SlideShare uma empresa Scribd logo
Digital Identity
What is it?
Thouraya.daouas@ihec.rnu.tn
Dr. Thouraya Daouas
Digital identity
• The set of activities you do on Internet contributes in
defining your digital identity.
• It’s constructed by many elements:
– Personal data associated with your profile.
– Information you publish on Internet.
– Information about you that others publish.
– Tracks you leave consciously or not.
• User can have three types of identifier:
– Professional or institutional related to a professional activity.
– Private identifiers for personal use (social network, online selling,
mail, online banking, etc.)
Dr. Thouraya Daouas 2Digital Identity
Digital identity
• How to master it?
– User should choose sensibly its identifier to be used
according to his activity;
– User limits the access to the information which he
publishes;
– User checks regularly his image on Web or e-
reputation.
Dr. Thouraya Daouas 3Digital Identity
Authentification
• Procedure which checks that the information
about connection supplied is correct (identifier
and password, fingerprints, etc.).
• Some rules are important to respect:
– Keep secret the password.
– Choose a complex password (Combining necessarily
small letters, capital letters, numbers and symbols).
Should not have evident meaning.
– Should not usurp an identity.
Dr. Thouraya Daouas 4Digital Identity
Configuration of profile
• Connection identifier can be associated to a profile
containing photos, personal information and
preferences.
• It is possible to configure information access:
– Public: accessible for everyone and referenced in search
engines.
– Restricted: accessible for authorized community and not
referenced.
• In case of emails, a signature could be put at the end of the
email body or a visit card could be joint to the email.
Dr. Thouraya Daouas 5Digital Identity
Digital tracks
• What could we find in the file properties?
– Date, Time, Author name, Revision number, Camera model, etc.
• What can we know about the user identity?
– Each connected computer has an IP address given to user by the
Internet service provider which has to keep during one year the list of
connections and the information allowing to identify the Internet
user.
– When we consult a web page, the browser sends a request to the
server to get back the data (texts, images, etc.) to download. Server
can keep track and follow so the browsing on the site.
– In email header are stored a series of IP addresses describing servers
which can supply indications on sender geographical localization.
Dr. Thouraya Daouas 6Digital Identity
e-Reputation
• e-Reputation or digital reputation is the image can be made
of a person through the Web.
• We must be aware that:
– Everybody can publish on Web without any control: on a blog or a
social network, by participating in a discussion forum, by publishing a
site to a host, etc.
– We loose the control of an information published with a " public
access ": from the moment where an information is public, it can be
indexed by search engines and copied out in their mask memory. It
can put several months disappearing.
Dr. Thouraya Daouas 7Digital Identity

Mais conteúdo relacionado

Mais procurados

Social Media
Social MediaSocial Media
Social Media
nekka casinto
 
Online ethics
Online ethicsOnline ethics
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
julia594
 
Social media for career development
Social media for career developmentSocial media for career development
Social media for career development
Newcastle University Library
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
Ira Wolfe
 
Social media
Social mediaSocial media
Social media
erwin marlon sario
 
Social media
Social mediaSocial media
Social media
Eeshan Mishra
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
darpankambo
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
Digital-identity
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Information security
 Information security Information security
Information security
Jin Castor
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
AlexLowe
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
Lakshan Bamunusinghe
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
PRANJAL SAIKIA
 
Social networking presentation
Social networking presentationSocial networking presentation
Social networking presentation
uarkgradstudent
 
Presentation on social media on young generation in Bangladesh
Presentation on social media on young generation in BangladeshPresentation on social media on young generation in Bangladesh
Presentation on social media on young generation in Bangladesh
Shastry Rahman
 

Mais procurados (20)

Social Media
Social MediaSocial Media
Social Media
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Social media for career development
Social media for career developmentSocial media for career development
Social media for career development
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
 
