Learn more about privacy and security practices of smart tech.
The Apple iPad is a line of tablet computers designed, developed, and marketed by Apple, which run the iOS and iPadOS mobile operating systems.
Model: Apple iPad (10.2-inch, Wi-Fi, 32GB)
Best for privacy: The Apple iPad offers easy integration with Apple apps and other popular apps on the iOS App Store, but it is the most expensive tablet device we tested.
Read the full privacy evaluation.
The following hands-on testing results are designed to identify potential security risks and harms that may affect the children, students, and families who use these devices.
Evaluating data collection takes into consideration best practices of responsible data collection, which limit the type and amount of personal information collected to only what's necessary to provide the application or service on the device.
Personal information is collected by the manufacturer.
Audio information is collected through the device's microphone.
Visual information is collected through the device's camera.
Location information is collected by the manufacturer.
Evaluating data sharing takes into consideration best practices of keeping personal data inside the application or smart device to protect privacy. Connecting social media accounts could allow children or students to share personal information with other people and third-party companies. In addition, installing third-party apps with a smart device could allow personal information to be collected and used for a different purpose.
Social media accounts are available through third-party apps.
Voice assistant apps are available.
Third-party apps can be installed through the iOS App Store.
Evaluating device safety takes into consideration best practices of using privacy protections by default and limiting potential interactions with others. It's better to start with the maximum privacy that the app or device can provide, then give users the option to change the settings. In addition, talking to other people through the app or device might permit personal information to be shared with strangers.
Privacy-protection controls are available from the device manufacturer.
Social interactions are available through the manufacturer's pre-installed apps and third-party apps.
Evaluating account protection takes into consideration best practices of using strong passwords and providing accounts for children with parental controls. Strong passwords can prevent unwanted access to personal information. Children younger than 13 may not understand when they are sharing personal information, so they should be required to create special accounts that have more legal protection. Lastly, parents can help children younger than 13 use a device or app that has parental controls designed with digital well-being in mind.
Strong password is required to create an account.
Child age gate is required to create a child account.
Parental controls are available for child accounts.
Evaluating device security takes into consideration best practices of securing personal information against unwanted access when it is shared between the mobile device, smart tech, and the internet. Keeping personal information encrypted, or masked, protects information while it is being transmitted. In addition, advertising and tracking requests from the device or app could contain personal information, including how someone is using the device or app.
Data was observed to be transmitted with encryption.
No known advertisement requests were observed.
No known tracking requests were observed.
Evaluating software updates takes into consideration best practices of keeping a smart device secure with up-to-date software patches and settings. When a company improves its app or device, better privacy and security should be part of the package and should be automatically updated or easy to update.
Software updates were automatically installed.
Software updates were observed to be transmitted with encryption.
Note: Our security testing results are simply a snapshot of behavior we observed from a smart device on a specific date and time in our particular network environment. These results could be different based on other testing configurations or real-world use. For more information about how we test privacy and security, read our security testing guide and privacy ratings. Also, under the California Consumer Privacy Act, state residents have the right to protect personal information by making a "do not sell" request.*/ /*-->*/ /*-->*/