Evaluating Apps, Step by Step

Bill F.

When evaluating apps, a good triage helps set the stage.

July 20, 2016

In the interest of documenting our evaluation workflow, we worked up the following outline and flowchart that illustrates our initial intake process when evaluating applications. While there will always be slight variations due to how individual applications work, the steps outlined here provide the foundation we use in our evaluation process. Because these resources are freely available, anyone interested in privacy and basic information security -- from vendors to school and district staff, students, parents, and other privacy advocates -- can use this work.

The following steps document our full evaluation process:

  1. Triage (steps A, B, and C) outlined below;
  2. The questions, with citations and background, we use to evaluate the terms;
  3. An introductory Information Security Primer.

For people interested in the background documentation we used when compiling and vetting the final version of the question set, this post provides a list of works consulted.

App Triage

The steps described in the text version below are more comprehensive than what is depicted in the flowchart because every application is slightly different, and the resulting triage process is adjusted slightly as a result. You can download a full version of the flowchart here (PNG download).

Step A: Verify that the terms are present.

Step A

Step B: Create an account.

Creating an account