Search Results

Search Phrase = academy


Main Site Search Results (13)

Bible Search Results (0)


Main Site Search Results

1: Privacy Policy


Privacy Policy


 

Anomaly Studios, LLC Privacy Policy

Effective date: March 14, 2018, updated June 15th 2019

Anomaly Studios, LLC, also doing business as Anomaly Learning and the Coding academy ("company", "us", "we", or "our") operates the  https://anomalystudios.com, https://learn.anomalystudios.com, https://classes.anomalystudios.com  UnityXD, Coding academy websites and apps (the "Service").

 

This page informs you of our policies regarding the collection, use, and disclosure of personal data when you use our Service and the choices you have associated with that data.

We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from https://www.anomalystudios.com/terms-of-use-and-conditions

 

As stated in our Terms of Use, our website and Services are offered and available only to you, if you are (a) that You have not been previously suspended or removed from the Website by Anomaly Learning; (b) that You are either (i) at least 13 years of age or (ii) Your parent and/or guardian has consented to Your use of the Website; and (c) that your registration and your use of the Website is in compliance with any and all applicable laws and regulations.

We are obligated to ask for your explicit consent and give explicit terms of what users are giving consent to.

Definitions

Personal Data

Personal Data or Personally Identifiable Information means data about a living individual who can be identified from those data (or from those and other information either in our possession or likely to come into our possession).

Processing

"processing" generally covers actions that can be performed in connection with data such as collection, use, storage and disclosure.

Usage Data

Usage Data is data collected automatically either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit).

Cookies

Cookies are small pieces of data stored on a User's device. Our website uses cookies to distinguish you from other users of our website. This helps us to provide you with a good experience when you browse our website and also allows us to improve our site. For example, by ensuring that users are finding what they are looking for easily.

 

Data Controller

Data Controller means the natural or legal  person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed.

 

For the purpose of this Privacy Policy, we are a Data Controller of your data.

Data Processor (or Service Providers)

Data Processor (or Service Provider) means any natural or legal person (other than an employee of the Data Controller) who processes the data on behalf of the Data Controller.

We may use the services of various Service Providers in order to process your data more effectively.

Data Subject (or User)

Data Subject is any living individual who is using our Service and is the subject of Personal Data.

User

The User is the individual using our Service. The User corresponds to the Data Subject, who is the subject of Personal Data.

 

Information Collection And Use

We collect several different types of information for various purposes to provide and improve our Service to you.

Our collection, use, and disclosure of Student Data are governed by our Privacy Policy and Terms of Use and also by the provision of the Family Educational Rights and Privacy Act (FERPA), the Children's Online Privacy Protection Act (COPPA), General Data Protection Regulation (GDPR), and applicable state laws that relate to the collection of Student Data.

Our cookies do not collect Personal Information or Children's Personal Information, and we do not combine the general information collected through these cookies with other Personal Information or Children's Personal Information to tell us who you are or what your user name or email address is.

If you come to our business through a sales affiliate, cookies are used to associate your account and information with the sales affiliate in order to calculate sales commissions.

Types of Data Collected

Personal Data

While using our Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you ("Personal Data"). We only ask for Personally Identifiable Information where it is reasonably necessary to provide the Services. Personally identifiable information may include, but is not limited to:

●      Email address

●      First name and last name

●      Phone number

●      Address, State, Province, ZIP/Postal code, City

●      Credit Card Payment Information

●      Your Birthdate and Place of Birth

●      Workplace of School

●      A Photo

●      IP Address

●      Metadata

●      Education Records

●      Cookies and Usage Data

●      Posts on Social Media and more

 

We may use your Personal Data to contact you with newsletters, marketing or promotional materials and other information that may be of interest to you. You may opt out of receiving any, or all, of these communications from us by following the unsubscribe link or instructions provided in any email we send or by contacting us.

Usage Data

We may also collect information how the Service is accessed and used ("Usage Data"). This Usage Data may include information such as your computer's Internet Protocol address (e.g. IP address), browser type, browser version, the pages of our Service that you visit, the time and date of your visit, the time spent on those pages, unique device identifiers and other diagnostic data.

Location Data

We may use and store information about your location if you give us permission to do so ("Location Data"). We use this data to provide features of our Service, to improve and customize our Service.

 

You can enable or disable location services when you use our Service at any time, through your device settings.

Tracking & Cookies Data

We use cookies and similar tracking technologies to track the activity on our Service and hold certain information.We may gather anonymous information about Users through cookie technology on an individual and aggregate level.

 

Cookies are files with small amount of data which may include an anonymous unique identifier. Cookies are sent to your browser from a website and stored on your device. Tracking technologies also used are beacons, tags, and scripts to collect and track information and to improve and analyze our Service.

