Skip to main content
Back to Resources
Privacy Law6 min read

Tracking Pixels Explained: What They Are and What They Capture

A technical yet accessible guide to Meta Pixels, TikTok Pixels, Google Analytics, and session replay tools. Learn what data is captured and where it flows.

A tracking pixel is invisible code on your website that watches what your visitor does. Then it sends that information somewhere else. If you've never thought carefully about where "somewhere else" is, what exactly gets sent, or whether your visitors agreed to it, this guide is for you.

Most website operators install tracking pixels without reading the documentation. They copy a snippet into the header. They see a dashboard with traffic data. They assume that's the extent of it. In reality, they've handed visitor data to a third party with no real oversight. That third party often sells insights to advertisers, builds profiles on visitors, or uses the data for purposes the website operator doesn't control.

How a Pixel Actually Works

A tracking pixel is a small JavaScript snippet in your HTML. When a visitor's browser loads your page, the pixel fires. It collects information about the visitor--where they came from, what device they're using, how long they stay, where they click. Then it makes an HTTP request to an external server and transmits all of it.

The term "pixel" is a relic. Years ago, trackers were literally 1x1 pixel images, invisible to the eye. Modern trackers are JavaScript, not images. The name stuck.

The real point: the pixel executes in the visitor's browser. It runs without warning. It sends data without asking. The visitor has no idea it's happening.

What Meta Pixel Collects

Meta (Facebook, Instagram, WhatsApp) operates one of the most widely deployed tracking systems on the web. When you install the Meta Pixel, it captures:

  • Device details: IP address, browser type, operating system, device model
  • Every page the visitor lands on and the URLs
  • Clicks, button presses, interactions with page elements
  • Form submissions and whether the visitor completed them
  • Purchases or other conversions
  • Where the visitor came from (the referral source)

If the visitor has a Facebook or Instagram account, Meta can connect this pixel data to their account. Meta builds a profile. It tracks what you browse across thousands of websites. It uses that profile to sell targeted ads to advertisers. The visitor never consented to this cross-site tracking. They clicked "Accept" on your cookie banner, maybe. That's not the same as consenting to Meta tracking them across the web.

TikTok Pixel and Google Analytics

TikTok Pixel works the same way as Meta Pixel. It tracks page visits, clicks, conversions, and device identifiers. E-commerce sites love it because TikTok can then target ads to those visitors on the TikTok platform.

Google Analytics is free. It's used on millions of websites. Website operators think of it as an internal analytics tool--a way to see how many people visited, how long they stayed, which pages they viewed. This is technically accurate. But Google Analytics also feeds Google's advertising network. Google collects data on millions of visitors across the web. It builds profiles. It uses those profiles to target ads. Your "site analytics" are part of Google's infrastructure.

Many websites also use Google Tag Manager. It's a container for multiple trackers. A single GTM implementation can deploy dozens of pixels at once. Most website operators don't know all of them are firing. They install it, see the reporting dashboard, and never audit what's actually running.

Session Replay Tools Are the Most Invasive

Session replay tools--Hotjar, FullStory, Microsoft Clarity, Smartlook, LogRocket--record the visitor's entire session like a video. Every keystroke. Every click. Every scroll. Every page.

If a visitor types a password into a login form, the session replay tool captures it. If they type a credit card number, the tool captures it. If they paste a social security number, the tool captures the paste action. The tool then sends this recording to the vendor's servers, where it's stored and can be played back.

Hotjar explicitly markets session replay as a UX research tool. You can watch visitor sessions and see how they interact with your site. This is useful for product teams. It's also deeply invasive. The tool captures data a visitor would reasonably expect to be private--especially on healthcare, financial, or legal websites.

A healthcare patient filling out an intake form with mental health information. A job applicant entering their social security number. A user updating payment information. All captured. All transmitted. All stored.

How Data Flows from Your Site to Third Parties

The visitor lands on your page. Their browser requests your HTML. Your HTML includes Meta Pixel, Google Analytics, TikTok Pixel, maybe a session replay tool. The browser executes all these scripts. Each one collects information about the page and the visitor. Each one makes an HTTP request to external servers--Meta's, Google's, TikTok's, the replay vendor's. The data gets sent as URL parameters or request body content.

The third party stores this data. They may link it to the visitor's existing account. They build profiles. They sell insights. They use the data to target ads across their own platforms and partner sites. A healthcare visitor sees healthcare ads on Facebook. A financial visitor sees investment ads on Instagram. It's all because of the pixels tracking their behavior.

Website operators often misunderstand this flow. "Google Analytics is for understanding our own traffic." This is half true. Google understands your traffic. Google also uses your traffic data for its own purposes. The visitor's behavior on your healthcare website becomes part of Google's advertising model.

Healthcare and Sensitive Data

Healthcare websites face the highest risk. Patient behavior is highly sensitive. When a patient visits a mental health site, they're disclosing a health condition. When they fill out an intake form with medical history and medications, they're sharing private information. If a tracking pixel transmits this to Meta or Google, the patient's health information is now in an advertising platform's database.

HIPAA (the federal healthcare privacy law) requires healthcare providers to safeguard patient data. Transmitting patient data to unaffiliated third parties without explicit consent may violate HIPAA. State health privacy laws add more restrictions.

Financial websites have similar issues. A user searching for debt consolidation, bankruptcy information, or personal loans has revealed financial stress. Legal websites reveal legal problems. A visitor on a reproductive health site has revealed personal medical choices. Tracking pixels don't discriminate. They capture and transmit.

Common Misconceptions

Website operators frequently tell themselves:

"We use Google Analytics just to understand our traffic." Google Analytics is a commercial surveillance tool. You're not the primary customer. Advertisers are.

"Our privacy policy discloses the tracking." A privacy policy doesn't make tracking legitimate. Especially if it's vague. "We use analytics partners" isn't disclosure. You need to name the tool, say what it captures, and explain where the data goes.

"Session replay helps us improve the experience." Session replay is a powerful tool for UX research. It also captures passwords, credit cards, and sensitive form data that has nothing to do with UX. Especially on healthcare or financial sites, the invasiveness outweighs the benefit.

"We're not responsible. The tool sends the data, not us." This is legally fragile. If you deploy a tracking tool, you're responsible for the data collection and transmission. Regulators hold website operators accountable, not just the vendors.

What to Actually Do

List every tracking tool on your site. Hotjar, Google Analytics, Meta Pixel, TikTok Pixel, anything that makes HTTP requests to external servers. Document what each one collects and where.

If you don't have a clear business reason for a tool, delete it.

For tools that must stay, enable sensitive field masking. Most analytics and replay platforms let you mask passwords, credit card fields, SSN fields. Turn masking on by default.

Get actual consent for invasive tools. This means a checkbox the visitor has to tick before the tool runs. Not a privacy policy. Not a pre-checked box. Affirmative, explicit consent.

Update your privacy policy. Name the tools. Don't hide behind vague language. Tell visitors what you're collecting and where it's going.

For healthcare and financial sites, consider whether session replay is worth the legal and regulatory exposure. Often it isn't.

The Regulatory Reality

The FTC scrutinizes tracking pixel deployment, especially at healthcare companies. State attorneys general in California, New York, and Texas have opened investigations into healthcare platforms' tracking practices. Courts have begun accepting Wiretap Act claims against website operators for tracking pixel deployment. The CCPA gives California residents the right to know what personal information is collected and who it's disclosed to.

The GDPR in Europe requires explicit consent for non-essential tracking.

Regulators are moving in one direction: less tolerance for opaque tracking. More requirements for transparency and consent.