Privacy Evaluation | Browse all
Thumbnail
Updated February 21, 2018

Animoto

  • Data are shared for advertising or marketing.
  • Behavioral or contextual advertising is displayed.
  • Data are collected by advertising or tracking services.
  • Data are used to track and target advertisements on other third-party websites or services.
  • Third parties can use data to create ad profiles, data enhancement, and/or targeted advertisements.
Use with Caution
The privacy evaluation process categorizes edtech tools into the following three tiers:
Use Responsibly
Indicates that the service meets the minimum criteria and more research should be completed prior to use.
Use with Caution
Indicates that the service does not clearly define the safeguards to protect student information.
42
Overall Evaluationinfo-bubble

This Overall Evaluation score represents how the service addressed all our evaluation questions. A higher score (up to 100) means the service provides more transparent and comprehensive policies.

Overview

Animoto provides users the ability to create videos with photos and video clips from their Camera Roll, preset video styles, and songs. Users can share their videos via messages, email, Twitter, and Facebook. The policies provide a list of inappropriate content and behaviors that are not permitted on the Service. In addition, the terms state interest-based advertisements are displayed to the user unless they provide opt-out consent; in which case generic or traditional advertisements are displayed. Animoto's terms state they will keep a user's personal information secure by using current industry standards. Lastly, the policies clearly state that the Service is only intended for users over the age of 13.

Animoto can be accessed through its website, and is available for download at the iOS App Store, and the Google Play Store. The Privacy Policy and Terms of Use accessed for this evaluation can be found on Animoto’s website, iOS App Store, and the Google Play Store. Additionally, other policies used for this evaluation include: Education Terms, Music Terms, and Upload Terms. This evaluation only considers policies that have been made publicly available prior to an individual using the application or service.

Key Points
Intended Use
  • Not intended for children under 13.
  • Intended for teens.
  • Intended for adults over 18.
  • Not intended for parents or guardians.
  • Intended for students.
  • Intended for teachers.
Data Collection
  • Personally Identifiable Information (PII) is collected.
  • The terms are unclear about whether or not this product collects geolocation data.
  • The terms are unclear about whether or not this product collects biometric or health data.
  • The terms are unclear about whether or not this product collects behavioral data.
  • Non-Personally Identifiable Information is collected.
Parental Consent
  • Parental consent is required.
  • The terms are unclear about whether or not this product limits parental consent with respect to third parties.
  • The terms are unclear about whether or not this product allows parents to withdraw consent for the further collection of their child's information.
  • The terms are unclear about whether or not this product deletes children's personal information if collected without parental consent.
  • The terms are unclear about whether or not this product provides parental consent notice and method for submission.
  • The terms are unclear about whether or not this product discloses COPPA parental consent exceptions.
  • The terms are unclear about whether or not this product discloses FERPA parental consent exceptions.
  • The terms are unclear about whether or not this product discloses Directory Information.
  • Parental consent obligations are transferred to the school or district.
SafetyPromoting responsible use
arrow
Evaluating safety takes into consideration best practices that protect a user's physical and emotional health. A higher score (up to 100) means the service provides more transparent and comprehensive responses related to safety.
16

The terms of Animoto state they provide publicly accessible blogs or community forums and users should be aware that any information they provide in these areas may be read, collected, and used by others who access them. The terms state the Service also provides a list of inappropriate content and behaviors that are not permitted on its website. However, Animoto's terms state they do not monitor or pre-screen submissions, but they retain the right to remove content for any reason. The terms state that Teachers are required -- when supervising students -- to ensure the students will not publicly display, distribute or otherwise share videos through social networking or other public web pages. The terms state users may notify Animoto of content that might not comply with the Terms of Service by filling out a feedback form.

PrivacyProtecting collected information
arrow
Evaluating privacy takes into consideration best practices that protect the disclosure of a user's personal information. A higher score (up to 100) means the service provides more transparent and comprehensive responses related to privacy.
42

The terms of Animoto state they display interest-based advertisements to a user on the Service unless they provide opt-out consent, in which case generic or traditional advertisements are still displayed. Animoto's terms state they partner with a third party-service provider to gather information about a user's activities on the service, and other websites, in order to present interest-based advertising to a user.

The terms do not contain a comprehensive list of third parties used to support the service, and do not detail any contractual restrictions placed on third parties who collect data. In addition, Animoto terms state they support social login, and can gather information about a user from social login third-party service providers and any user data can be sold as part of a merger or acquisition. Lastly, users will be notified via email if the policies undergo material changes.

SecurityProtecting against unauthorized access
arrow
Evaluating security takes into consideration best practices that protect the integrity and confidentiality of a user's data. A higher score (up to 100) means the service provides more transparent and comprehensive responses related to security.
55

Animoto's terms state they will keep a user's personal information secure by using current industry standards. In addition, Animoto terms state they store data on Amazon servers, and restrict access to personal information to only selected Animoto staff and contractors. However, the terms do not describe if information collected is encrypted while in transit or while at rest. Lastly, videos and other user generated content on the Service appear to be obscured via complex URLs.

ComplianceFollowing statutory laws and regulations
arrow
Evaluating compliance takes into consideration best practices of companies that collect personal information from children or students and the legal obligations for the privacy and security of that information. A higher score (up to 100) means the service provides more transparent and comprehensive responses related to compliance.
58

Animoto's policies state the Service is only intended for users over the age of 13. Animoto also provides Educator terms that require schools to be responsible for obtaining parental consent assuring that use of Animoto by students are in full compliance with all applicable privacy and educational laws, including the Children's Online Privacy Protection Act ("COPPA") and the Family Educational Rights and Privacy Act ("FERPA").

About Privacy Evaluations

The privacy evaluations have been designed with the help and support of a consortium of schools and districts across the United States. These evaluations are designed to streamline making an informed decision about the potential privacy implications of educational technology used to support teaching and learning.

Our core evaluation criteria are freely available and will remain freely available. People are encouraged to read the questions we use and the information security primer we released. Vendors are encouraged to use our questions and the information security primer to self-evaluate. You can also learn more about our evaluation process.

Please be in touch with any questions or feedback.