 

Examples of Cookies we use:

●      Session Cookies. We use Session Cookies to operate our Service.  which expire after a short time or when you close your browser, and persistent cookies, which remain stored in your browser for a set period of time. We use session cookies to identify you during a single browsing session, like when you log in

●      Preference Cookies. We use Preference Cookies to remember your preferences and various settings.

●      Security Cookies. We use Security Cookies for security purposes.

●      Advertising Cookies. Advertising Cookies are used to serve you with advertisements that may be relevant to you and your interests.

●      Analytics Cookies. enable us to monitor and analyze web traffic and can be used to keep track of user behavior.

●      Social Media Cookies. We use Social Media Cookies for various Social Media platforms like Facebook, Twitter, Youtube, Linkedin, and Instagram to allow interactions with their services.

●      Email marketing. We collect name and email address when you register for a webinar or event, request a free resource or join a waiting list, via Infusionsoft

 

Non-Personal Information
Web Beacons, also known as pixel tags and clear GIFs, ("Web Beacons"), are electronic images that allow a website to access cookies and help track marketing campaigns and general usage patterns of visitors to those websites. Web Beacons can recognize certain types of information, such as cookie numbers, time and date of a page view, and a description of the page where the Web Beacons are placed. No Personally Identifiable Information about you is shared with third parties through the use of Web Beacons on our website. However, through Web Beacons, we may collect general information that will not personally identify you, such as: Internet browser, operating system, date of visit, time of visit and path taken through the website.

When we collect usage information (such as the numbers and frequency of visitors to the Website), we only use this data in aggregate form, and not in a manner that would identify you personally.  For example, this aggregate data tells us how often users use parts of the Services, so that we can make the Services appealing to as many users as possible.  We may also provide this aggregate information to our partners; our partners may use such information to understand how often and in what ways people use our Services, so that they, too, can provide you with an optimal experience. We do not disclose aggregate information to a partner in a manner that would identify you personally.

 

We use tracking and cookies data for the following purposes:

●      Authentication and security. Cookies help authenticate your access to Anomaly Learning and prevent unauthorized parties from accessing your accounts.

●      Preferences. Cookies help us remember your settings on the pages you visit, so that we can display your preferred content the next time you visit, or preferred language or the country you're in, so we can provide content in your preferred language without asking each time you visit.

●      Analytics and research. Cookies help us test different versions of Anomaly Learning to see which features or content users prefer, web beacons help us determine which email messages are opened, and cookies help us see how you interact with Anomaly Learning, like the links you click on. We also work with a number of analytics partners, including Google Analytics, who use cookies and similar technologies to help us analyze how users use the Services.

●      Personalized content. Cookies help us provide more relevant content.

●      Advertising. To provide you with more relevant advertising. Note that advertising and targeting only happens through our marketing web pages. No marketing or advertising occurs within our platforms when you are logged into your account. We do this so that only advertising appears to parents and not to children. It is our practice and policy to never display advertising to children. 

●      Improve Services. Cookies help us analyze user's experience with our services so that we may improve.

 

 

Information We Collect Automatically

Some information is collected automatically by servers and the services that run the Internet. Additional Metadata is collected for data logs and for security to ensure our platform is a safe place for all. Automatic information collection is described below.

●      Device Information: including your IP address, browser types, browser language, operating system, platform type, gaming platform, device types, and device IDs such as unique identifiers, advertising identifiers, or gaming platform identifiers.

●      Usage Information: including files you download, domain names, landing pages, your browsing activity, what you click, scrolling and keystroke activity, pages viewed, advertising viewed or visited, forms or fields you complete or partially complete, search terms, whether you open an email and your interaction with the content, access times, and error logs, and other similar information.

●      Location Information: including the city, state and ZIP code associated with your IP address, information derived through WiFi triangulation, and precise location information from GPS-based functionality on your mobile devices or from your use of our Mobile Apps, and with your consent, your precise GPS information. (If you are using one of our native apps, and only if you explicitly turned GPS service on within the app, the precise location information from GPS-based functionality will be shared on from your mobile devices or from your use of our Mobile Apps. Your explicit consent is required within our apps for, your precise GPS information to be shared to our systems.)

●      Viewing Behavior: including the content you view, how long you watch each video, the quality of the service you receive (e.g. buffering, load times).

●      Offline Information.  Certain information may also be stored while you are offline and transmitted to us when you next connect to the Internet, regardless of where you connect from or the device you use to connect.

