SlideShare a Scribd company logo
Hey, you.

Yeah, you.
I can see everything you do.

Every time you log into this
 course or click on a link,
         I know.
How?
The eLC tracks your every move
          using your
     digital fingerprint.
Like the fingerprint on your
thumb, your computer is unique.

 Your IP address, your settings, the
programs you use, the websites you
visit, your login names, etc. create a
 “fingerprint” that distinguishes your
     computer from mine. (Fenlon par. 2)
This doesn’t only apply to the
            eLC.

It applies to every website you
               visit.
You can delete the list of sites that
you’ve visited in your Internet browser
   and the cookies stored on your
 computer, but you can’t delete your
    computer’s digital fingerprint.

                Ever.
The police and companies can use
 this information to track your activity
            on the Internet.

The eLC uses your login information to
         track you as well.
This means that, on the eLC, your
 teacher knows if you clicked on
 a forum post, tried to submit an
    assignment, or watched a
         required video.
They even know when you did it.
  They also know if you didn’t.
Creepy, huh?

That’s why you should always be
    careful on the Internet…
       … and on the eLC.
Now click on the next assignment.
 I’ll know whether or not you did.
Works Cited

Fenlon, Wesley. “How Digital Fingerprinting
     Works.” 24 July 2012. < http://computer.
     howstuffworks.com/digital-
     fingerprinting3.htm>

More Related Content

Similar to ECT Digital Fingerprint Presentation

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
nerakmac
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
Eric Selje
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
Christian Heilmann
 
Access off Campus to MDX resources: Psychology
Access off Campus to MDX resources: PsychologyAccess off Campus to MDX resources: Psychology
Access off Campus to MDX resources: Psychology
veades
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
 
Digital life
Digital lifeDigital life
Digital life
Harm7
 
Operating systems
Operating systemsOperating systems
Operating systems
sandrahezro
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
ebooker97
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Information
ebooker97
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012
Kieon
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
Acageron
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
Jinger Jarrett
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience
Harman Innovation
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
sapphirecrs
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
 
Windows 7
Windows 7Windows 7
Windows 7
Osama Zahid
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 

Similar to ECT Digital Fingerprint Presentation (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Access off Campus to MDX resources: Psychology
Access off Campus to MDX resources: PsychologyAccess off Campus to MDX resources: Psychology
Access off Campus to MDX resources: Psychology
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Digital life
Digital lifeDigital life
Digital life
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 
Action Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc InformationAction Internet Marketing Survey © , Internet , Pc Information
Action Internet Marketing Survey © , Internet , Pc Information
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience Smart Devices: Advancing the User Experience
Smart Devices: Advancing the User Experience
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Windows 7
Windows 7Windows 7
Windows 7
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 

More from MrsBrynaCannon

Accessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLCAccessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLC
MrsBrynaCannon
 
Accessing Students' Grades on the eLC
Accessing Students' Grades on the eLCAccessing Students' Grades on the eLC
Accessing Students' Grades on the eLC
MrsBrynaCannon
 
Fd wl how to find rubrics presentation
Fd wl how to find rubrics presentationFd wl how to find rubrics presentation
Fd wl how to find rubrics presentation
MrsBrynaCannon
 
CCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy VideosCCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy Videos
MrsBrynaCannon
 
CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC
MrsBrynaCannon
 
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
MrsBrynaCannon
 
ECT What Not to Wear Presentation
ECT What Not to Wear PresentationECT What Not to Wear Presentation
ECT What Not to Wear Presentation
MrsBrynaCannon
 
FD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing PresentationFD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing Presentation
MrsBrynaCannon
 
Fundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting PresentationFundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting Presentation
MrsBrynaCannon
 
Fundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement PresentationFundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement Presentation
MrsBrynaCannon
 
Fundamentals Technical Writing Presentation
Fundamentals Technical Writing PresentationFundamentals Technical Writing Presentation
Fundamentals Technical Writing Presentation
MrsBrynaCannon
 
Fundamentals Playwriting Presentation
Fundamentals Playwriting PresentationFundamentals Playwriting Presentation
Fundamentals Playwriting Presentation
MrsBrynaCannon
 
Fundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers PresentationFundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers Presentation
MrsBrynaCannon
 
Fundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause PresentationFundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause Presentation
MrsBrynaCannon
 
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 PresentationFundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
MrsBrynaCannon
 
Fundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes PresentationFundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes Presentation
MrsBrynaCannon
 
Fundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing PresentationFundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing Presentation
MrsBrynaCannon
 
Fundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation PresentationFundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation Presentation
MrsBrynaCannon
 

More from MrsBrynaCannon (18)

Accessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLCAccessing Your Student's Grades on the eLC
Accessing Your Student's Grades on the eLC
 
Accessing Students' Grades on the eLC
Accessing Students' Grades on the eLCAccessing Students' Grades on the eLC
Accessing Students' Grades on the eLC
 
Fd wl how to find rubrics presentation
Fd wl how to find rubrics presentationFd wl how to find rubrics presentation
Fd wl how to find rubrics presentation
 
CCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy VideosCCS Signing up for Cool Math Guy Videos
CCS Signing up for Cool Math Guy Videos
 
CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC CCS Accessing Your Student's Grades on the New eLC
CCS Accessing Your Student's Grades on the New eLC
 
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
Plagiarism Presentation (Edited by Bryna Cannon, 7 24-12)
 
ECT What Not to Wear Presentation
ECT What Not to Wear PresentationECT What Not to Wear Presentation
ECT What Not to Wear Presentation
 
FD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing PresentationFD WL Formal Letter Writing Presentation
FD WL Formal Letter Writing Presentation
 
Fundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting PresentationFundamentals Speech Writing and Presenting Presentation
Fundamentals Speech Writing and Presenting Presentation
 
Fundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement PresentationFundamentals Writing and Lit Thesis Statement Presentation
Fundamentals Writing and Lit Thesis Statement Presentation
 
Fundamentals Technical Writing Presentation
Fundamentals Technical Writing PresentationFundamentals Technical Writing Presentation
Fundamentals Technical Writing Presentation
 
Fundamentals Playwriting Presentation
Fundamentals Playwriting PresentationFundamentals Playwriting Presentation
Fundamentals Playwriting Presentation
 
Fundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers PresentationFundamentals Writing and Literature Sentence Openers Presentation
Fundamentals Writing and Literature Sentence Openers Presentation
 
Fundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause PresentationFundamentals Writing and Literature Adverb Clause Presentation
Fundamentals Writing and Literature Adverb Clause Presentation
 
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 PresentationFundamentals Writing and Literature Sentence Openers 1-3 Presentation
Fundamentals Writing and Literature Sentence Openers 1-3 Presentation
 
Fundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes PresentationFundamentals Writing and Literature Metaphors and Similes Presentation
Fundamentals Writing and Literature Metaphors and Similes Presentation
 
Fundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing PresentationFundamentals Writing and Literature Informal Letter Writing Presentation
Fundamentals Writing and Literature Informal Letter Writing Presentation
 
Fundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation PresentationFundamentals Dialog Punctuation Presentation
Fundamentals Dialog Punctuation Presentation
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

ECT Digital Fingerprint Presentation

  • 2. I can see everything you do. Every time you log into this course or click on a link, I know.
  • 3. How? The eLC tracks your every move using your digital fingerprint.
  • 4. Like the fingerprint on your thumb, your computer is unique. Your IP address, your settings, the programs you use, the websites you visit, your login names, etc. create a “fingerprint” that distinguishes your computer from mine. (Fenlon par. 2)
  • 5. This doesn’t only apply to the eLC. It applies to every website you visit.
  • 6. You can delete the list of sites that you’ve visited in your Internet browser and the cookies stored on your computer, but you can’t delete your computer’s digital fingerprint. Ever.
  • 7. The police and companies can use this information to track your activity on the Internet. The eLC uses your login information to track you as well.
  • 8. This means that, on the eLC, your teacher knows if you clicked on a forum post, tried to submit an assignment, or watched a required video. They even know when you did it. They also know if you didn’t.
  • 9. Creepy, huh? That’s why you should always be careful on the Internet… … and on the eLC. Now click on the next assignment. I’ll know whether or not you did.
  • 10. Works Cited Fenlon, Wesley. “How Digital Fingerprinting Works.” 24 July 2012. < http://computer. howstuffworks.com/digital- fingerprinting3.htm>