Do the policies clearly indicate the version or effective date of the policies?
- Indicator
- Discloses the current version or effective date of the policies.
- Citation
- California Online Privacy Protection Act: (An operator is required to provide notice of the effective or revision date of its privacy policy) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22575(b)(4)
- Background
- A vendor should provide an effective date and notice of change of the Privacy Policy. A vendor should describe how they will provide notice before making material changes to the Policy to the appropriate "account holder," that is, the school or district, parent, or eligible student. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 16.
Do the policies clearly indicate whether or not the product is intended to be used by children under the age of 13?
- Indicator
- Discloses the product is intended to be used by children under the age of 13.
- Citation
- Children's Online Privacy Protection Act: (A site directed to children is where the operator has actual knowledge the site is collecting information from children under the age of 13 and parental consent is required before any collection or use of information) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- General Data Protection Regulation: (In relation to the offer of information society services directly to a child, the processing of the personal data of a child shall be lawful where the child is at least 16 years old. Where the child is below the age of 16 years, such processing shall be lawful only if and to the extent that consent is given or authorised by the holder of parental responsibility over the child. Member States may provide by law for a lower age for those purposes provided that such lower age is not below 13 years.) See General Data Protection Regulation (GDPR), Conditions Applicable to Child's Consent in Relation to Information Society Services, Art. 8(1)
Do the policies clearly indicate whether or not the product is intended to be used by students in preschool or K-12?
- Indicator
- Discloses the product is intended to be used by students in preschool or K-12.
- Citation
- Student Online Personal Information Protection Act: (SOPIPA applies to operators of online services that are primarily used for K-12 school purposes and were designed and marketed for K-12 school purposes) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(a)
- Early Learning Personal Information Protection Act: (ELPIPA applies to operators of online services that are primarily used for preschool or prekindergarten purposes and were designed and marketed for preschool or prekindergarten purposes) See Early Learning Personal Information Protection Act (ELPIPA), Cal. B.&P. Code § 22586(a)(1)
- Student Online Personal Information Protection Act: (SOPIPA does not apply to general audience websites and services that are not primarily used by K-12 students) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(m)
- Family Educational Rights and Privacy Act: ("Personal Information" under FERPA includes direct identifiers such as a student or family member's name, or indirect identifiers such as a date of birth, or mother's maiden name, or other information that is linkable to a specific student that would allow a reasonable person in the school community to identify the student with reasonable certainty) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.3
- California Privacy of Pupil Records: (Prohibits schools, school districts, county offices of education, and charter schools from collecting or maintaining information about pupils from social media for any purpose other than school or pupil safety, without notifying each parent or guardian and providing the pupil with access and an opportunity to correct or delete such information) See California Privacy of Pupil Records, Cal. Ed. Code § 49073.6(c)
Do the policies clearly indicate whether or not the vendor collects personally identifiable information (PII)?
- Indicator
- Discloses Personally Identifiable Information (PII) is collected.
- Discloses how the product collects personal information.
- Citation
- Children's Online Privacy Protection Act: (Personally Identifiable Information under COPPA includes first and last name, photos, videos, audio, geolocation information, persistent identifiers, IP address, cookies, and unique device identifiers) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- California Online Privacy Protection Act: (The term "Personally Identifiable Information" under CalOPPA means individually identifiable information about a consumer collected online by the operator from that individual and maintained by the operator in an accessible form, including any of the following: (1) A first and last name; (2) A home or other physical address, including street name and name of a city or town; (3) An e-mail address; (4) A telephone number; (5) A social security number; or (6) Any other identifier that permits the physical or online contacting of a specific individual) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22577(a)(1)-(6)
- Family Educational Rights and Privacy Act: ("Personal Information" under FERPA includes direct identifiers such as a student or family member's name, or indirect identifiers such as a date of birth, or mother's maiden name, or other information that is linkable to a specific student that would allow a reasonable person in the school community to identify the student with reasonable certainty) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.3
- General Data Protection Regulation: (“personal data” means any information relating to an identified or identifiable natural person ("data subject"); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person) See General Data Protection Regulation (GDPR), Definitions, Art. 4(1)
- Background
- FERPA defines the term personally identifiable information (PII) to include direct identifiers (such as a student's or other family member's name) and indirect identifiers (such as a student's date of birth, place of birth, or mother's maiden name). Indirect identifiers include metadata about a student's interaction with an application or service, and even aggregate information can be considered PII under FERPA if a reasonable person in the school community could identify individual students based on the indirect identifiers together with other reasonably available information, including other public information. See PTAC, Responsibilities of Third-Party Service Providers under FERPA, p. 2; See PTAC, Protecting Student Privacy While Using Online Educational Services: Model Terms of Service, p. 2.
- Companies collect a wide range of personal information from users—from personal details and account profiles to a user’s activities and location. We expect companies to clearly disclose what user information they collect and how they do so. See Ranking Digital Rights, P3.
- The term “user information” appears in many indicators throughout the Privacy category. An expansive interpretation of user information is defined as: “any data that is connected to an identifiable person, or may be connected to such a person by combining datasets or utilizing data-mining techniques.” As further explanation, user information is any data that documents a user’s characteristics and/or activities. This information may or may not be tied to a specific user account. This information includes, but is not limited to, personal correspondence, user-generated content, account preferences and settings, log and access data, data about a user’s activities or preferences collected from third parties either through behavioral tracking or purchasing of data, and all forms of metadata. See Ranking Digital Rights, P3.
Do the policies clearly indicate whether or not the vendor limits the collection or use of information to only data that are specifically required for the product?
- Indicator
- Discloses user information is only collected if it is directly relevant or necessary for the product to function.
- Citation
- Children's Online Privacy Protection Act: (A vendor is prohibited from conditioning a child's participation in a game or prize on the child disclosing more info than necessary to participate in the activity) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.7
- Family Educational Rights and Privacy Act: (An educational institution must use reasonable methods to ensure that school officials only use information for which they have a legitimate educational interest) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.31(a)(1)(ii)
- General Data Protection Regulation: ([Data shall be] adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed) See General Data Protection Regulation (GDPR), Principles relating to processing of personal data, Art. 5(1)(c)
- General Data Protection Regulation: (When assessing whether consent is freely given, utmost account shall be taken of whether, inter alia, the performance of a contract, including the provision of a service, is conditional on consent to the processing of personal data that is not necessary for the performance of that contract.) See General Data Protection Regulation (GDPR), Conditions for Consent, Art. 7(4)
- General Data Protection Regulation: (Taking into account the state of the art, the cost of implementation and the nature, scope, context and purposes of processing as well as the risks of varying likelihood and severity for rights and freedoms of natural persons posed by the processing, the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects.) See General Data Protection Regulation (GDPR), Data protection by design and by default, Art. 25(1)
- Background
- Privacy principles are intended to work together to shift the burden for protecting privacy away from consumers and to encourage companies to make strong privacy protections the default. Reasonable collection limits and data disposal policies work in tandem with streamlined notices and improved consumer choice mechanisms. Together, they function to provide substantive protections by placing reasonable limits on the collection, use, and retention of consumer data to more closely align with consumer expectations, while also raising consumer awareness about the nature and extent of data collection, use, and third-party sharing, and the choices available to them. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 24.