 

 

Google Analytics

We use a tool called "Google Analytics" to collect information about the users of our services. Google Analytics collects information such as how often users visit our website site, what pages they visit when they do so, and what other sites they used prior to coming to our website. We use the information we get from Google Analytics to analyze performance so we can improve our services, including to help customize our website for users.

How to provide or withdraw consent to the installation of Cookies

Most browsers are initially set up to accept cookies, but you can reset your browser to refuse all cookies or to indicate when a cookie is being sent. However, some features and services (particularly those that require you to sign-in) may not function properly if your cookies are disabled. You may also set your email options to prevent the automatic downloading of images that may contain technologies that would allow us to know whether you have accessed our email and perform certain functions with it.

 

Through browser preferences, it is also possible to delete Cookies installed in the past, including the Cookies that may have saved the initial consent for the installation of Cookies by our website.

Users can, for example, find information about how to manage Cookies in the most commonly used browsers at the following addresses: Google Chrome, Mozilla Firefox, Apple Safari and Microsoft Internet Explorer.

 

With regard to Cookies installed by third parties, Users can manage their preferences and withdrawal of their consent by clicking the related opt-out link (if provided), by using the means provided in the third party's privacy policy, or by contacting the third party.

 

Notwithstanding the above, the Owner informs that Users may follow the instructions provided on the subsequently linked initiatives by the EDAA (EU), the Network Advertising Initiative (US) and the Digital Advertising Alliance (US), DAAC (Canada), DDAI (Japan) or other similar services. Such initiatives allow Users to select their tracking preferences for most of the advertising tools.

Use of Data

Anomaly Studios, LLC uses the collected data for various purposes:

●      To provide and maintain our Service

●      To notify you about changes to our Service

●      To allow you to participate in interactive features of our Service when you choose to do so

●      To provide customer support

●      To gather analysis or valuable information so that we can improve our Service

●      To monitor the usage of our Service

●      To detect, prevent and address technical issues

●      To provide you with news, special offers and general information about other goods, services and events which we offer that are similar to those that you have already purchased or enquired about unless you have opted not to receive such information

●      To comply with applicable laws, regulations, court orders, government and law enforcement agencies' requests.

 

Legal Basis for Processing Personal Data under the General Data Protection Regulation (GDPR)

If you are from the European Economic Area (EEA), our legal basis for collecting and using the personal information described in this Privacy Policy depends on the Personal Data we collect and the specific context in which we collect it.
We may process your Personal Data because:
●       We need to perform a contract with you
●       You have given us permission to do so
●       The processing is in our legitimate interests and it is not overridden by your rights
●       For payment processing purposes
●       To comply with the law

Retention of Data

Anomaly Studios, LLC will retain your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy and that the data is required to offer our services. We will retain and use your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, perform our services, and enforce our legal agreements and policies.

 

Anomaly Studios, LLC will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of our Service, or we are legally obligated to retain this data for longer time periods.

 

You may exercise your right to request your personal information to be deleted by Anomaly Studios, LLC.

We will hold on to personal information only as long as is reasonably necessary for the purpose for which it was collected. We will securely dispose of it once you no longer have a legitimate reason for retaining it.l

 

Transfer Of Data

Your information, including Personal Data, may be transferred to - and maintained on - computers located outside of your state, province, country or other governmental jurisdiction where the data protection laws may differ than those from your jurisdiction.

If you are located outside the United States and choose to provide information to us, please note that we transfer the data, including Personal Data, to United States and process it there.

Your consent to this Privacy Policy followed by your submission of such information represents your agreement to that transfer.

 

Anomaly Studios, LLC will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information.

 

Transfer of personal information to countries outside the EU/EES

If you choose to use our Services from the European Union, please note the following information:

 

Anomaly Studios, LLC is based in the United States of America. Your personal information is therefore transferred outside the European Union ("EU") and European Economic Area ("EEA"). Such transfer is necessary for the performance of the contract between you Anomaly Studios, LLC

 

Your PII is also transferred to and processed by third party payment providers and your bank. Such transfers are necessary for performance of the contract between you and Anomaly Studios, LLC(article 49.1 (b) of the GDPR).

 

In order for us to provide the Services to you, your personal information will be transferred to, and stored at/processed in the United States. Your personal data may also be processed by staff operating outside the European Economic Area (EEA), such as in India and the Philippines, who work for us or for one of our suppliers. We will take all steps reasonably necessary to ensure that your personal data is treated securely and in accordance with this notice.

Your Data Protection Rights under the General Data Protection Regulation (GDPR)

If you are a resident of the European Economic Area (EEA), you have certain data protection rights. Anomaly Studios, LLC  aims to take reasonable steps to allow you to correct, amend, delete or limit the use of your Personal Data.

