Last Updated: April 4, 2021
We care deeply about your and your child’s privacy as such, we want you to feel both secure and safe as you or your child interacts with us. We take your privacy and all information that you share with us seriously. Your information will not be sold or shared with other third parties.
Contractor is subject to all FERPA laws and all school policies governing 34 CFR §99.33(a) related to the use and redisclosure of personally identifiable information from education records.
FERPA guarantees parents the right to access their child’s education records, including those maintained by providers on behalf of the school or district, upon request within 45 days. Parental access to their child’s education records should be seamless, with providers giving the requested records to the school or district, who can confirm the parents’ identity and provide them access to the records.
Utah law does not specifically apply to a third-party contractor if the third-party contractor obtains authorization from the following individual, in writing, to waive that provision as done by the parent via the Enrollment Packet in InfoCenter.
COPPA (Children Online Privacy Protection Act)
When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online. We do not specifically market to children under the age of 13 years old.
We get information about you and your child under the age of 13 in a range of ways.
Information You Give Us. We collect parent name, postal address, email address, phone number, fax number, username, password, demographic information (such as your gender and occupation) as well as other information you directly give us on our Site. For the purpose of providing an educational experience, we also collect each student’s first name and last name and the corresponding course of enrollment. Once within the course, students have the option of changing their profile picture and adding an email, but neither are required. Students are also invited to provide a brief introduction about themselves in a forum only accessible to those participating in the course, but are specifically asked NOT to provide any personally identifiable information. If such information is shared in the forum, it is deleted immediately. We do not share student information with any other party without explicit parental approval. If needed, we use the credit card authorization process required to purchase a course as the parental approval and verifiable parental consent of information. We only retain personal information collected online from a child for only as long as is necessary to fulfill the purpose for which it was collected and we delete the information using reasonable measures to protect against its unauthorized access or use.
Information We Get From Others. We may get information about you from other sources. We may add this to information we get from this Site.
Information Automatically Collected. We automatically log information about you and your computer and your child’s progress in the course. For example, when visiting our Site, we log your computer operating system type, browser type, browser language, the website you visited before browsing to our Site, pages you viewed, how long you spent on a page, access times and information about your use of and actions on our Site.
Cookies. We may log information using “cookies.” Cookies are small data files stored on your hard drive by a website. We may use both session Cookies (which expire once you close your web browser) and persistent Cookies (which stay on your computer until you delete them) to provide you with a more personal and interactive experience on our Site. This type of information is collected to make the Site more useful to you and to tailor the experience with us to meet your special interests and needs.
USE OF PERSONAL INFORMATION
We use your and your child’s personal information as follows:
SHARING OF PERSONAL INFORMATION
We may share personal information as follows:
DATA PRIVACY AND SECURITY
Here’s a diagram of how the secure file transfer service works:
Additionally, InfoCenter is hosted on AWS which is vigilant about privacy. AWS has a world-class team of security experts monitoring our systems 24×7 to protect data. With AWS, we are built on the most secure global infrastructure, knowing you always own your data. We have the ability to encrypt it, move it, and manage retention. All data flowing across the AWS global network that interconnects the data centers and regions is automatically encrypted at the physical layer before it leaves the secured AWS facilities. Additional encryption layers exist as well; for example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections. AWS provides tools to easily encrypt data in transit and at rest to help ensure that only authorized users can access it, using keys managed by our AWS Key Management System (KMS) or managing our own encryption keys with CloudHSM using FIPS 140-2 Level 3 validated HSMs. We also give the control and visibility needed to help demonstrate compliance with regional and local data privacy laws and regulations. The design of the AWS global infrastructure allows users to retain complete control over the regions in which your data is physically located, helping to meet data residency requirements.
AWS supports more security standards and compliance certifications than any other offering, including PCI-DSS, HIPAA/HITECH, FedRAMP, GDPR, FIPS 140-2, and NIST 800-171, helping satisfy compliance requirements for virtually every regulatory agency around the globe.
AWS security services and solutions are focused on delivering the following key strategic benefits critical to helping you implement your organization’s optimal security posture:
Fair Information Practices
The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.
INFORMATION CHOICES AND CHANGES
Our marketing emails tell you how to “opt-out.” If you opt out, we may still send you non-marketing emails. Non-marketing emails include emails about your accounts and our business or program dealings with you.
You may send requests about personal information to our Contact Information below. You can request to change contact choices, opt-out of our sharing with others, and update your personal information. These requests are also available for any information collected about your underage children.
You can typically remove and reject cookies from our Site with your browser settings. Many browsers are set to accept cookies until you change your settings. If you remove or reject our cookies, it could affect how our Site works for you.
Email: help <@> mytechhigh.com
California Online Privacy Protection Act
According to The California Online Privacy Protection Act (CalOPPA), we agree to the following: