Privacy Evaluation for Minecraft
Minecraft is a game that lets users explore infinite worlds and build everything from the simplest of homes to the grandest of castles. The terms say that the product is intended to be used by children and with students in schools with the Education edition, all with parental consent. However, it is not clear from the terms whether an account is required for Minecraft, but the policy says that parents, schools, and organizations can have accounts that manage child or student accounts. It is also not clear from the terms whether there are any social interaction options. The terms say that Minecraft does collect personal information and may use that information for more than is specifically required for the product, but Minecraft's policy says it won't collect or use student personal data for anything other than authorized educational or school purposes without parental consent. The terms further state that they won't build a personal profile of students other than to support authorized educational or school purposes, or as authorized by a parent or guardian. However, non-student users are not provided these additional privacy protections.
Minecraft's terms say that they do share information with partners, affiliates, subsidiaries, vendors, agents, and others, and the terms detail what categories of information are shared with which categories of third parties. The terms further say that they impose limits on what third parties can do with shared information and Minecraft does not sell or rent personal data. In addition, Minecraft's terms say that they share personal information with third parties for advertising and marketing purposes, but they do not use student data for this purpose. According to the terms, they also do not use student personal data to target behavioral advertising, nor do they deliver personalized advertising to children under 18, but that they otherwise use behavioral information from across the internet to display ads on Microsoft properties and on third-party properties. The terms further say that third-party tracking technologies do collect information from users, including across the internet. Lastly, Minecraft's terms say that they use reasonable security standards to protect data, and that they use encryption when transmitting highly confidential data such as passwords and credit card numbers, but make no other mention of encryption or what they do in case of a data breach. The terms say that many of their services allow for uploading content and that users may access, modify, or request deletion of their personal information.
What data does it collect?
- Personally identifiable information (PII) is collected.
- The categories of collected personally identifiable information are indicated.
- Collection or use of data is limited to product requirements.
- Geolocation data are collected.
- Biometric or health data are collected.
- Interactions, behaviors, or usage analytics data are collected.
- Sensitive data are collected.
- Data is automatically collected.
- Opt-in consent is requested from users at the time personal information is collected.
- Personal information of users is collected by a third party.
What data does it share?
- Collected information is shared with third parties.
- The categories of information shared with third parties are indicated.
- The purpose for sharing a user's personal information with third parties is indicated.
- The categories of third parties that receive data are indicated.
- Data are shared for analytics.
- Data are not shared for research and/or product improvement.
- Third-party services are used to support the product.
- The roles of third-party service providers are indicated.
- Third-party login is supported.
- Contractual limits are placed on third-party data use.
How does it secure data?
- A user's identity is verified with additional personal information.
- Account creation is required.
- Managed accounts are available.
- Multi-factor account protection is available.
- Third-parties with access to information are required to provide the same security protections as the company.
- Reasonable security practices are used to protect data.
- Employee or physical access to user information is limited.
- All data in transit are encrypted.
- All data are stored in an encrypted format.
- Notice is provided in the event of a data breach.
What rights do I have to the data?
- Users can create or upload content.
- Users retain ownership of their data.
- Processes to access or review user data are available.
- Processes to modify data are available for authorized users.
- A data-retention policy is available.
- Processes for authorized users to delete data are available.
- A user's data are deleted upon account cancellation or termination.
- Data are deleted when no longer necessary.
- Methods are available to restrict who has access to data.
- Processes to download user data are available.
Is the data sold?
- Personal information is not sold or rented to third parties.
- Users can opt out from the disclosure or sale of their data to a third party.
- User information can be transferred to a third party in the event of a merge, acquisition, or bankruptcy.
- Unclear whether users are notified if their information is transferred to a third party.
- Unclear whether user information can be deleted prior to its transfer to a third party.
- Third-party transfer is contractually required to use the same privacy practices.
- User information that is shared is shared in an anonymous or de-identified format.
- Unclear whether the company describes their de-identification process of user information.
- Data are not shared for research and/or product improvement.
- Unclear whether contractual limits prohibit third parties from reidentifying or de-identified information.
How safe is this product?
- Users can interact with trusted users.
- Users can interact with untrusted users, including strangers and/or adults.
- Profile information must be shared for social interactions.
- Personal information can be displayed publicly.
- Users can control how their data are displayed to others.
- User-created content is not reviewed, screened, or monitored by the company.
- Unclear whether user-created content is filtered for personal information before being made publicly visible.
- Social interactions between users are moderated.
- Social interactions of users are logged.
- Users can report abuse or cyberbullying.
Ads & Tracking
Are there advertisements or tracking?
- Personal information is shared for third-party marketing.
- Traditional or contextual advertisements are displayed.
- Personalised advertising is displayed.
- Data are collected by third-parties for their own purposes.
- User's information is used to track and target advertisements on other third-party websites or services.
- Data profiles are created and used for personalised advertisements.
- The company can send marketing messages.
- The company does provide promotional sweepstakes, contests, or surveys.
- Users can opt out of contextual, or personalised advertising.
- Users can opt out or unsubscribe from marketing communications.
Can I provide parental consent?
- Intended for children under 13.
- Personal information from children under 13 years of age is collected.
- Unclear whether intended for parents or guardians.
- Company does have actual knowledge that personal information from users under 13 years of age is collected.
- The company does provide a section, heading, or separate policy for children in their policies.
- Parental consent is required before personal information is collected or disclosed.
- Unclear whether this product limits parental consent with respect to third parties.
- Parents can withdraw consent for the further collection of their child's information.
- Unclear whether this product deletes children's personal information if collected without parental consent.
- Parental consent notice and method for submission are provided.
Is the product intended for school?
- Unclear whether intended for students.
- Unclear whether personal information or education records are collected from preK-12 students.
- Unclear whether intended for teachers.
- Product is primarily used by, designed for, and marketed toward students in grades preK–12.
- Processes to enter education records into the product are described.
- Additional rights or protections may be provided with an additional school contract.
- Unclear whether the company is designated as a school official.
- Parental consent obligations are transferred to the school or district.
Can I control the use of my data?
- Users can control the use of their information through privacy settings.
- Use of information is limited to the purpose for which it was collected.
- The context or purpose for which data are collected is indicated.
- Company may combine data with additional data from third-party sources.
- Combined information is treated as personally identifiable information (PII).
- Notice is provided if the context in which data are collected changes.
- Consent is obtained if the practices in which data are collected change.
- A grievance or remedy mechanism is available for users to file a complaint.
- Users can request to know what personal information has been shared with third parties.
- Notice is provided in the event the company receives a government or legal request for a user's information.
Common Sense Standard Privacy Report (SPR)
The standard privacy report (SPR) displays all the privacy practices from a product's policies in a single, easy-to-read outline. The report shows a green check mark for better privacy practices and an orange alert for risky or unclear practices. This alert indicates that more time should be focused on these particular details prior to use.
About Privacy Evaluations
The privacy evaluations have been designed with the help and support of a consortium of schools and districts across the United States. These evaluations are designed to help educators make informed decisions about the potential privacy implications of educational technology used to support teaching and learning.
Our core evaluation criteria will always be freely available. People are encouraged to read the questions we use and our information security primer. Vendors are encouraged to use our questions and the information security primer to self-evaluate. You can also learn more about our evaluation process. Please be in touch with any questions or feedback.