Browse Definitions :
Definition

entity tag (ETag)

Contributor(s): Matthew Haughn

An entity tag (ETag) is an HTTP header used for Web cache validation and conditional requests from browsers for resources.

Etags use persistent identification elements (PIE) that have been tagged to the user’s browser. Although a user may remove HTTP cookies, ETags store the same information along with covert backup to reconstitute the data of deleted cookies.

 Most typically, ETags request Web resources on the condition that they have been updated since the user’s last visit to the site. For instance:

A user may visit a site featuring a background that changes every week. On the first visit in a new week, the browser checks the cache and, finding no image or an outdated one, downloads the current background and caches it. If the user had already visited the site that week, the browser would receive the return response that the image had not changed. In that case, the browser would use the local copy in the cache, saving bandwidth and speeding load time.

HTML5 local storage and cache cookies enabled through ETags are also one method used to respawn cookies. Respawning cookies are used by consumer tracking firms to address the issue of user deletion or denial of cookies. The practice can also be used to track users for other purposes, such as keeping tabs on hackers.

This was last updated in October 2014

Continue Reading About entity tag (ETag)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close