Data Preferences and Tracking Technologies
At Qualtech Prism, we believe in transparency about the digital tools we use to deliver our online education platform. This page explains the various tracking technologies we employ—from simple preference storage to complex analytics systems—and gives you real control over how your data gets collected and used. We know privacy matters, especially when you're trusting us with your learning journey.
Why These Technologies Are Important
When you visit our platform, several technologies work behind the scenes to remember who you are, what courses you've started, and how you prefer to learn. These aren't mysterious surveillance tools—they're more like digital bookmarks and notepads that help our servers recognize you across sessions. Think of them as the platform's memory system, storing everything from your login status to your preferred video playback speed. Without these technologies, you'd need to re-enter your preferences every single time you opened a new page.
The foundation of our platform relies on essential tracking mechanisms that make basic functionality possible. When you log into your student dashboard, we need to remember that authentication across every page you visit—otherwise, you'd be kicked back to the login screen constantly. Similarly, when you're taking a timed assessment, we track your progress through temporary session data so your answers don't vanish if you accidentally refresh the page. These core functions aren't optional; they're what allows the platform to work as a cohesive educational environment rather than a collection of disconnected pages.
Performance monitoring helps us understand where the platform struggles and where it shines. We track metrics like page load times, video buffering events, and feature usage patterns to identify bottlenecks that might frustrate learners. For instance, if we notice that students in certain regions consistently experience slow video loading, we can investigate CDN configurations or adjust compression settings. This data reveals real user experiences—not just theoretical performance in our testing environment. The goal is catching problems before they affect your learning momentum.
Functional technologies make your experience feel personalized without requiring constant manual adjustments. When you select a dark theme for late-night studying, adjust caption settings for better accessibility, or organize your course dashboard in a specific order, we store those preferences locally and on our servers. This means your learning environment looks and behaves the way you want it, whether you're switching between your laptop and phone or coming back after a week away. These aren't critical for basic operation, but they transform the platform from generic to genuinely yours.
Customization goes deeper than surface preferences—it involves adapting content presentation based on your learning patterns. If you consistently pause videos at certain concept types, we might suggest supplementary reading materials automatically. When you struggle with particular assessment question formats, our system can flag similar practice problems in your study recommendations. This adaptive approach requires collecting data about your interactions with course materials, analyzing those patterns, and adjusting what you see next. The difference between a static course and a responsive learning experience often comes down to this layer of intelligent customization.
The cumulative benefit of an optimized learning platform is substantial but sometimes invisible. Students who can pick up exactly where they left off, who receive timely hints when stuck, and who see their dashboard prioritize upcoming deadlines automatically—these users complete courses at higher rates. We've seen that reducing friction points (like having to reconfigure video settings repeatedly) keeps learners engaged with actual content rather than fighting with the interface. An education platform should fade into the background, letting the learning itself take center stage, and that requires smart use of tracking technologies to anticipate needs.
Managing Your Preferences
You have significant control over tracking technologies, though exercising that control requires understanding the trade-offs. European users benefit from GDPR protections that require explicit consent for non-essential tracking, while California residents have CCPA rights to know what's collected and request deletion. Regardless of location, you can adjust browser settings, use our preference center, or employ third-party tools to limit data collection. Just be aware that restricting certain technologies will change how the platform functions—sometimes in minor ways, sometimes dramatically.
Most modern browsers give you granular control if you know where to look. In Chrome, navigate to Settings → Privacy and security → Cookies and other site data, where you can block all cookies, block third-party cookies specifically, or add site-specific exceptions. Firefox users should go to Settings → Privacy & Security → Enhanced Tracking Protection, which offers Standard, Strict, and Custom modes with different blocking levels. Safari on Mac has Preferences → Privacy → Manage Website Data for viewing and removing stored data, plus options to prevent cross-site tracking. Edge mirrors Chrome's structure under Settings → Privacy, search, and services → Tracking prevention, with Basic, Balanced, and Strict settings.
Our platform includes a dedicated preference center accessible from your account settings page under the Privacy section. Here you'll find toggles for analytics data collection, personalized recommendations, marketing communications, and third-party integrations. Changes take effect immediately, though you may need to refresh your browser to see the full impact. We've designed this center to be straightforward—no buried options or confusing language. If you choose to disable analytics while keeping personalization active, the system will honor that combination and explain what each choice means for your experience.
Disabling different technology categories has varying effects. Blocking essential cookies means you can't stay logged in—you'll hit the login page with every new browser session or even every new tab. Turning off analytics doesn't change visible features, but it prevents us from detecting if you're experiencing technical problems, which could delay fixes that would benefit you. Rejecting functional cookies resets your preferences constantly—your theme choice, subtitle settings, and dashboard layout will revert to defaults repeatedly. Stopping personalization means seeing generic course recommendations instead of tailored suggestions based on your progress and interests.
