, eBay, or Allegro that may use your trademark to sell counterfeit or gray-market goods, eroding your margins.

Mapping these assets is the first step in ensuring your brand remains exclusive and secure. Identifying these vulnerabilities reveals exactly why surveillance cannot remain a passive exercise, but must become a proactive part of your business strategy.

Why surveillance must be proactive

Passive reliance on a registration certificate often creates a false sense of security. While your legal rights are established at the moment of registration, bad actors do not wait for a formal invitation to exploit your success. Waiting for a direct report of fraud before acting can result in irreversible traffic diversion, where potential clients are funneled to competitors or malicious phishing sites. Proactive surveillance ensures that you detect these anomalies before they escalate into significant revenue leaks.

By shifting from a reactive stance to a systematic monitoring approach, we help you transform a static legal right into an active business defense. Effective monitoring identifies bad-faith registrations of domain names and social media handles in real-time, allowing for immediate intervention. This speed is critical: the longer an impersonator operates, the higher the cost of combating trademark squatters in Europe and the greater the risk of your original brand identity being diluted in search engine rankings.

The Digital Footprint Security Checklist

  • Monthly Domain Audit: Scrutinize all new registrations involving your brand name across .eu, .com, and local extensions like .de or .fr.
  • Cross-Platform Handle Sync: Periodically verify that your brand’s identifiers on LinkedIn, Instagram, and emerging platforms aren’t being claimed by “placeholders.”
  • App Store Scans: Search for mobile applications using your logo or brand name without authorization to prevent data harvesting.
  • Automated Keyword Alerts: Set up tracking for your core trademark and its common misspellings to catch typosquatters early.
  • SSL Certificate Monitoring: Monitor for unauthorized SSL certificates issued for domains that mimic your brand, a common precursor to phishing.

Integrating these steps into your quarterly operations significantly reduces the workload required to resolve disputes later. This proactive posture serves as the essential groundwork for addressing the most common online threat: the strategic registration of domains intended to harm your business.

Combating cybersquatting and domain infringements

How many customers are currently landing on a look-alike URL instead of your official website? In the digital marketplace, your domain name is the most valuable real estate you own, yet it is also the most vulnerable to bad-faith interference. Protecting this asset requires more than just ownership; it requires a strategy for combating trademark squatters in Europe who specialize in hijacking your digital reputation for profit. This challenge is particularly acute in mature e-commerce environments, where understanding how to scale your business with strategic EU trademark monitoring is the only way to maintain a competitive edge.

When operating in high-stakes jurisdictions, such as the German e-commerce sector, the speed of legal response can determine whether you retain or lose your market share. In Germany, domain disputes often involve aggressive legal maneuvers that require immediate, localized expertise to navigate. BrandR provides the necessary framework to address these infringements, whether they occur through deliberate cybersquatting or the subtle use of deceptive domains. In the following sections, we will analyze the technical differences between administrative recovery procedures and how to identify the subtle variations in domain names that threaten your brand integrity.

UDRP versus EUIPO administrative procedures

When a squatter registers a domain that mirrors your brand, you face a strategic choice between different recovery mechanisms. The Uniform Domain-Name Dispute-Resolution Policy (UDRP) administered by WIPO is designed specifically for domain recovery, while procedures through the EUIPO focus on the validity of the trademark itself. Choosing the wrong path can lead to what happens if someone opposes your EU trademark in a way that creates unnecessary delays or costs. Understanding the nuances of each procedure is vital for obtaining legal help for trademark infringement in the EU that actually yields results.

The UDRP is generally preferred for domain-specific disputes because it offers a streamlined path to transfer ownership, provided you can prove the domain was registered in bad faith. In contrast, EUIPO proceedings or national court actions in countries like Germany are broader, targeting the use of the name in commerce rather than just the domain registration. For businesses focused on digital growth, the speed of the UDRP often outweighs the broader injunctive powers of a court.

Feature UDRP (WIPO) EUIPO Administrative Action National Courts (EU)
Primary Goal Transfer or cancellation of a domain. Opposition or cancellation of a TM. Injunctions, damages, and TM usage stops.
Average Duration 60–90 days. 12–24 months. 6 months to 2+ years.
Estimated Cost Moderate ($1,500 – $5,000+ fees). Low to Moderate (Official fees €320+). High (Varies significantly by country).
Key Outcome Direct transfer of the URL to you. The squatter loses their TM registration. Enforceable court order and monetary compensation.

