Our evaluation process for applications and services attempts to address some of the common barriers to effectively evaluating privacy practices. Privacy concerns and needs vary widely based on the type of application or service and the context in which each is used. For example, it makes sense for a student assessment system to collect a home address or other personal information. However, it would not make sense for an online calculator to collect that same student’s home address or other types of personal information.
Our evaluation process pairs both a transparency evaluation with a qualitative evaluation, which provides the ability to track both which practices a policy discloses and the strengths and weaknesses of how a policy discloses that information in different contexts. Lastly, our evaluation process includes reviewer‐written summaries that highlight the implications of the application or service’s privacy practices alongside the goals and contexts within which the service may be used. These summaries aid in the interpretation of our aggregate details as well as identify any shortcomings in our evaluation process relative to an individual product.
The privacy evaluation process contains four steps:
Overview: Select a product and evaluate the details of the various policies of the application or service.
Triage: Answer brief observational questions not related to the policy text itself but rather relating to a superficial assessment of the vendor's privacy and security practices.
Evaluation: Answer questions about whether or not the text of the policies disclose particular issues. Questions are composed of the following details:
a. Transparency selection: Do the policies address the issue(s) raised in the question?
b. Qualitative selection: Do the policies indicate whether or not the vendor engages in the practice described?
c. Notes: Is there anything noteworthy, exceptional, or egregious regarding the details of the question that should be noted?
d. Policy references: Can text within the policies be highlighted and associated with the particular question selected?
Summary: Create a general summary of the application or service and describe the relevant policy details.
In addition to engaging in this evaluation process, our team also published a basic Information Security Primer. While we do not run all these additional security-related tests as part of every evaluation, it's a useful resource, and we have used this primer to support multiple products addressing security issues.
Basic and Full Evaluations
There are two types of privacy evaluations: Basic evaluations and full evaluations. Both type of evaluations have the same rating icons and use the same Privacy Ratings. Basic evaluations are a 34-point inspection of the most important privacy and security basic evaluation questions about a product. Full evaluations are a 156-point inspection of all the comprehensive privacy and security full evaluation questions about a product. Basic evaluations answer the most critical privacy and security questions about a product to determine an overall score, concern scores, and which rating they belong to in order to allow parents, teachers, schools, and districts to make an informed decision about whether to use the product. Basic evaluations do not answer all the questions of a full 156-point inspection evaluation of a product, but still display an overall score and concern scores based on answers to the basic evaluation questions. Basic evaluations can still be easily compared to basic or full evaluations because they share the same Evaluation Scores, Evaluation Concerns, Privacy Ratings, and a subset of the Standard Privacy Report.
The privacy evaluation process includes questions organized into categories and sections derived from the Fair Information Practice Principles that underlie international privacy laws and regulations. In addition, the full evaluation questions and the categories that organize them are all mapped to a range of statutory, regulatory, and technical resources that provide background information on why each question is relevant to the privacy evaluation process. For example, the following evaluation question requires a reviewer to read the policies of the application or service and determine whether or not they disclose the issue raised in the question by providing a yes or no response:
Question: Do the policies clearly indicate whether or not the vendor collects personally identifiable information (PII)?
If the reviewer responds yes to this question, that means the application or service discloses whether or not it collects personally identifiable information. Given a yes transparent response to this question, the reviewer is then asked a follow-up question of whether or not the application or service discloses they engage in the particular practice described. A yes or no response that personally identifiable information is, or is not, collected will determine the final question points based on whether the practices described are considered qualitatively better or worse for the purposes of our evaluation process. Note that some questions do not have a qualitative component and are purely informational. This includes both questions where there is truly no qualitative value to a response and those questions where determining if a given response is qualitatively better or worse requires additional context outside the scope of the evaluation process.