Third-party browser extensions offer another management layer, particularly for users who want consistent settings across websites. Extensions like Privacy Badger learn to block tracking domains automatically, while uBlock Origin provides comprehensive blocking with customizable filter lists. For education platform users, we'd suggest trying medium-strength settings first—something like Privacy Badger's default configuration—rather than immediately jumping to the most restrictive options. You can always tighten settings later, but starting too strict often breaks necessary features, leading to frustration before you understand what's actually required.
Finding the right balance between privacy and functionality is genuinely personal and depends on how you use the platform. Students who access courses from shared computers might prioritize not storing any local data, accepting that they'll need to log in repeatedly and reconfigure settings each session. Learners on personal devices might embrace full personalization for maximum convenience. There's no universally correct answer—it's about aligning your privacy comfort level with your learning priorities. Consider experimenting with settings during a low-stakes period (not right before a major assessment) so you can discover what works without pressure.
External Technologies
We integrate several external services that bring specialized capabilities beyond our core platform development. These fall into categories like analytics providers (understanding usage patterns), content delivery networks (speeding up video and asset loading), communication tools (powering live chat support), and payment processors (handling secure transactions). Each external service accesses only the specific data needed for its function, though that still means information leaves our direct control and travels to third-party servers.
Analytics services typically collect page view data, navigation paths through courses, time spent on different sections, device and browser information, and aggregate demographics. They use this to generate reports showing popular courses, common dropout points, feature adoption rates, and technical performance metrics. The data helps answer questions like "Do students on mobile devices engage differently than desktop users?" or "Which lesson format leads to better knowledge retention?" These insights drive product development decisions—what to build next, what to improve, what to retire.
External parties process data according to their own privacy policies, though contracts bind them to specific uses. An analytics provider can't suddenly start selling our student data to advertisers, for example, because our agreement explicitly prohibits that. However, they might use aggregated, anonymized insights from multiple clients (including us) to improve their analytics algorithms. In the educational context, this could mean a video analytics service learns better buffering prediction across all its education clients, indirectly benefiting our students through improved service performance.
You can control external tracking through several methods beyond our platform settings. Many analytics providers offer opt-out pages—Google Analytics has a browser extension specifically for opting out across all websites using their service. Some advertising networks honor Do Not Track signals sent by your browser, though support is inconsistent. Privacy-focused DNS services can block known tracking domains at the network level before requests even reach your browser. These approaches work site-wide rather than requiring individual configuration on each platform you visit.
Contractual safeguards require external providers to maintain specific security standards, limit data retention, and notify us of breaches. We conduct vendor assessments before integration, checking their compliance certifications, reviewing their data handling practices, and testing their security measures. Technical safeguards include data encryption in transit and at rest, anonymization where full identification isn't necessary, and access controls limiting which of their employees can view what data. For particularly sensitive information like assessment responses or student demographics, we often use tokenization—sending them identifiers that are meaningless to the external service but allow us to connect data internally.
Other Methods
Beyond standard cookies, we employ several tracking technologies that work differently but serve similar purposes. Web beacons (also called tracking pixels) are tiny, usually invisible image files embedded in pages or emails. When your browser loads the page, it requests the beacon image from our server, which logs that request—telling us you viewed that specific content. We use these primarily in email communications to understand which course update notifications actually get read versus immediately deleted. The beacon records your IP address, timestamp, and basic browser details, but doesn't access anything else on your device.
Local storage and session storage are browser-based databases that hold larger amounts of structured data than cookies allow. We store things like your partially completed course notes in local storage so they're instantly available when you return, even if our servers are temporarily unreachable. Session storage holds temporary data like your current quiz state—information that should disappear when you close your browser tab rather than persisting indefinitely. The key difference is persistence: local storage remains until explicitly cleared, while session storage vanishes automatically at session end. Both are accessible only to our domain and can't be read by other websites.
Device recognition technologies try to identify your specific device across sessions, even if you clear cookies or use private browsing modes. We use relatively basic fingerprinting—combining your screen resolution, installed fonts, browser version, and timezone to create a probability-based identifier. This helps detect suspicious login patterns (like someone simultaneously accessing your account from two continents) without requiring invasive surveillance. We specifically avoid more aggressive fingerprinting techniques like canvas fingerprinting or audio API fingerprinting because they cross into territory that feels like circumventing user privacy choices.
Server-side tracking happens entirely on our infrastructure without placing anything on your device. When you interact with our API—submitting an assessment, updating profile information, starting a video—our servers log those events with timestamps, user identifiers, and relevant context. This creates a comprehensive activity record that's immune to client-side blocking but also requires you to trust our retention and access policies. Server logs capture more technical details than cookies: full HTTP headers, API response times, error conditions, and data payload sizes. We use this primarily for security monitoring and debugging rather than analytics.
Managing these alternative technologies requires different approaches than cookie controls. Web beacons in emails stop working if you disable image loading in your email client—most email apps offer this as a privacy setting. Browser developer tools (usually accessible via F12) let you inspect and manually delete local storage and session storage under the Application or Storage tab. Device fingerprinting is harder to control—using a VPN changes your apparent location, browser extensions can randomize certain fingerprint components, and privacy-focused browsers like Firefox reduce fingerprintable surface area. Server-side logging is fundamentally about trusting our data practices since you can't directly access or delete those logs yourself (though you can request access or deletion through our privacy procedures).
Other Important Information
Data retention periods vary by category and purpose. Essential authentication data remains active while your account exists, then moves to a 90-day deletion queue after account closure to allow for reactivation requests. Analytics data gets aggregated and anonymized after six months—we keep the statistical insights but remove individual identifiers. Course progress and assessment history persist for seven years to support transcript requests and academic record requirements, though you can request earlier deletion if there's no ongoing educational relationship. Marketing consent data and communication preferences update in real-time and get removed within 30 days of withdrawal. Activity logs used for security monitoring retain detailed information for 18 months before transitioning to anonymized summaries.
Technical security measures include encryption for data transmission (TLS 1.3 for all connections), database encryption at rest using AES-256, and regular penetration testing by external security firms. Our infrastructure uses isolated environments for production versus development, ensuring that test activities can't accidentally expose real student data. Access controls follow the principle of least privilege—developers can't access production databases without specific justification and approval, and all access gets logged for audit purposes. We employ automated monitoring for suspicious patterns: unusual data access volumes, login attempts from unexpected locations, or API usage that deviates from normal patterns.
Organizational safeguards complement technical measures through policies and training. All employees with data access undergo annual privacy and security training covering FERPA, GDPR, and our internal standards. We maintain an incident response plan that's tested quarterly through tabletop exercises simulating various breach scenarios. A dedicated data protection officer reviews new features and integrations for privacy implications before launch. Regular internal audits check that actual practices match documented policies—we're verifying that data deletion schedules are actually running, that access logs are being reviewed, and that vendor contracts reflect current requirements rather than outdated agreements.
Collected data sometimes combines with information from other sources to create a more complete picture. When you integrate your Qualtech Prism account with your institution's learning management system, we merge their course enrollment data with our platform activity to provide unified progress tracking. If you log in through a social identity provider, we receive basic profile information they've authorized us to access—typically name, email, and profile photo. Survey responses you provide might get associated with your usage patterns to help us understand whether certain features resonate with particular learner types. We're always clear about these connections and give you control over optional integrations.
Compliance efforts span multiple frameworks depending on where you're located and what type of learner you are. For EU students, we maintain GDPR compliance through lawful basis documentation, data processing agreements with all vendors, and honoring all individual rights requests. US students at institutions receiving federal funding are protected by FERPA, which limits how we can share educational records and requires consent for most disclosures. COPPA applies when we knowingly have users under 13, requiring verifiable parental consent and prohibiting certain data collection. We also align with ISO 27001 information security standards and participate in third-party privacy certification programs that audit our practices annually.
Special protections for younger users and vulnerable populations go beyond legal minimums. For learners under 18, we automatically disable personalized advertising, restrict data sharing with most third parties, and provide enhanced parental controls for account management. If a course addresses sensitive topics (mental health, financial hardship, trauma recovery), we apply extra scrutiny to what data gets collected and how it's protected—particularly ensuring that course enrollment information doesn't leak in ways that could stigmatize participants. Students who've requested accommodations for disabilities get additional safeguards around storing and accessing their accessibility needs, with stricter limits on who can view that information and clear retention schedules tied to their academic progression.
Changes to This Policy
We review this policy quarterly as part of regular privacy audits, checking whether new features have introduced tracking technologies not previously documented or whether our practices have evolved in ways that require updated explanations. Significant external changes—new privacy regulations, major platform migrations, acquisition of new services—trigger immediate reviews regardless of the regular schedule. Minor clarifications happen more frequently; substantive changes that affect your privacy rights or expand data collection go through a more formal review process involving legal, security, and product leadership before implementation.
When we update this policy, notification methods depend on the change magnitude. Minor clarifications or additions of detail to existing practices get posted as updates with a "last modified" date at the top of this page. Material changes that expand data collection or introduce new tracking categories trigger direct notifications through email to all active users, plus prominent banners on the platform itself that persist until you've acknowledged the update. For significant changes affecting privacy rights, we provide side-by-side comparisons showing what changed and why, helping you quickly identify relevant modifications without reading the entire document again.
Version tracking allows you to see historical policy versions through an archive link at the bottom of this page. Each archived version includes its effective date range and a summary of what changed compared to the previous version. This transparency helps if you're trying to understand what our practices were during a specific time period—useful for educational research projects involving our platform or if you're verifying compliance promises made during your enrollment decision. We maintain this archive indefinitely for versions from the past five years, with older versions available by request.
Re-consent becomes necessary when changes materially affect your privacy rights or significantly expand data collection beyond what you originally agreed to. Adding a completely new category of tracking—say, integrating biometric authentication—would require explicit new consent before we could collect that data from you. Similarly, if we started sharing data with categories of third parties not covered in your original consent, we'd need fresh permission. You'd see a consent dialog blocking access to your account until you've reviewed the changes and made a choice. Declining consent for expanded collection doesn't affect your existing account; you simply wouldn't get access to new features that depend on that additional data collection.