Navigating these choices requires a clear assessment of whether your goal is to simply gain control of a URL or to stop a competitor’s wider business operations. While administrative procedures handle clear-cut cases of bad faith, protecting your brand also requires vigilance against more subtle tactics, such as the use of deceptive typos or visually similar character replacements.

Monitoring typosquatting and deceptive domains

Typosquatting represents a more insidious threat than traditional domain grabbing because it targets the natural human error of your customers. By registering domains with minor misspellings, transposed letters, or alternative top-level domains (TLDs), bad actors divert high-intent traffic to phishing sites or competitors. Effective monitoring must account for these permutations to ensure that your digital borders remain secure against opportunistic exploitation.

Identifying malicious domain variations

Malicious actors often rely on several predictable patterns to mirror your brand. When configuring your surveillance tools, it is necessary to track not only your exact brand name but also common phonetic similarities and visual mimics. For instance, replacing the letter ‘l’ with the number ‘1’ or ‘o’ with ‘0’ (homoglyphs) can easily deceive a casual user. Understanding how to fight trademark squatters in Europe who use these tactics requires a proactive approach to identification before these domains are used to host harmful content.

Digital Brand Security Checklist

  • Monthly WHOIS Audit: Regularly check for new registrations that incorporate your core brand keywords across various TLDs (.net, .biz, .shop).
  • Typosquatting Permutation Analysis: Monitor common keyboard slips (e.g., “brandr” vs. “brandre”) and character substitutions.
  • SSL Certificate Monitoring: Track the issuance of security certificates for domains containing your trademark, as this often precedes a phishing launch.
  • Subdomain Surveillance: Ensure third-party platforms aren’t hosting unauthorized subdomains (e.g., yourbrand.scam-site.com).

In highly competitive markets, especially within the e-commerce sectors of the EU, these deceptive domains are often used to siphon sales. If you find your intellectual property being weaponized in specific jurisdictions, you may need to learn how to stop someone using your brand name in Germany or other key markets where local enforcement protocols can be faster than international arbitration. Identifying these variations early is the only way to minimize the need for expensive legal help for trademark infringement in the EU later on.

While securing the perimeter of your web addresses is critical, the modern digital footprint extends into the social spaces where your customers interact directly with your brand identity.

Monitoring social media and impersonation

Does a secure domain portfolio guarantee your brand’s safety in the digital ecosystem? Not anymore. While your website is your home, social media platforms are your storefronts, and they are increasingly vulnerable to impersonation and bad-faith registrations. Navigating this landscape requires more than just a certificate; it requires a strategy for how to fight a trademark squatter in Europe when they pivot from URLs to Instagram handles or LinkedIn profiles.

As we discussed in our guide on scaling your business with strategic EU trademark monitoring, your legal rights are only as effective as your enforcement. Obtaining a trademark registration in the EU provides the necessary leverage to utilize “Brand Registry” tools on major platforms, which significantly accelerates the takedown process. In the following subsections, we will explore the nuances of identifying true impersonation versus harmless fan activity and the specific legal steps required to clear the social space of fraudulent accounts.

Distinguishing between a legitimate critic and a malicious imposter is the first step in maintaining a clean and authoritative social presence.

Identifying brand impersonation on platforms

Brand impersonation on social media is often more damaging than domain squatting because it involves direct interaction with your audience. Sophisticated bad actors do not just use your name; they clone your visual identity, copy your latest marketing campaigns, and mimic your corporate tone to gain the trust of your followers. Detecting these accounts early is vital to prevent fraud, but it requires a clear understanding of what constitutes a legal violation versus protected speech.

Distinguishing fraud from fan engagement

Not every account using your brand name is a target for enforcement. Intellectual property law in the EU provides certain leeway for parody, commentary, and fan-led communities. However, the line is crossed when an account creates a likelihood of confusion or engages in commercial activity. When analyzing how to fight trademark squatters in Europe who operate on social platforms, you must look for specific indicators of bad faith.

Feature Authorized/Fan Page Malicious Impersonator
Intent Discussion, reviews, or community building. Diversion of sales, phishing, or reputation damage.
Visuals Often uses unique or transformative art. Exact copies of official logos and headers.
Links Links to the official site or varied sources. Links to deceptive checkout pages or malware.
Verification Usually lacks official badges; states “unofficial.” May attempt to buy or fake verification status.