Social media
Social mediaSocial media
Social media
 
Social media
Social mediaSocial media
Social media
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Advantages of Digital Identity
Advantages of Digital IdentityAdvantages of Digital Identity
Advantages of Digital Identity
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Information security
 Information security Information security
Information security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
Social networking presentation
Social networking presentationSocial networking presentation
Social networking presentation
 
Presentation on social media on young generation in Bangladesh
Presentation on social media on young generation in BangladeshPresentation on social media on young generation in Bangladesh
Presentation on social media on young generation in Bangladesh
 

Semelhante a Digital identity

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
T Tanujha
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Web services
Web servicesWeb services
Web services
Himanshu Pathak
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
TeenaSharma73
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
Nano894860
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
Alex Hung
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
Riya Gupta
 

Semelhante a Digital identity (20)

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Web services
Web servicesWeb services
Web services
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 

Mais de Thouraya Daouas

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
Thouraya Daouas
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
Thouraya Daouas
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
Thouraya Daouas
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
Thouraya Daouas
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
Thouraya Daouas
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
Thouraya Daouas
 
Work flow
Work flowWork flow
Work flow
Thouraya Daouas
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Thouraya Daouas
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
Thouraya Daouas
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
Thouraya Daouas
 

Mais de Thouraya Daouas (10)

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
 
Work flow
Work flowWork flow
Work flow
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
 

Último

Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdfTransportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Matthewperry105
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
SocioCosmos
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 

Último (9)

Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdfTransportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 

Digital identity

  • 1. Digital Identity What is it? Thouraya.daouas@ihec.rnu.tn Dr. Thouraya Daouas
  • 2. Digital identity • The set of activities you do on Internet contributes in defining your digital identity. • It’s constructed by many elements: – Personal data associated with your profile. – Information you publish on Internet. – Information about you that others publish. – Tracks you leave consciously or not. • User can have three types of identifier: – Professional or institutional related to a professional activity. – Private identifiers for personal use (social network, online selling, mail, online banking, etc.) Dr. Thouraya Daouas 2Digital Identity
  • 3. Digital identity • How to master it? – User should choose sensibly its identifier to be used according to his activity; – User limits the access to the information which he publishes; – User checks regularly his image on Web or e- reputation. Dr. Thouraya Daouas 3Digital Identity
  • 4. Authentification • Procedure which checks that the information about connection supplied is correct (identifier and password, fingerprints, etc.). • Some rules are important to respect: – Keep secret the password. – Choose a complex password (Combining necessarily small letters, capital letters, numbers and symbols). Should not have evident meaning. – Should not usurp an identity. Dr. Thouraya Daouas 4Digital Identity
  • 5. Configuration of profile • Connection identifier can be associated to a profile containing photos, personal information and preferences. • It is possible to configure information access: – Public: accessible for everyone and referenced in search engines. – Restricted: accessible for authorized community and not referenced. • In case of emails, a signature could be put at the end of the email body or a visit card could be joint to the email. Dr. Thouraya Daouas 5Digital Identity
  • 6. Digital tracks • What could we find in the file properties? – Date, Time, Author name, Revision number, Camera model, etc. • What can we know about the user identity? – Each connected computer has an IP address given to user by the Internet service provider which has to keep during one year the list of connections and the information allowing to identify the Internet user. – When we consult a web page, the browser sends a request to the server to get back the data (texts, images, etc.) to download. Server can keep track and follow so the browsing on the site. – In email header are stored a series of IP addresses describing servers which can supply indications on sender geographical localization. Dr. Thouraya Daouas 6Digital Identity
  • 7. e-Reputation • e-Reputation or digital reputation is the image can be made of a person through the Web. • We must be aware that: – Everybody can publish on Web without any control: on a blog or a social network, by participating in a discussion forum, by publishing a site to a host, etc. – We loose the control of an information published with a " public access ": from the moment where an information is public, it can be indexed by search engines and copied out in their mask memory. It can put several months disappearing. Dr. Thouraya Daouas 7Digital Identity