If you wish to be informed about what Personal Data we hold about you and if you want it to be removed from our systems, please contact us.

In certain circumstances, you have the following data protection rights:

●       The right to refuse to become a data subject
The right to be informed with anything that happens with your personal data and to know what it is used for

●       The right to refuse processing

●       Unless other contractual issues exist or if proprietary company rights exist (of which you should be informed of before you allow your data to be processed) then you can request a copy of your data.

●       The right to erasure

●       The right to access, update or delete the information we have on you. Whenever made possible, you can access, update or request deletion of your Personal Data directly within your account settings section. If you are unable to perform these actions yourself, please contact us to assist you.

●       The right of rectification. You have the right to have your information rectified if that information is inaccurate or incomplete.

●       The right to object. You have the right to object to our processing of your Personal Data.

●       The right of restriction. You have the right to request that we restrict the processing of your personal information.

●       The right to data portability. You have the right to be provided with a copy of the information we have on you in a structured, machine-readable and commonly used format.

●       The right to withdraw consent. You also have the right to withdraw your consent at any time where we relied on your consent to process your personal information.

Please note that we may ask you to verify your identity before responding to such requests.

You have the right to complain to a Data Protection Authority about our collection and use of your Personal Data. For more information, please contact your local data protection authority in the European Economic Area (EEA).

 

 

Disclosure Of Data

Who we Share your Data with

 

There are some kinds of information you should never provide without student permission including student names, numbers, citizenship, gender, ethnicity, religious and other preferences, grades, GPAs, and class schedules or any other identifiable information.

We may use data which has been de-identified and/or aggregated for product development, research, analytics and other purposes, including for the purpose of analyzing, improving, or marketing the Anomaly Studios, LLC Services. In certain occasions, Anomaly Studios, LLC may share this data with business partners to improve our services or offerings. If we disclose information to authorized business partners to conduct research on online education or assist in understanding the usage, viewing, and demographic patterns for certain programs, content, services, promotions, and/or functionality on our Service, such data will be aggregated and/or anonymized to reasonably avoid identification of a specific individual.

Business Transaction

If Anomaly Studios, LLC is involved in a merger, acquisition or asset sale, your Personal Data may be transferred. We will provide notice before your Personal Data is transferred and becomes subject to a different Privacy Policy.

Disclosure for Law Enforcement

Under certain circumstances, Anomaly Studios, LLC may be required to disclose your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency).

Legal Requirements

Anomaly Studios, LLC may disclose your Personal Data in the good faith belief that such action is necessary to:

●      To comply with a legal obligation

●      To protect and defend the rights or property of Anomaly Studios, LLC

●      To prevent or investigate possible wrongdoing in connection with the Service

●      To protect the personal safety of users of the Service or the public

●      To protect against legal liability

 

Security Of Data

The security of your data is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Data, we cannot guarantee its absolute security.

"Do Not Track" Signals under the California Online Protection Act (CalOPPA)

We do not support Do Not Track ("DNT"). Do Not Track is a preference you can set in your web browser to inform websites that you do not want to be tracked.

 

You can enable or disable Do Not Track by visiting the Preferences or Settings page of your web browser.

Your Rights

Anomaly Studios, LLC aims to take reasonable steps to allow you to correct, amend, delete, or limit the use of your Personal Data.

Whenever made possible, you can update your Personal Data directly within your account settings section. If you are unable to change your Personal Data, please contact us to make the required changes.

 

If you wish to be informed what Personal Data we hold about you and if you want it to be removed from our systems, please contact us.

Schools must annually notify parents of students and eligible students in attendance of their rights under FERPA.

 

In certain circumstances, you have the right:

●      To access and receive a copy of the Personal Data we hold about you

●      To rectify any Personal Data held about you that is inaccurate. If you believe that any PII we are holding is incorrect or incomplete please send an email with your specific request to support@anomalystudios.com

●      You have the right to request your personal information to not be processed

●      You have the right to give consent to disclosures

●      You have the right to file a complaint

●      To request the deletion of Personal Data held about you

 

You have the right to data portability for the information you provide to Anomaly Studios, LLC. You can request to obtain a copy of your Personal Data in a commonly used electronic format so that you can manage and move it.

 

Please note that we may ask you to verify your identity before responding to such requests.

Service Providers

We may employ third party companies and individuals to facilitate our Service ("Service Providers"), to provide the Service on our behalf, to perform Service-related services or to assist us in analyzing how our Service is used.

 

These third parties may have access to your Personal Data only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose. Not all providers below will have your data as this is a full representation of 3rd party providers for all our customers servicing a variety of contracts for platforms and services. Only data that is needed for the delivery of the Service is shared with providers to administer the Service.