If an account is actively siphoning your leads or posting as if they are your official customer support, you must act decisively. Professional legal help for trademark infringement in the EU often begins with gathering time-stamped evidence of this confusion. Knowing what happens if someone opposes your EU trademark efforts on these platforms—such as a counter-notice from a squatter—is essential for preparing a robust case. Once an imposter is identified, the focus shifts from detection to the mechanics of removal through platform-specific legal channels.

The next step involves moving from identification to action, utilizing the specific takedown mechanisms available to registered trademark holders.

Effective takedown strategies for business

Converting identified infringements into successful takedowns requires a methodical approach that balances platform policies with strict legal standards. Most social media networks and marketplaces have automated their intellectual property reporting systems, but these tools are only effective if your submission is backed by airtight documentation and a clear demonstration of your prior rights. When considering how to fight trademark squatters in Europe who have hijacked your brand identity online, you must move beyond the “report button” and treat every takedown as a mini-litigation process.

For businesses operating in highly competitive regions, such as the e-commerce landscape of Western Europe, the stakes are particularly high. We often see that addressing brand infringement in Germany or France requires not just a report, but a formal legal justification that references specific EUIPO registration data and shows how the squatter’s presence causes consumer confusion. Without this level of detail, platforms may reject your request, citing a “lack of evidence” or a “civil dispute” they are unwilling to mediate.

The standard takedown algorithm for digital assets

  1. Immutable evidence gathering: Before any contact is made, use specialized tools to capture time-stamped screenshots of the infringing content, the account bio, and the date of first discovery. This is vital because professional squatters often delete or alter content once they receive a notice.
  2. Cross-referencing NICE classes: Ensure the infringer is using your brand in relation to goods or services covered by your registration. Platforms are much faster to act when the infringement is “identical mark/identical goods.”
  3. Formal reporting through Brand Registry: Utilize the proprietary IP protection tools provided by Meta, Amazon, or Google. These dashboards prioritize reports from verified trademark owners over generic “contact us” forms.
  4. Legal justification and case ID tracking: Provide a concise statement explaining why the use is unauthorized. Mention your EU trademark number and the specific territories where your rights are enforceable to avoid jurisdictional delays.

Legal expertise is the silent engine behind this process. While the platform provides the interface, an attorney ensures that your claim is framed in a way that makes it legally risky for the platform to ignore it. This systematic removal of bad actors ensures your digital space remains clean, preparing your organization for the next level of maturity: managing the high volume of data that constant surveillance generates.

Integrating expertise into digital monitoring

Is a real-time notification of a domain registration or a social media mention enough to protect your commercial interests? The short answer is no; data without interpretation is simply noise. While scaling your business with strategic EU trademark monitoring provides the visibility you need, the true competitive advantage comes from knowing which alerts require a full-scale legal response and which can be ignored or deprioritized. Professional legal help for trademark infringement in the EU is not just about filing lawsuits; it is about filtering the “white noise” of the internet to focus resources on genuine threats to your revenue.

This section explores the transition from passive data collection to active legal management. We will delve into how to handle the inevitable “alert fatigue” that comes with broad digital surveillance and provide a definitive checklist to ensure your digital footprint remains secure. Understanding this balance is critical for startups and established firms alike, as it prevents the legal department from becoming a cost center and transforms it into a guardian of growth. By integrating expertise into your monitoring workflow, you ensure that every EU trademark monitoring service for startups you employ actually contributes to your bottom line rather than just adding to your inbox.

In the following sub-sections, we will break down the specific tactics for managing these alerts and provide a concrete framework for long-term digital security.

Expert insight: Handling alert fatigue

The sheer volume of potential infringements found during digital surveillance can be overwhelming. When you receive dozens of alerts ranging from suspicious domain registrations to unauthorized hashtags, the primary challenge shifts from detection to triage. Effectively fighting trademark squatters in Europe requires a risk-based classification system that prevents your team from wasting hours on low-impact violations while allowing high-stakes threats to slip through the cracks.

Anton Polikarpov’s Insight: “I always advise my clients to categorize every alert into one of three buckets: Red (High Risk), Yellow (Medium Risk), and Green (Low Risk). A ‘Red’ alert involves a direct competitor using a confusingly similar mark on a .com or .eu domain; this demands immediate litigation or a Cease and Desist (C&D) letter. A ‘Green’ alert might be a fan blog in a non-competing industry. Not every hit is a violation, and knowing when not to act is just as important as knowing when to strike.”

