Thumbnail
Algebra on Nudge
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
Thumbnail
Algodoo
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site does not use encryption.
  • Site does not force the use of encryption.
See full evaluation
Thumbnail
Alien Assignment
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
Thumbnail
Amazon Kindle
The criteria for "Use with Caution" are narrowly focused around data uses related to creating profiles that aren't related to any educational purpose, and using data to target ads. We include both first party (ie, the vendor that builds the service) and third party (any company given access by the vendor) data use. It's worth highlighting that using data to profile students violates multiple state laws, and in some cases also violates federal law.

A service can be designated "Use with Caution" for either a lack of transparency around data use -- which creates the potential for profiling and behavioral targeting -- or for clearly stating that they use data to target advertisements and/or create profiles. As with any application being considered for use within schools, school and/or district staff should review the privacy policies and terms of service to ensure that they meet the legal and practical requirements of their state laws and school policies.

As with the "Not Recommended" criteria, a "Use with Caution" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies,  we do not have adequate guarantees that data will not be used by first or third parties to create non-educational profiles or to target behavioral ads.
Use with Caution
Full evaluation
  • Privacy polices do indicate a version or effective date.
  • Data are not sold or rented to third parties.
  • Data are shared for advertising or marketing.
  • Behavioral or contextual advertising is displayed.
  • Data are collected by third-party advertising or tracking services.
  • Data are used to track and target advertisements on other third-party websites or services.
  • Third parties cannot use data to create ad profiles, data enhancement, and/or targeted advertisements.
See full evaluation
Thumbnail
America in Class
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site does not use encryption.
  • Site does not force the use of encryption.
See full evaluation
Thumbnail
American Panorama
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site does not force the use of encryption.
See full evaluation
Thumbnail
American Revolution Interactive Timeline for...
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
Thumbnail
American Social History Project
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
Thumbnail
Analemma
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
Thumbnail
AndroVid - Video Editor
The criteria for "Not Recommended For Use" measure whether or not a vendor has done the bare minimum to allow people to have even a rudimentary understanding about how the vendor protects user privacy. The four criteria here are all basics of sound privacy and security practice. Vendors who do not meet these basic requirements can potentially run afoul of state and federal privacy laws.

As with the "Use with Caution" criteria, a "Not Recommended" designation is NOT a sign that a vendor is necessarily doing anything unethical or illegal. It is a sign that, based on publicly available policies and observable security practices, their systems do not provide adequate guarantees that information stored in their systems will be protected.
Not Recommended
  • Privacy policies are not available.
  • Site uses encryption.
  • Site forces the use of encryption.
See full evaluation
About Privacy Evaluations

The privacy evaluations have been designed with the help and support of a consortium of schools and districts across the United States. These evaluations are designed to streamline making an informed decision about the potential privacy implications of educational technology used to support teaching and learning.

Our core evaluation criteria are freely available and will remain freely available. People are encouraged to read the questions we use and the information security primer we released. Vendors are encouraged to use our questions and the information security primer to self-evaluate. You can also learn more about our evaluation process.

Please be in touch with any questions or feedback.