- Companies should limit data collection to that which is consistent with the context of a particular transaction or the consumer's relationship with the business, or as required or specifically authorized by law. For any data collection that is inconsistent with these contexts, companies should make appropriate disclosures to consumers at a relevant time and in a prominent manner – outside of a privacy policy or other legal document. This clarification of the collection limitation principle is intended to help companies assess whether their data collection is consistent with what a consumer might expect, but if it is not, they should provide prominent notice and choice. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 27.
- Data Minimization is a privacy principle best practice that requires companies to limit the data they collect and retain, and dispose of it once they no longer need it. This best practice is reinforced by the FTC which encourages companies to collect only the data they need to accomplish a specific business purpose, which is generally supported by several privacy frameworks and federal privacy statutes and regulations such as FERPA, COPPA, and the Health Insurance Portability and Accountability Act of 1996 (HIPAA). See The Organisation for Economic Co-operation and Development (OECD) Privacy Framework (2013); See Asia-Pacific Economic Cooperation (APEC) Privacy Framework; See also FTC, Internet of Things, Privacy and Security in a Connected World (2015), p. 24.
- A vendor should practice data minimization and collect only the student information necessary to accomplish the school purposes their site or service is designed to achieve or as directed by the school or district. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 12.
- We expect companies to commit to the principle of data minimization and to demonstrate how this principle shapes their practices regarding user information. See Ranking Digital Rights, P3.
Do the policies clearly indicate if collected information (this includes data collected via automated tracking or usage analytics) is shared with third parties?
- Indicator
- Discloses user information is shared with third parties.
- Discloses the type of user information shared with third parties.
- Citation
- Children's Online Privacy Protection Act: (Release of personal information means the sharing, selling, renting, or transfer of personal information to any third party) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Children's Online Privacy Protection Act: (An operator may share data with third parties who provide support for the "internal operations" of the service and who do not use or disclose the information for any other purpose) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Children's Online Privacy Protection Act: (An operator must take reasonable steps to release a child's personal information only to service providers and third parties who are capable of maintaining the confidentiality, security, and integrity of the information, and provide assurances that they contractually maintain the information in the same manner) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.8
- Children's Online Privacy Protection Act: (An operator can not condition a child's participation in the service with sharing any collected information with third parties. A parent is required to have the ability to consent to the collection and use of their child's personal information without also consenting to the disclosure of the information to third parties) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.5(a)(2)
- Family Educational Rights and Privacy Act: (A school is prohibited from disclosing a student's "education record" or data to third parties without parental consent) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.30
- Student Online Personal Information Protection Act: (An operator is prohibited from sharing student information to third parties except in limited circumstances to other schools, or for research purposes) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(4)
- General Data Protection Regulation: (“recipient” means a natural or legal person, public authority, agency or another body, to which the personal data are disclosed, whether a third party or not.) See General Data Protection Regulation (GDPR), Definitions, Art. 4(9)
- General Data Protection Regulation: ("third party" means a natural or legal person, public authority, agency or body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorised to process personal data) See General Data Protection Regulation (GDPR), Definitions, Art. 4(10)
- Background
- Online educational services increasingly collect a large amount of contextual or transactional data as part of their operations, often referred to as "metadata." Metadata refer to information that provides meaning and context to other data being collected; for example, information about how long a particular student took to perform an online task has more meaning if the user knows the date and time when the student completed the activity, how many attempts the student made, and how long the student's mouse hovered over an item (potentially indicating indecision). See PTAC, Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices, pp. 2-3.
- Metadata that have been stripped of all direct and indirect identifiers are not considered protected information under FERPA, because the data are not PII. A provider that has been granted access to PII from education records under the "school official" exception may use any metadata that are not linked to FERPA-protected information for other purposes, unless otherwise prohibited by the terms of their agreement with the school or district. See PTAC, Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices, pp. 2-3.
- Companies collect a wide range of personal information from users—from personal details and account profiles to a user’s activities and location. Companies also often share this information with third parties, such as advertisers, governments, and legal authorities. We expect companies to clearly disclose what user information they share and with whom. Company disclosure should specify if it shares user information with governments and with commercial entities. See Ranking Digital Rights, P4.
Do the policies clearly indicate what categories of information are shared with third parties?
- Indicator
- Discloses the categories of information shared with third parties.
- Citation
- Children's Online Privacy Protection Act: (A parent or guardian can request the operator to provide a description of the specific types or categories of personal information collected from children by the application or service) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.6(a)(1)
- Background
- Consumers deserve more transparency about how their data is shared beyond the entities with which they do business directly, including "third-party" data collectors. This means ensuring that consumers are meaningfully aware of the spectrum of information collection and reuse as the number of firms that are involved in mediating their consumer experience or collecting information from them multiplies. The data services industry should follow the lead of the online advertising and credit industries and build a common website or online portal that lists companies, describes their data practices, and provides methods for consumers to better control how their information is collected and used or to opt-out of certain marketing uses. See Exec. Office of the President, Big Data: Seizing Opportunities, Preserving Values (2014), p. 62.
- What is the "School Official" Exception? In some cases, providers need PII from a students's education records in order to deliver the agreed-upon services. FERPA's school official exception to consent is most likely to apply to the schools' and districts' relationships with service providers. When schools and districts outsource institutional services or functions, FERPA permits the disclosure of PII from education records to contractors, consultants, volunteers, or other third-parties provided that the outside party meets specified requirements. See 34 C.F.R. § 99.31(a)(1)(i); See also PTAC, Responsibilities of Third-Party Service Providers under FERPA, P. 2; See also PTAC, Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices, p. 3-5.
Do the policies clearly indicate whether or not personal information is shared with third parties for advertising or marketing purposes?
- Indicator
- Discloses information is shared with third parties for advertising or marketing purposes.
- Citation
- Children's Online Privacy Protection Act: (Release of personal information means the sharing, selling, renting, or transfer of personal information to any third party) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Children's Online Privacy Protection Act: (An operator may display contextual advertisements to a child under the age of 13 without verifiable parental consent, under the "internal operations" exception) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator is prohibited from using student data for targeted, behavioral, or contextual advertising) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(1)(A)
- California Privacy Rights for Minors in the Digital World: (Prohibits an operator from marketing or advertising non age-appropriate types of products or services to a minor under 18 years of age and from knowingly using, disclosing, compiling, or allowing a third party to use, disclose, or compile, the personal information of a minor for the purpose of marketing or advertising non age-appropriate types of products or services. Also, a minor is permitted to request to "erase" or remove and obtain removal of content or information posted on the operator's site) See California Privacy Rights for Minors in the Digital World, Cal. B.&P. Code §§ 22580-22582
- Background
- The FTC agrees that the defintion of first-party marketing should include the practice of contacting consumers across different channels. Regardless of the particular means of contact, receipt of a message from a company with which a consumer has interacted directly is likely to be consistent with the consumer's relationship with that company. If an offline or online retailer tracks a customer's activities on a third-party website, this is unlikely to be consistent with the customer's relationship with the retailer; thus, choice should be required. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 42; See also FTC Staff Report, Self-Regulatory Principles For Online Behavioral Advertising, pp. 26-28.
Do the policies clearly indicate whether or not a user's personal information is sold or rented to third parties?
- Indicator
- Discloses user information is sold or rented to third parties.
- Discloses vendor may sell user information to third parties.
- Citation
- Children's Online Privacy Protection Act: (Release of personal information means the sharing, selling, renting, or transfer of personal information to any third party) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator is prohibited from selling or renting student information) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(3)
- Background
- Companies that have first-party relationships with consumers should disclose specifically the purposes for which they provide personal data to third-parties, in order to help consumers understand the nature of those third-parties' activities, and whether those third-parties are bound to limit their use of the data to achieving those purposes. This gives consumers a more tractable task of assessing whether to engage with a single entity, rather than trying to understand what personal data third-parties (potentially dozens, or even hundreds of entities) receive and how they use it. See Exec. Office of the President, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy (2012), p. 15.
Do the policies clearly indicate whether or not social or federated login is supported to use the product?
- Indicator
- Discloses social login is supported to authenticate with the product.
- Citation
- California Privacy of Pupil Records: (Prohibits schools, school districts, county offices of education, and charter schools from collecting or maintaining information about pupils from social media for any purpose other than school or pupil safety, without notifying each parent or guardian and providing the pupil with access and an opportunity to correct or delete such information) See California Privacy of Pupil Records, Cal. Ed. Code § 49073.6(c)
Do the policies clearly indicate whether or not the vendor imposes contractual limits on how third parties can use personal information that the vendor shares or sells to them?
- Indicator
- Discloses contractual obligations or restrictions are placed on third parties who receive user information.
- Citation
- Children's Online Privacy Protection Act: (An operator must take reasonable steps to release a child's personal information only to service providers and third parties who are capable of maintaining the confidentiality, security, and integrity of the information, and provide assurances that they contractually maintain the information in the same manner) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.8
- Family Educational Rights and Privacy Act: (An exception for disclosing personally identifiable information without obtaining parental consent exists for sharing data with a third party who is considered a "school official" with a legitimate educational interest, and under direct control of the school for the use and maintenance of education records) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.31(a)(1)(i)(B)
- Student Online Personal Information Protection Act: (An operator may disclose student information to a third party service provider, but the third party is prohibited from using the information for or any purpose other than providing the service) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(4)(E)(i)
- Student Online Personal Information Protection Act: (A third party service provider may not disclose student information to any subsequent third party) See Student Online Personal Information Protection Act (SOPIPA),Cal. B.&P. Code § 22584(b)(4)(E)(ii)
- General Data Protection Regulation: (The processor shall not engage another processor without prior specific or general written authorisation of the controller. In the case of general written authorisation, the processor shall inform the controller of any intended changes concerning the addition or replacement of other processors, thereby giving the controller the opportunity to object to such changes.) See General Data Protection Regulation (GDPR), Processor, Art. 28(2)
- General Data Protection Regulation: (Processing by a processor shall be governed by a contract or other legal act under Union or Member State law, that is binding on the processor with regard to the controller and that sets out the subject-matter and duration of the processing, the nature and purpose of the processing, the type of personal data and categories of data subjects and the obligations and rights of the controller.) See General Data Protection Regulation (GDPR), Processor, Art. 28(3)
- General Data Protection Regulation: (Where a processor engages another processor for carrying out specific processing activities on behalf of the controller, the same data protection obligations as set out in the contract or other legal act between the controller and the processor ... shall be imposed on that other processor by way of a contract or other legal act under Union or Member State law, in particular providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that the processing will meet the requirements of this Regulation. Where that other processor fails to fulfil its data protection obligations, the initial processor shall remain fully liable to the controller for the performance of that other processor's obligations.) See General Data Protection Regulation (GDPR), Processor, Art. 28(4)
- General Data Protection Regulation: (The processor and any person acting under the authority of the controller or of the processor, who has access to personal data, shall not process those data except on instructions from the controller) See General Data Protection Regulation (GDPR), Processing under the authority of the controller or processor, Art. 29
- Background
- A company that transfers data from one company to another should not place emphasis on the disclosures themselves, but on whether a disclosure leads to a use of personal data that is inconsistent within the context of its collection or a consumer's expressed desire to control the data. Thus, if a company transfers personal data to a third party, it remains accountable and thus should hold the recipient accountable—through contracts or other legally enforceable instruments. See Exec. Office of the President, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy (2012), p. 22.
- A company's data would not be "reasonably linkable" to a particular consumer or device to the extent that the company implements three significant protections for that data: (1) a given data set is not reasonably identifiable, (2) the company publicly commits not to re-identify it, and (3) the company requires any downstream users of the data to keep it in de-identified form. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 21.
- The ability to re-identify "anonymous" data supports the FTC's framework application to data that can be reasonably linked to a consumer or device, because consumers' privacy interest in data goes beyond what is strictly labeled PII. There exists a legitimate interest for consumers in having control over how companies collect and use aggregated or de-identified data, browser fingerprints, and other types of non-PII. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), pp. 18-19.
- Properly de-identified data can reduce the risk of a person's sensitive personal information being disclosed, but data de-identification must be done carefully. Simple removal of direct identifiers from the data to be released does not constitute adequate de-identification. Properly performed de-identification involves removing or obscuring all identifiable information until all data that can lead to individual identification have been expunged or masked. Further, when making a determination as to whether the data have been sufficiently de-identified, it is necessary to take into consideration cumulative re-identification risk from all previous data releases and other reasonably available information. See PTC, Data De-identification: An Overview of Basic Terms, p. 3.
- A vendor should contractually require their service providers who receive covered information acquired through the site or service to use the information only to provide the contracted service, not to further disclose the information, to implement and maintain reasonable security procedures and practices as required by law, and to return or delete covered information at the completion of the contract. Include a requirement that any service providers notify the vendor immediately of any unauthorized disclosure of the student information in their custody, and then act promptly to provide proper notice as required by law. Make clear to service providers that they may separately face liability for the mishandling of student data. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 13.
Do the policies clearly indicate whether or not a user can create or upload content to the product?
- Indicator
- Discloses user content may be created or uploaded to the product.
Do the policies clearly indicate whether or not the vendor provides authorized individuals a method to access a user's personal information?