Determining the right legal tool—whether it is a standard UDRP proceeding, a platform takedown, or a formal letter from a law firm—depends entirely on the perpetrator’s intent and the potential for market confusion. For example, knowing how to respond to an EUIPO deficiency letter or a counter-notice from a squatter is a technical skill that ensures your enforcement actions don’t stall. In many cases, a well-drafted Cease and Desist letter from a recognized law firm is 80% more effective at resolving digital disputes than automated platform reports, as it signals that the brand owner is prepared to escalate the matter to court if necessary.

This expert-led triage ensures that your enforcement budget is spent on actions that actually recover lost traffic and protect your reputation, leading directly to our operational security framework.

The digital footprint security checklist

A systematic approach to digital asset management reduces the likelihood of high-stakes disputes and ensures that your internal team knows exactly where to look for potential threats. While knowing how to fight a trademark squatter in Europe is essential for crisis management, maintaining a proactive operational routine prevents most squatters from gaining enough traction to cause significant damage. This security framework serves as your baseline for defensive monitoring, ensuring no digital asset remains unprotected.

  • Monthly Domain Perimeter Audit: Conduct regular WHOIS lookups and search for new registrations containing your brand name across .eu, .com, and regional extensions like .de or .fr. Pay special attention to typosquatting variations.
  • Social Media Handle Verification: Monitor platforms like Instagram, TikTok, and LinkedIn for new accounts using confusingly similar handles. Check for unauthorized use of your logo in profile pictures, which often signals brand impersonation.
  • Marketplace & App Store Scans: Audit Amazon Brand Registry and mobile app stores for third parties using your protected terms in metadata or product titles to siphon off organic search traffic.
  • Trademark Watch Service Review: Review the monthly reports from your monitoring provider to identify if a third party has attempted to register a confusingly similar mark, ensuring you don’t miss the trademark opposition period length at the EUIPO.

Navigating regional digital complexities

E-commerce hubs require more granular attention because local regulations and platform-specific rules can complicate enforcement. For instance, if you are operating in Central Europe, understanding how to stop someone using your brand name in Germany is critical, as the German legal system offers robust preliminary injunctions that can be much faster than standard EUIPO administrative procedures. Businesses often find that legal help for trademark infringement in the EU is most effective when it combines broad digital monitoring with specific localized expertise in high-volume markets.

By following this checklist, you transform your trademark from a static certificate into a dynamic shield. This operational discipline ensures that when a threat is identified, you have the documentation and timing necessary to initiate a swift takedown or legal challenge.

Strategic dominance through active monitoring

Maintaining a dominant market position requires recognizing that a European trademark is not a passive asset, but a tool for active enforcement. The transition from mere registration to a secure digital footprint involves a continuous loop of monitoring, risk assessment, and decisive action. Whether you are navigating how to fight a trademark squatter in Europe through UDRP proceedings or executing rapid takedowns on social media, the speed and accuracy of your response determine the long-term value of your intellectual property.

Effective eu trademark monitoring services for startups and established enterprises alike must bridge the gap between technical detection and legal strategy. A successful defense strategy integrates everything from domain surveillance to understanding what happens if someone opposes your EU trademark, ensuring that your brand remains unassailable across all digital channels. This holistic approach prevents reputation erosion and secures the traffic that fuels your business growth.

To deepen your understanding of how these tactical moves fit into a larger growth strategy, revisit our guide on Scaling Your Business with Strategic EU Trademark Monitoring. For a comprehensive audit of your current digital monitoring protocols and to ensure your enforcement strategy is airtight, contact BrandR today for a professional consultation.

Frequently Asked Questions

Does an EU trademark provide legal grounds to challenge domain name registrations outside of Europe?

Yes, an EU trademark is a powerful tool for global digital enforcement, even beyond European borders. While the trademark rights are territorially limited to the EU, most generic top-level domains (gTLDs) like .com, .net, and .org are governed by the Uniform Domain-Name Dispute-Resolution Policy (UDRP). Under this policy, a complainant must prove they have rights in a mark that is identical or confusingly similar to the domain name. Your EUIPO registration serves as definitive proof of these rights.

Furthermore, many international marketplaces and social media platforms recognize EU trademarks as valid grounds for takedown notices regardless of where the infringer is located, as these platforms often centralize their intellectual property enforcement based on the validity of the underlying registration.

What is the Trademark Clearinghouse (TMCH) and should EU trademark owners enroll?

The Trademark Clearinghouse (TMCH) is a global database established by ICANN to protect brand owners during the expansion of the domain name system. Enrolling your EU trademark in the TMCH offers two primary benefits:

  • Sunrise Services: It allows you to register domain names matching your trademark before they are opened to the general public during the launch of new gTLDs.
  • Trademark Claims Service: You receive a notification if someone attempts to register a domain name that matches your trademark, acting as an early warning system.

