Schools

Safe for Schools

FERPA and COPPA compliant language learning

Zero data collection. Fully offline. Perfect for classroom use.

Compliance Status: FULLY COMPLIANT

NidoVoix employs a privacy-by-design approach with zero external data transmission, comprehensive encryption, and robust parental controls.

COPPA Compliant FERPA Compliant Zero PII Collection Local-Only Storage

Key Compliance Features

  • Zero PII Collection — No personally identifiable information collected
  • Local-Only Storage — All data stays on device, never transmitted
  • Encrypted Storage — AES-256 encryption for preferences and consent
  • Parental Consent — Verifiable consent system with age verification
  • Privacy Policy — Comprehensive 3,500+ word policy in-app
  • Data Processing Agreement — DPA available for schools
  • Backup Exclusion — Student content excluded from cloud backups

What We DON’T Collect

No Personal Info

No names, emails, student IDs, demographics, or device identifiers

No Tracking

No analytics, telemetry, behavioral tracking, or advertising

No Third Parties

No external APIs, cloud services, data sharing, or subprocessors

No Network

Works fully offline with zero internet connection required

Benefits for Educators

  • Fully Offline — No internet required, works anywhere
  • No Accounts — No student logins or registrations
  • Device-Controlled — All data stays on school-owned devices
  • No Vendor Access — We never see or access student content
  • Easy Deployment — Install on any iPad, complete consent, start learning
  • 18 Languages — Support ESL, heritage languages, and world language curricula

Security Architecture

NidoVoix implements multi-layer protection:

Layer Protection
App Sandboxing iOS-enforced isolation, no cross-app data access
Platform Encryption iOS Keychain with AES-256-GCM encryption
Backup Exclusion Student content excluded from iCloud/iTunes
Device Security Protected by device passcode and secure enclave
Network Isolation Zero external API calls, fully offline capable

Deployment Guidance

Pre-Deployment

  1. Legal/IT review of privacy policy
  2. Review Data Processing Agreement (if required by district)
  3. Execute DPA if required by district policy
  4. Configure device management (MDM) if applicable

Deployment

  1. Install app on school-owned iPads via VPP
  2. Admin completes parental consent on each device
  3. Configure language packs for curriculum
  4. Document deployment in IT records

VPP/MDM Compatible: Available through Apple Volume Purchase Program for institutional deployment. Compatible with all major MDM solutions.

FERPA Classification

  • App creates “education records” (student work)
  • Records stored locally, not disclosed to vendor
  • School maintains full control via device ownership
  • No “school official” designation needed (no vendor access)

Data Processing Agreement

Schools requiring a formal DPA or compliance documentation can request one at any time. Our DPA includes:

  • Definition of “education records”
  • Data handling specifications
  • Security requirements
  • Breach notification procedures
  • Liability and indemnification
  • Termination and data deletion

Institutional Inquiries

For questions about compliance, Data Processing Agreements, or volume licensing:

Email: [email protected]

DPA Requests: Response within 10 business days

Privacy Questions: Response within 5 business days

Common Questions

Do we need a DPA to use this app?

It depends on your district policy. Since the app is local-only with no vendor access, some districts may not require a DPA. We provide one if needed.

How do we classify this under FERPA?

The app creates “education records” (student work), but those records stay on school-owned devices. No “disclosure” to a third party occurs.

Can students access this from home?

If installed on personal devices, parents should provide consent. For school devices taken home, existing school policies apply.

What if our state has additional student privacy laws?

Our zero-transmission, local-only approach generally exceeds state requirements. Contact us for specific state compliance questions.

How do we handle data breaches?

Since data never leaves the device, traditional “data breach” (external compromise) cannot occur. Device loss/theft is handled per your existing device security policies.