Learn more about the privacy and security practices of smart tech.
The Barnes and Noble Nook is a brand of Android e-reader developed by book retailer Barnes and Noble. Nook devices enable users to browse, buy, download, and read digital media from the Barnes and Noble Store.
Model: Nook GlowLight 3
Buy: Barnes and Noble
Best for just reading: By design, the Nook is only for reading books and not for use with any other apps, but parents and educators should use it with caution because of its integration with Facebook and Goodreads.
The following hands-on testing results are designed to identify potential security risks and harms that may affect the children, students, and families who use these devices.
Evaluating data collection takes into consideration best practices of responsible data collection, which limit the type and amount of personal information collected to only what's necessary to provide the application or service on the device.
Personal information is collected by the manufacturer.
Audio information is not collected through the device's microphone.
Visual information is not collected through the device's camera.
Location information is not collected by the manufacturer.
Evaluating data sharing takes into consideration best practices of keeping personal data inside the application or smart device to protect privacy. Connecting social media accounts could allow children or students to share personal information with other people and third-party companies. In addition, installing third-party apps with a smart device could allow personal information to be collected and used for a different purpose.
Social media accounts are available through third-party apps.
Voice assistant apps are not available.
Third-party apps cannot be installed through the App Store.
Evaluating device safety takes into consideration best practices of using privacy protections by default and limiting potential interactions with others. It's better to start with the maximum privacy that the app or device can provide and then give users the choice to change the settings. In addition, users talking to other people through the app or device might permit personal information to be shared with strangers.
Privacy-protection controls are available from the device manufacturer.
Social interactions are available through the manufacturer's pre-installed apps.
Evaluating account protection takes into consideration best practices of using strong passwords and providing accounts for children with parental controls. Strong passwords can prevent unwanted access to personal information. Children younger than 13 may not understand when they are sharing personal information, so they should be required to create special accounts that have more legal protection. Lastly, parents can help children younger than 13 use a device or app that has parental controls designed with digital well-being in mind.
Strong password is required to create an account.
Child age gate is not required to create a child account.
Parental controls are not available for child accounts.
Evaluating device security takes into consideration best practices of securing personal information against unwanted access when it is shared between the mobile device, smart tech, and the internet. Keeping personal information encrypted, or masked, protects information while it is being transmitted. In addition, advertising and tracking requests from the device or app could contain personal information about the user, including how someone is using the device or app.
Data was observed to be transmitted with encryption.
No known advertisement requests were observed.
Known tracking requests were observed.
Evaluating software updates takes into consideration best practices of keeping a smart device secure with up-to-date software patches and settings. When a company improves its app or device, better privacy and security should be part of the package and should be automatically updated or easy to update.
Software updates were automatically installed.
Software updates were not observed to be transmitted with encryption.
Note: Our security testing results are simply a snapshot of behavior we observed from a smart device on a specific date and time in our particular network environment. These results could be different based on other testing configurations or real-world use. For more information about how we test privacy and security, read our security testing guide and privacy ratings. Also, under the California Consumer Privacy Act, state residents have the right to protect personal information by making a "do not sell" request.