- Indicator
- Discloses processes for access and review of users' information.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to provide a parent or guardian access to review, modify, or delete their children's information or prevent further collection of information) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.3(c); See also 16 C.F.R. Part 312.4(d)(3); 16 C.F.R. Part 312.6)
- California Online Privacy Protection Act: (If the operator maintains a process for a consumer to review and request changes to any of their personally identifiable information they must provide a description of that process) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22575(b)(2)
- General Data Protection Regulation: (The controller shall, at the time when personal data are obtained, provide the data subject with the following further information necessary to ensure fair and transparent processing: ... (b) the existence of the right to request from the controller access to ... personal data ... concerning the data subject) See General Data Protection Regulation (GDPR), Information to be provided where personal data are collected from the data subject, Art. 13(2)(b)
- General Data Protection Regulation: (The controller shall provide the data subject with the following information necessary to ensure fair and transparent processing in respect of the data subject: ... (c) the existence of the right to request from the controller access to ... personal data ... concerning the data subject) See General Data Protection Regulation (GDPR), Information to be provided where personal data have not been obtained from the data subject, Art. 14(2)(c)
- General Data Protection Regulation: (The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and where that is the case, access to the personal data) See General Data Protection Regulation (GDPR), Right of access by the data subject, Art. 15(1)
Do the policies clearly indicate whether or not the vendor provides authorized individuals with the ability to modify a user's inaccurate data?
- Indicator
- Discloses processes for the correction or modification of users' information.
- Citation
- California Online Privacy Protection Act: (If the operator maintains a process for a consumer to review and request changes to any of their personally identifiable information they must provide a description of that process) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22575(b)(2)
- General Data Protection Regulation: (The data subject shall have the right to obtain from the controller without undue delay the rectification of inaccurate personal data concerning him or her. Taking into account the purposes of the processing, the data subject shall have the right to have incomplete personal data completed, including by means of providing a supplementary statement.) See General Data Protection Regulation (GDPR), Right to rectification, Art. 16
Do the policies clearly indicate whether or not the vendor provides a process for the school, parent, or eligible student to delete a student's personal information?
- Indicator
- Discloses processes for the school, parents, or students to delete users' information.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to provide a parent or guardian access to review, modify, or delete their children's information or prevent further collection of information) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.3(c); See also 16 C.F.R. Part 312.4(d)(3); 16 C.F.R. Part 312.6)
- Family Educational Rights and Privacy Act: (A parent or guardian can request the educational agency to access, modify, or delete their student's education records) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.10; 34 C.F.R. Part 99.20
- Family Educational Rights and Privacy Act: (Any rights to access, modify, or delete student records may transfer to an "eligible" student who is over 18 years of age) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.5(a)(1)
- Student Online Personal Information Protection Act: (An operator is required to delete personal information at the request of a parent or the school) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(d)(2)
- California Privacy of Pupil Records: (Prohibits schools, school districts, county offices of education, and charter schools from collecting or maintaining information about pupils from social media for any purpose other than school or pupil safety, without notifying each parent or guardian and providing the pupil with access and an opportunity to correct or delete such information) See California Privacy of Pupil Records, Cal. Ed. Code § 49073.6(c)
- General Data Protection Regulation: (The controller shall, at the time when personal data are obtained, provide the data subject with the following further information necessary to ensure fair and transparent processing: ... (b) the existence of the right to request from the controller ... erasure of personal data ... concerning the data subject) See General Data Protection Regulation (GDPR), Information to be provided where personal data are collected from the data subject, Art. 13(2)(b)
- General Data Protection Regulation: (The controller shall provide the data subject with the following information necessary to ensure fair and transparent processing in respect of the data subject: ... (c) the existence of the right to request from the controller ... erasure of personal data ... concerning the data subject) See General Data Protection Regulation (GDPR), Information to be provided where personal data have not been obtained from the data subject, Art. 14(2)(c)
- General Data Protection Regulation: (The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and where that is the case, access to the personal data and the following information: ... (e) the existence of the right to request from the controller ... erasure of personal data ... concerning the data subject) See General Data Protection Regulation (GDPR), Right of access by the data subject, Art. 15(1)(e)
- General Data Protection Regulation: (The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay and the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies: ... (b) the data subject withdraws consent on which the processing is based ... and where there is no other legal ground for the processing) See General Data Protection Regulation (GDPR), Right to erasure, Art. 17(1)(b)
- General Data Protection Regulation: (The controller shall communicate any ... erasure of personal data ... to each recipient to whom the personal data have been disclosed, unless this proves impossible or involves disproportionate effort. The controller shall inform the data subject about those recipients if the data subject requests it.) See General Data Protection Regulation (GDPR), Notification obligation regarding rectification or erasure of personal data or restriction of processing, Art. 19
- Background
- A vendor should build into their system the ability to destroy personally identified or identifiable information acquired through the site or service. A vendor should also be prepared to delete the information if directed by the school or district. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 12.
- The FTC recommends that as a best practice a vendor should delete personal information they know to have come from a child-directed site. In addition, COPPA requires that parents be able to direct the deletion of personal data. See FTC, Complying with COPPA: Frequently Asked Questions, question K.2; 16 C.F.R. § 312.6(a)(2).
Do the policies clearly indicate whether or not the vendor can transfer a user's data in the event of the vendor's merger, acquisition, or bankruptcy?
- Indicator
- Discloses user information may be transferred to a third party as an asset.
- Citation
- Children's Online Privacy Protection Act: (Release of personal information means the sharing, selling, renting, or transfer of personal information to any third party) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator may transfer a student's personal information to a third party in the event of a merger, acquisition, or bankruptcy, but the successor entity is subject to the same onward data privacy and security obligations) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(3)
Do the policies indicate whether or not the vendor requires a user to create an account with a username and password in order to use the product?
- Indicator
- Discloses users are required to create an account to use the product.
Do the policies clearly indicate whether or not the vendor provides user managed accounts for a parent, teacher, school or district?
- Indicator
- Discloses managed accounts are provided for parents, teachers, schools, or district staff.
- Discloses accounts are created for students by parents, teachers, schools, or district staff.
Do the policies clearly indicate whether or not reasonable security standards are used to protect the confidentiality of a user's personal information?
- Indicator
- Discloses security protections in place for users' information are based on industry standards and best practices.
- Discloses complex passwords and failed login lockouts protect user information.
- Discloses advanced authentication methods are provided by the company to prevent fraudulent access.
- Discloses users can view their recent account activity and login information.
- Discloses users are notified about unusual account activity and possible unauthorized access to their accounts.