For businesses scaling rapidly, enrolling in the TMCH is a highly recommended proactive step that complements regular monitoring by providing a first-mover advantage in the digital space.

How does ‘Fair Use’ and parody affect social media takedown requests?

Not every mention of your brand or use of your logo constitutes an infringement. Most social media platforms and legal jurisdictions, including the EU, protect non-commercial fair use, which includes parody, criticism, and news reporting. To successfully remove a social media account, you generally need to prove:

  • Likelihood of Confusion: The account is misleading consumers into believing it is the official brand presence.
  • Commercial Intent: The account is using your brand to sell competing products or divert traffic for profit.
  • Trademark Dilution: The use tarnishes the reputation of your brand.

Distinguishing between a ‘fan page’ and a malicious ‘impersonator’ is critical to avoid PR backlash and ensure that legal takedown requests are not rejected for overreach.

Can I recover a domain name if the WHOIS information is hidden by privacy services?

Since the implementation of GDPR, much of the contact information in WHOIS records is redacted, making it harder to identify infringers. However, this does not prevent legal action. Professional legal teams can use several methods to unmask or challenge the registrant:

  1. Disclosure Requests: Sending a formal legal request to the domain registrar to release the contact details based on a legitimate claim of trademark infringement.
  2. UDRP/URS Filings: You can initiate a dispute through WIPO or other providers without knowing the owner’s identity; the registrar is then required to disclose the registrant’s info to the arbitration provider and the complainant.
  3. Cease and Desist via Registrar: Most registrars have a mechanism to forward legal notices to the anonymous owner.
What is the difference between Typosquatting and Bitsquatting in brand monitoring?

While both are deceptive practices, they require slightly different monitoring strategies:

  • Typosquatting: This targets common human typing errors (e.g., example.com vs. exmaple.com). Monitoring should focus on visually similar characters and common keyboard slips.
  • Bitsquatting: This is a more technical threat where attackers register domains that differ by a single ‘bit’ from your brand name. These errors occur during data transmission in hardware (like RAM), leading a user’s computer to occasionally request the wrong URL without any user error.

Effective digital monitoring must account for both human error and technical vulnerabilities to ensure comprehensive protection of your traffic and user data.

How often should a digital brand audit be performed?

While automated monitoring tools provide real-time alerts, a comprehensive digital brand audit should be performed at least quarterly. This deep dive should include:

  • Reviewing your current domain portfolio to ensure renewals are up to date and unnecessary domains are purged.
  • Checking for new app store listings (iOS and Android) using your brand name.
  • Searching for your brand on emerging social media platforms where you may not yet have a presence.
  • Assessing the effectiveness of current ‘Cease and Desist’ actions to see if infringers have migrated to new handles or URLs.

Regular audits help bridge the gap between reactive ‘alert-based’ monitoring and long-term strategic brand growth.

Auteur de l'article
Resources
Rating

0 / 5. 0

Leave a Reply

Your email address will not be published.

*

Contact us
We will find the best solution for your business

    Thank you for your request!
    We will contact you within 5 hours!
    Image
    This site uses cookies to improve your experience. By continuing, you agree to our Privacy Policy.

    Privacy settings

    When you visit websites, they may store or retrieve data in your browser. This storage is often required for basic website functionality. Storage may be used for marketing, analytics and site personalization purposes, such as storing your preferences. Privacy is important to us, so you can disable certain types of storage that may not be necessary for the basic functioning of the website. Blocking categories may affect the performance of the website.

    Manage settings


    Necessary

    Always active

    These cookies are necessary for the website to function and cannot be disabled in our systems. They are usually only set in response to actions you take that constitute a request for services, such as adjusting your privacy settings, logging in, or filling out forms. You can set your browser to block these cookies or notify you about them, but some parts of the site will not work. These cookies do not store any personal information.

    Marketing

    These elements are used to show you advertising that is more relevant to you and your interests. They can also be used to limit the number of ad views and measure the effectiveness of advertising campaigns. Advertising networks usually place them with the permission of the site operator.

    Personalization

    These elements allow the website to remember your choices (such as your username, language or region you are in) and provide enhanced, more personalized features. For example, a website may provide you with local weather forecasts or traffic news by storing data about your current location.

    Analytics

    These elements help the website operator understand how their website works, how visitors interact with the site and whether there may be technical problems. This type of storage usually does not collect information that identifies the visitor.