- Citation
- Children's Online Privacy Protection Act: (An operator must maintain the confidentiality, security, and integrity of personal information collected from children) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.3(e); See also 16 C.F.R. Part 312.8
- California Data Breach Notification Requirements: (A person or business that owns, licenses, or maintains personal information about a California resident is required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information, and to protect the personal information from unauthorized access, destruction, use, modification, or disclosure) See California Data Breach Notification Requirements, Cal. Civ. Code § 1798.81.5
- Children's Online Privacy Protection Act: (An operator must take reasonable steps to release a child's personal information only to service providers and third parties who are capable of maintaining the confidentiality, security, and integrity of the information, and provide assurances that they contractually maintain the information in the same manner) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.8
- Student Online Personal Information Protection Act: (An operator is required to implement reasonable security procedures, practices, and protect student data from unauthorized access, destruction, use, modification, or disclosure) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(d)(1)
- Family Educational Rights and Privacy Act: (An educational institution must maintain physical, technical, and administrative safeguards to protect student information) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.31(a)(1)(ii)
- California AB 1584 - Privacy of Pupil Records: (A local educational agency that enters into a contract with a third party must ensure the contract contains a description of the actions the third party will take, including the designation and training of responsible individuals, to ensure the security and confidentiality of pupil records) See California AB 1584 - Privacy of Pupil Records, Cal. Ed. Code § 49073.1(b)(5)
- General Data Protection Regulation: ([Data shall be] processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures) See General Data Protection Regulation (GDPR), Principles relating to processing of personal data, Art. 5(1)(f)
- General Data Protection Regulation: (Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: ...(b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services) See General Data Protection Regulation (GDPR), Security of processing, Art. 32(1)(b)
- General Data Protection Regulation: (In assessing the appropriate level of security account shall be taken in particular of the risks that are presented by processing, in particular from accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to personal data transmitted, stored or otherwise processed.) See General Data Protection Regulation (GDPR), Security of processing, Art. 32(2)
- Background
- A vendor should provide a general description of the technical, administrative and physical safeguards you use to protect student information from unauthorized access, destruction, use, modification, or disclosure. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 14.
- A vendor should implement and maintain reasonable security measures appropriate to the nature of the student information, including covered information, acquired through your site or service. Designate and train someone responsible and use a risk management process: identify your data assets, assess threats and vulnerabilities, apply appropriate controls, monitor their effectiveness, and repeat the process. As discussed in the California Data Breach Report, the Center for Internet Security’s Critical Security Controls is a good starting point for high-priority security controls. The Federal Trade Commission’s Start with Security also offers helpful guidance. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 15.
- This indicator is applicable to internet and mobile ecosystem companies. Companies hold significant amounts of user information, making them targets for malicious actors. We expect companies to help users protect themselves against such threats. Companies should clearly disclose that they use advanced authentication techniques to prevent unauthorized access to user accounts and information. We also expect companies to provide users with tools that enable them to secure their accounts and to know when their accounts maybe compromised. See Ranking Digital Rights, P17.
Do the policies clearly indicate whether or not all data in transit is encrypted?
- Indicator
- Discloses the transmission of user communications are encrypted using Secure Socket Layer (SSL).
- Discloses the transmission of user communications are encrypted using unique keys.
- Discloses users can secure information with their own user supplied encryption keys.
- Discloses user communications are encrypted by default.
- Citation
- California Data Breach Notification Requirements: (A person or business that owns, licenses, or maintains personal information about a California resident is required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information, and to protect the personal information from unauthorized access, destruction, use, modification, or disclosure) See California Data Breach Notification Requirements, Cal. Civ. Code § 1798.81.5
- General Data Protection Regulation: (Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data) See General Data Protection Regulation (GDPR), Security of processing, Art. 32(1)(a)
- Background
- Encryption is an important tool for protecting freedom of expression and privacy. The UN Special Rapporteur on Freedom of Expression has stated unequivocally that encryption and anonymity are essential for the exercise and protection of human rights. We expect companies to clearly disclose that user communications are encrypted by default, that transmissions are protected by “perfect forward secrecy,” that users have an option users have to turn on end-to-end encryption, and if the company offers end-to-end encryption by default. For mobile ecosystems, we expect companies to clearly disclose that they enable full-disk encryption. See Ranking Digital Rights, P16.
Do the policies clearly indicate whether or not all data at rest is encrypted?
- Indicator
- Discloses user information is encrypted or inaccessible while in storage.
- Discloses user information on mobile devices is encrypted with full disk encryption.
- Discloses user information is encrypted if stored with third parties.
- Discloses user information is encrypted while archived.
- Citation
- California Data Breach Notification Requirements: (A person or business that owns, licenses, or maintains personal information about a California resident is required to implement and maintain reasonable security procedures and practices appropriate to the nature of the information, and to protect the personal information from unauthorized access, destruction, use, modification, or disclosure) See California Data Breach Notification Requirements, Cal. Civ. Code § 1798.81.5
- General Data Protection Regulation: (Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: (a) the pseudonymisation and encryption of personal data) See General Data Protection Regulation (GDPR), Security of processing, Art. 32(1)(a)
Do the policies clearly indicate whether or not the vendor provides notice in the event of a data breach to affected individuals?
- Indicator
- Discloses processes for notification of users affected by a data breach.
- Discloses notification is provided to relevant legal authorities without unreasonable delay when a data breach occurs.
- Discloses steps taken by the company to remedy the impact of a data breach on users.
- Citation
- California Data Breach Notification Requirements: (A business that collects personal information from California consumers is required to disclose a breach of the security of their system following discovery or notification of the breach in the security of a consumer's data whose unencrypted personal information was reasonably believed to have been acquired by an unauthorized person) See California Data Breach Notification Requirements, Cal. Civ. Code § 1798.29; § 1798.29(h)(4); § 1798.82;
- California AB 1584 - Privacy of Pupil Records: (A local educational agency that enters into a contract with a third party must ensure the contract contains a description of the procedures for notifying the affected parent, legal guardian, or eligible pupil in the event of an unauthorized disclosure of the pupil’s records) See California AB 1584 - Privacy of Pupil Records, Cal. Ed. Code § 49073.1(b)(6)
- General Data Protection Regulation: (“personal data breach” means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed) See General Data Protection Regulation (GDPR), Definitions, Art. 4(12)
- General Data Protection Regulation: (In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.) See General Data Protection Regulation (GDPR), Notification of a personal data breach to the supervisory authority, Art. 33(1)
- General Data Protection Regulation: (The processor shall notify the controller without undue delay after becoming aware of a personal data breach.) See General Data Protection Regulation (GDPR), Notification of a personal data breach to the supervisory authority, Art. 33(2)
- General Data Protection Regulation: (The notification ... shall at least: (a) describe the nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned; (b) communicate the name and contact details of the data protection officer or other contact point where more information can be obtained; (c) describe the likely consequences of the personal data breach; (d) describe the measures taken or proposed to be taken by the controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.) See General Data Protection Regulation (GDPR), Notification of a personal data breach to the supervisory authority, Art. 33(3)(a)-(d)
- General Data Protection Regulation: (Where, and in so far as, it is not possible to provide the information at the same time, the information may be provided in phases without undue further delay.) See General Data Protection Regulation (GDPR), Notification of a personal data breach to the supervisory authority, Art. 33(4)
- General Data Protection Regulation: (The controller shall document any personal data breaches, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with this Article.) See General Data Protection Regulation (GDPR), Notification of a personal data breach to the supervisory authority, Art. 33(5)
- General Data Protection Regulation: (When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay.) See General Data Protection Regulation (GDPR), Communication of a personal data breach to the data subject, Art. 34(1)
- General Data Protection Regulation: (The communication to the data subject referred to in paragraph 1 of this Article shall describe in clear and plain language the nature of the personal data breach and contain at least the information and the recommendations provided) See General Data Protection Regulation (GDPR), Communication of a personal data breach to the data subject, Art. 34(2)
- General Data Protection Regulation: (The communication to the data subject ... shall not be required if any of the following conditions are met: (a) the controller has implemented appropriate technical and organisational protection measures, and that those measures were applied to the personal data affected by the personal data breach, in particular those that render the personal data unintelligible to any person who is not authorised to access it, such as encryption; (b) the controller has taken subsequent measures which ensure that the high risk to the rights and freedoms of data subjects ... is no longer likely to materialise; (c) it would involve disproportionate effort. In such a case, there shall instead be a public communication or similar measure whereby the data subjects are informed in an equally effective manner.) See General Data Protection Regulation (GDPR), Communication of a personal data breach to the data subject, Art. 34(3)(a)-(c)
- Background
- The breach notification laws in California and the 46 other states are similar in many ways, because most are modeled on the original California law. All of them require notifying individuals when their personal information has been breached, prefer written notification but allow using the "substitute method" in certain situations, allow for a law enforcement delay, and provide an exemption from the requirement to notify when data is encrypted and the keys required to de-crypt the data are still secure. However, there are some differences, primarily in three areas: (1) the notification trigger, (2) the timing for notification, and (3) the definition of covered information. See CA DOJ, California Data Breach Report (2016).
- A vendor should develop and describe the process for notifying schools or school districts, parents, legal guardians, or eligible students, as well as any appropriate government agencies, of any unauthorized disclosure of student information. Determine whether the incident and the types of data involved also require notification under California's breach notification law, and if so, take appropriate action. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 15.
- When the security of users' data has been compromised due to a data breach, companies should have clearly disclosed processes in place for addressing the security threat and for notifying affected users. Given that data breaches can result in significant threats to an individual's financial or personal security, in addition to exposing private information, companies should make these security processes publicly available. Individuals can then make informed decisions and consider the potential risks before signing up for a service or giving a company their information. Company press releases or blog posts addressing a data breach after it has occurred do not qualify as sufficient disclosure for this indicator. We expect companies to have formal policies in place regarding their handling of data breaches if and when they occur, and companies to make this information about these policies and commitments public. See Ranking Digital Rights, P15.
Do the policies clearly indicate whether or not a user can interact with trusted users?
- Indicator
- Discloses users can have social interactions with trusted or other known users.
- Discloses users can have social interactions with students in the same classroom or school.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to disclose whether the service enables a child to make personal information publicly available) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.4(d)(2)
- Children's Online Privacy Protection Act: (An operator is prohibited from making personal information from a child publicly available in identifiable form by any means, including a public posting through the Internet, or through a personal home page or screen posted on a Web site or online service, a pen pal service, an electronic mail service, a message board, or a chat room) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
Do the policies clearly indicate whether or not a user's personal information can be displayed publicly in any way?
- Indicator
- Discloses users' personal information can be made publicly visible.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to disclose whether the service enables a child to make personal information publicly available) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.4(d)(2)
- Children's Online Privacy Protection Act: (An operator is prohibited from making personal information from a child publicly available in identifiable form by any means, including a public posting through the Internet, or through a personal home page or screen posted on a Web site or online service, a pen pal service, an electronic mail service, a message board, or a chat room) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
Do the policies clearly indicate whether or not the vendor takes reasonable measures to delete all personal information from a user's postings before they are made publicly visible?
- Indicator
- Discloses processes to filter and delete users' personal information before it is made publicly visible.
- Citation
- Children's Online Privacy Protection Act: (An operator may prevent collection of personal information if it takes reasonable measures to delete all or virtually all personal information from a child's postings before they are made public and also to delete the information from its records) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Background
- Companies may employ staff to review content and/or user activity or they may rely on community flagging mechanisms that allow users to flag other users’ content and/or activity for company review. See Ranking Digital Rights, F3.
Do the policies clearly indicate whether or not social interactions between users of the product are moderated?
- Indicator
- Discloses social interactions between users are moderated.
- Citation
- Children's Online Privacy Protection Act: (An operator may prevent collection of personal information if it takes reasonable measures to delete all or virtually all personal information from a child's postings before they are made public and also to delete the information from its records) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Background
- A vendor should control the information disclosed through the site or service by monitoring for the presence of unauthorized third parties or third parties with unauthorized information collection practices. Take action to remove any unauthorized parties. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 14.
Do the policies clearly indicate whether or not traditional advertisements are displayed to a user based on a webpage's content, and not that user's data?
- Indicator
- Discloses traditional advertisements are displayed to users on the product.
- Discloses advertisements are displayed to users without using of any collected personal information.
- Citation
- Children's Online Privacy Protection Act: (An operator may display contextual advertisements to a child under the age of 13 without verifiable parental consent, under the "internal operations" exception) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
Do the policies clearly indicate whether or not behavioral advertising based on a user's personal information are displayed?
- Indicator
- Discloses behavorial advertisements are displayed to users on the product.
- Discloses advertisements are displayed to users based on thier personal or non-personal information.
- Citation
- Children's Online Privacy Protection Act: (An operator may display contextual advertisements to a child under the age of 13 without verifiable parental consent, under the "internal operations" exception) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Children's Online Privacy Protection Act: (An operator is prohibited from including behavioral advertisements or amassing a profile of a child under the age of 13 child without parental consent) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator is prohibited from using student data for targeted, behavioral, or contextual advertising) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(1)(A)
- Background
- Online behavioral or targeted advertising is the practice of collecting information about consumers' online interests in order to deliver targeted advertising to them. This system of advertising revolves around ad networks that can track individual consumers—or at least their devices—across different websites. When organized according to unique identifiers, this data can provide a potentially wide-ranging view of individual use of the Internet. These individual behavioral profiles allow advertisers to target ads based on inferences about individual interests, as revealed by Internet use. Targeted ads are generally more valuable and efficient than purely contextual ads and provide revenue that supports an array of free online content and services. See Exec. Office of the President, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy (2012), pp. 11-12.
- The FTC recommends that affirmative express consent is appropriate when a company uses sensitive data for any marketing, whether first or third-party. When health or children's information is involved, for example, the likelihood that data misuse could lead to embarrassment, discrimination, or other harms is increased. This risk exists regardless of whether the entity collecting and using the data is a first-party or a third-party that is unknown to the consumer. In light of the heightened privacy risks associated with sensitive data, first parties should provide a consumer choice mechanism at the time of data collection. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 47.
- The FTC believes affirmative express consent for first-party marketing using sensitive data should be limited. Certainly, where a company's business model is designed to target consumers based on sensitive data – including data about children, financial and health information, Social Security numbers, and certain geolocation data – the company should seek affirmative express consent before collecting the data from those consumers. On the other hand, the risks to consumers may not justify the potential burdens on general audience businesses that incidentally collect and use sensitive information. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), pp. 47-48.
- If a vendor displays targeted advertising they should not use any information, including covered information and persistent unique identifiers, acquired through the site or service as a basis for targeting advertising to a specific student or other user. This includes both advertising delivered on the site or service that acquired the information and advertising delivered on any other site or service based on that information. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 12.
Do the policies clearly indicate whether or not third-party advertising services or tracking technologies collect any information from a user of the product?
- Indicator
- Discloses user information is collected by third-party advertising or tracking services on the product.
- Citation
- Student Online Personal Information Protection Act: (An operator is prohibited from tracking a student across websites with targeted advertising) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(1)(A)
- Children's Online Privacy Protection Act: (An operator is prohibited from sharing a persistent identifier collected from children that can be used to recognize and track a user over time and across different websites or services without verifiable parental consent) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- California Online Privacy Protection Act: (An operator may provide a hyperlink in their privacy policy to a location containing a description, including the effects, of any program or protocol that offers the consumer a choice not to be tracked) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22575(b)(7)
Do the policies clearly indicate whether or not a user's information is used to track users and display target advertisements on other third-party websites or services?
- Indicator
- Discloses user information is used to track and target advertisements on other third-party websites or services across the Internet.
- Citation
- Children's Online Privacy Protection Act: (An operator is prohibited from sharing a persistent identifier collected from children that can be used to recognize and track a user over time and across different websites or services without verifiable parental consent) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator is prohibited from tracking a student across websites with targeted advertising) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(1)(A)
- California Online Privacy Protection Act: (An operator is required to disclose whether other third parties may collect personally identifiable information about a consumer's online activities over time and across different Web sites) See California Online Privacy Protection Act (CalOPPA), Cal. B.&P. Code §22575(b)(6)
- Family Educational Rights and Privacy Act: ("Personal Information" under FERPA includes direct identifiers such as a student or family member's name, or indirect identifiers such as a date of birth, or mother's maiden name, or other information that is linkable to a specific student that would allow a reasonable person in the school community to identify the student with reasonable certainty) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.3
- California Privacy Rights for Minors in the Digital World: (Prohibits an operator from marketing or advertising non age-appropriate types of products or services to a minor under 18 years of age and from knowingly using, disclosing, compiling, or allowing a third party to use, disclose, or compile, the personal information of a minor for the purpose of marketing or advertising non age-appropriate types of products or services. Also, a minor is permitted to request to "erase" or remove and obtain removal of content or information posted on the operator's site) See California Privacy Rights for Minors in the Digital World, Cal. B.&P. Code §§ 22580-22582
- Background
- The FTC recommends that where a company that has a first-party relationship with a consumer for delivery of a specific service, but also tracks the consumer's activities across other parties' websites, such tracking is unlikely to be consistent with the context of the consumer's first-party relationship with the entity. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 41.
- The FTC agrees that the defintion of first-party marketing should include the practice of contacting consumers across different channels. Regardless of the particular means of contact, receipt of a message from a company with which a consumer has interacted directly is likely to be consistent with the consumer's relationship with that company. If an offline or online retailer tracks a customer's activities on a third-party website, this is unlikely to be consistent with the customer's relationship with the retailer; thus, choice should be required. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 42; See also FTC Staff Report, Self-Regulatory Principles For Online Behavioral Advertising, pp. 26-28.
Do the policies clearly indicate whether or not the vendor allows third parties to use a student's data to create an automated profile, engage in data enhancement, conduct social advertising, or target advertising to students, parents, teachers, or the school?
- Indicator
- Discloses user information is used to create a third-party advertising profile.
- Discloses advertisements are targeted to users based on thier personal information or compiled profile.
- Discloses user information is used for automated decision-making processes.
- Discloses automated decision-making processes are used to generate user profiles.
- Citation
- Children's Online Privacy Protection Act: (An operator is prohibited from including behavioral advertisements or amassing a profile of a child under the age of 13 child without parental consent) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.2
- Student Online Personal Information Protection Act: (An operator is prohibited from amassing a profile of a student) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(b)(2)
- Student Online Personal Information Protection Act: (An operator may share student data with third parties for legitimate research purposes if not used for advertising or to amass a profile on a student for purposes other than K–12 school purposes) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(e)(2)
- California Privacy Rights for Minors in the Digital World: (Prohibits an operator from marketing or advertising non age-appropriate types of products or services to a minor under 18 years of age and from knowingly using, disclosing, compiling, or allowing a third party to use, disclose, or compile, the personal information of a minor for the purpose of marketing or advertising non age-appropriate types of products or services. Also, a minor is permitted to request to "erase" or remove and obtain removal of content or information posted on the operator's site) See California Privacy Rights for Minors in the Digital World, Cal. B.&P. Code §§ 22580-22582
- General Data Protection Regulation: (The controller shall, at the time when personal data are obtained, provide the data subject with the following further information necessary to ensure fair and transparent processing: ... (f) the existence of automated decision-making, including profiling ... and, at least in those cases, meaningful information about the logic involved, as well as the significance and the envisaged consequences of such processing for the data subject.) See General Data Protection Regulation (GDPR), Information to be provided where personal data are collected from the data subject, Art. 13(2)(f)
- General Data Protection Regulation: (The controller shall provide the data subject with the following information necessary to ensure fair and transparent processing in respect of the data subject: ... (g) the existence of automated decision-making, including profiling ... and, at least in those cases, meaningful information about the logic involved, as well as the significance and the envisaged consequences of such processing for the data subject.) See General Data Protection Regulation (GDPR), Information to be provided where personal data have not been obtained from the data subject, Art. 14(2)(g)
- General Data Protection Regulation: (The data subject shall have the right to obtain from the controller confirmation as to whether or not personal data concerning him or her are being processed, and where that is the case, access to the personal data and the following information: ... (h) the existence of automated decision-making, including profiling ... and, at least in those cases, meaningful information about the logic involved, as well as the significance and the envisaged consequences of such processing for the data subject.) See General Data Protection Regulation (GDPR), Right of access by the data subject, Art. 15(1)(h)
- General Data Protection Regulation: (The data subject shall have the right not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her.) See General Data Protection Regulation (GDPR), Automated individual decision-making, including profiling, Art. 22(1)
- General Data Protection Regulation: (automated processing, including profiling shall be permitted if ... “based on the data subject's explicit consent.”) See General Data Protection Regulation (GDPR), Automated individual decision-making, including profiling, Art. 22(2)(c)
- General Data Protection Regulation: (the data controller shall implement suitable measures to safeguard the data subject's rights and freedoms and legitimate interests, at least the right to obtain human intervention on the part of the controller, to express his or her point of view and to contest the decision.) See General Data Protection Regulation (GDPR), Automated individual decision-making, including profiling, Art. 22(3)
- General Data Protection Regulation: (“profiling” means any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements) See General Data Protection Regulation (GDPR), Definitions, Art. 4(4)
- Background
- Companies should improve the transparency of their advertising practices by disclosing that they engage in data enhancement and educate consumers about the practice, identifying the third-party sources of the data, and providing a link or other contact information so the consumer can contact the third-party source directly. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 44.
- The FTC recommends that to further protect consumer privacy, first-parties that obtain marketing data for enhancement should take steps to encourage their third-party data broker sources to increase their own transparency, including by participating in a centralized data broker website, where consumers could learn more information about data brokers and exercise choice. See FTC, Protecting Consumer Privacy in an era of rapid change: recommendations for business and policy makers (2012), p. 44.
- Companies' privacy policies should be clear that collected data and/or metadata may not be used to create user profiles for the purposes of targeting students or their parents for advertising and marketing, which could violate several privacy laws. See PTAC, Protecting Student Privacy While Using Online Educational Services: Model Terms of Service, p. 4.
- As students begin to share information with educational institutions or vendors, they expect that they are doing so in order to develop knowledge and skills, not to have their data used to build extensive profiles about their strengths and weaknesses that could be used to their disadvantage in later years. Educational institutions are also in a unique position to help prepare children, adolescents, and adults to grapple with the world of big data. See Exec. Office of the President, Big Data: Seizing Opportunities, Preserving Values (2014), p. 63.
- A vendor should not use any information, including covered information and persistent unique identifiers, acquired through the site or service to create profiles of students, except profiles that are necessary for the school purposes furthered by the site or service. See Ready for School, Recommendations for the Ed Tech Industry to Protect the Privacy of Student Data (November 2016), CA. D.O.J., p. 13.
Do the policies clearly indicate whether or not the product is primarily used, designed, and marketed for preschool or K-12 school purposes?
- Indicator
- Discloses the product is primarily used, designed, and marketed for preschool or K-12.
- Citation
- Student Online Personal Information Protection Act: (SOPIPA applies to operators of online services that are primarily used for K-12 school purposes and were designed and marketed for K-12 school purposes) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(a)
- Student Online Personal Information Protection Act: (SOPIPA does not apply to general audience websites and services that are not primarily used by K-12 students) See Student Online Personal Information Protection Act (SOPIPA), Cal. B.&P. Code § 22584(m)
- Early Learning Personal Information Protection Act: (ELPIPA applies to operators of online services that are primarily used for preschool or prekindergarten purposes and were designed and marketed for preschool or prekindergarten purposes) See Early Learning Personal Information Protection Act (ELPIPA), Cal. B.&P. Code § 22586(a)(1)
Do the policies clearly indicate whether or not the vendor or third party obtains verifiable parental consent before they collect or disclose personal information?
- Indicator
- Discloses verifiable parental consent is obtained before the collection or use of personal information from children under 13 years of age.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to obtain verifiable parental consent before any collection, use, or disclosure of personal information from children) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.5
- Children's Online Privacy Protection Act: (An operator must make reasonable efforts to obtain verifiable parental consent, taking into consideration available technology and existing methods available to a parent to prove their identity) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.5(b)(i)-(iv); See also 15 U.S.C. §6501(9)
- Family Educational Rights and Privacy Act: (A school is prohibited from disclosing a student's "education record" or data to third parties without parental consent) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.30
- Family Educational Rights and Privacy Act: (A parent or eligible student is required to provide a signed and dated written consent before an educational institution discloses personally identifiable information from the student's records) See Family Educational Rights and Privacy Act (FERPA), 34 C.F.R. Part 99.30
- California AB 1584 - Privacy of Pupil Records: (A local educational agency that enters into a contract with a third party must ensure the contract contains a prohibition against the third party using personally identifiable information in pupil records to engage in targeted advertising) See California AB 1584 - Privacy of Pupil Records, Cal. Ed. Code § 49073.1(b)(9)
- General Data Protection Regulation: (In relation to the offer of information society services directly to a child, the processing of the personal data of a child shall be lawful where the child is at least 16 years old. Where the child is below the age of 16 years, such processing shall be lawful only if and to the extent that consent is given or authorised by the holder of parental responsibility over the child. Member States may provide by law for a lower age for those purposes provided that such lower age is not below 13 years.) See General Data Protection Regulation (GDPR), Conditions Applicable to Child's Consent in Relation to Information Society Services, Art. 8(1)
Do the policies clearly indicate whether or not the vendor provides notice to parents or guardians of the methods to provide verifiable parental consent under COPPA?
- Indicator
- Discloses the parental consent method(s) that are available for submission of consent by a parent or guardian.
- Citation
- Children's Online Privacy Protection Act: (An operator is required to provide direct notice to parents describing what information is collected, how information is used, its disclosure practices and exceptions) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.4(b)
- Children's Online Privacy Protection Act: (Existing methods to obtain verifiable parental consent include: (i) Providing a consent form to be signed by the parent and returned to the operator by postal mail, facsimile, or electronic scan; (ii) Requiring a parent, in connection with a monetary transaction, to use a credit card, debit card, or other online payment system that provides notification of each discrete transaction to the primary account holder; (iii) Having a parent call a toll-free telephone number staffed by trained personnel; (iv) Having a parent connect to trained personnel via video-conference; (v) Verifying a parent's identity by checking a form of government-issued identification against databases of such information, where the parent's identification is deleted by the operator from its records promptly after such verification is complete) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.5(b)(i)-(v)
- Children's Online Privacy Protection Act: (If an operator does not “disclose” children's personal information, they may use an email coupled with additional steps to provide assurances that the person providing the consent is the parent. Such additional steps include: Sending a confirmatory email to the parent following receipt of consent, or obtaining a postal address or telephone number from the parent and confirming the parent's consent by letter or telephone call. An operator that uses this method must provide notice that the parent can revoke any consent given in response to the earlier email.) See Children's Online Privacy Protection Act (COPPA), 16 C.F.R. Part 312.5(b)(vi)
- Background
- Under most circumstances an operator is required to obtain verified parental consent before the collection, use, or disclosure, of personal information from children under the age of 13. The method used to obtain parental consent must be reasonably calculated (taking into account available technology) to ensure that the person providing consent is actually the child's parent.