 

Amazon Web Services

●      Hostgator and Endurance International Group: Their privacy policy can be viewed at: https://www.endurance.com/privacy/privacy

●      Google Apps for Business

●      Google Cloud/Firebase

●      Teachable

●      TeamworkPM

●      TeamworkDesk

●      Infusionsoft

●      Zapier

●      ScheduleOnce

●      OneSignal

●      Copper

●      ClickFunnels

●      ShareThis

●      Inspectlet

●      QuickBooks and QuickBooks Payments

●      Tawk.to Live Support: Their privacy policy can be viewed at: https://www.tawk.to/privacy-policy/

●      Cloudflare: Their privacy policy can be viewed at https://www.cloudflare.com/privacypolicy/

Analytics

We may use third-party Service Providers to monitor and analyze the use of our Service.

●      Google Analytics

●      Google Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualize and personalize the ads of its own advertising network.

●      You can opt-out of having made your activity on the Service available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js, and dc.js) from sharing information with Google Analytics about visits activity.

●      For more information on the privacy practices of Google, please visit the Google Privacy & Terms web page: http://www.google.com/intl/en/policies/privacy/

Advertising

We may use third-party Service Providers to show advertisements to you to help support and maintain our Service.

●      Google AdSense & DoubleClick Cookie

●      Google, as a third party vendor, uses cookies to serve ads on our Service. Google's use of the DoubleClick cookie enables it and its partners to serve ads to our users based on their visit to our Service or other websites on the Internet.

●      You may opt out of the use of the DoubleClick Cookie for interest-based advertising by visiting the Google Ads Settings web page: http://www.google.com/ads/preferences/

Behavioral Remarketing

Anomaly Studios, LLC uses remarketing services to advertise on third party websites to you after you visited our Service. We and our third-party vendors use cookies to inform, optimize and serve ads based on your past visits to our Service.

●      Google AdWords

●      Google AdWords remarketing service is provided by Google Inc.

●      You can opt-out of Google Analytics for Display Advertising and customize the Google Display Network ads by visiting the Google Ads Settings page: http://www.google.com/settings/ads

●      Google also recommends installing the Google Analytics Opt-out Browser Add-on - https://tools.google.com/dlpage/gaoptout - for your web browser. Google Analytics Opt-out Browser Add-on provides visitors with the ability to prevent their data from being collected and used by Google Analytics.

●      For more information on the privacy practices of Google, please visit the Google Privacy & Terms web page: http://www.google.com/intl/en/policies/privacy/

●      Twitter

●      Twitter remarketing service is provided by Twitter Inc.

●      You can opt-out from Twitter's interest-based ads by following their instructions: https://support.twitter.com/articles/20170405

●      You can learn more about the privacy practices and policies of Twitter by visiting their Privacy Policy page: https://twitter.com/privacy

●      Facebook and Instagram

●      Facebook remarketing service is provided by Facebook Inc.

●      You can learn more about interest-based advertising from Facebook by visiting this page: https://www.facebook.com/help/164968693837950

●      To opt-out from Facebook's interest-based ads follow these instructions from Facebook: https://www.facebook.com/help/568137493302217

●      Facebook adheres to the Self-Regulatory Principles for Online Behavioral Advertising established by the Digital Advertising Alliance. You can also opt-out from Facebook and other participating companies through the Digital Advertising Alliance in the USA http://www.aboutads.info/choices/, the Digital Advertising Alliance of Canada in Canada http://youradchoices.ca/ or the European Interactive Digital Advertising Alliance in Europe http://www.youronlinechoices.eu/, or opt-out using your mobile device settings.

●      For more information on the privacy practices of Facebook, please visit Facebook's Data Policy: https://www.facebook.com/privacy/explanation

●      Pinterest

●      Pinterest remarketing service is provided by Pinterest Inc.

●      You can opt-out from Pinterest's interest-based ads by enabling the "Do Not Track" functionality of your web browser or by following Pinterest instructions: http://help.pinterest.com/en/articles/personalization-and-data

●      You can learn more about the privacy practices and policies of Pinterest by visiting their Privacy Policy page: https://about.pinterest.com/en/privacy-policy

Payments

We may provide paid products and/or services within the Service. In that case, we use third-party services for payment processing (e.g. payment processors).

 

We will not store or collect your payment card details. That information is provided directly to our third-party payment processors whose use of your personal information is governed by their Privacy Policy. These payment processors adhere to the standards set by PCI-DSS as managed by the PCI Security Standards Council, which is a joint effort of brands like Visa, Mastercard, American Express and Discover. PCI-DSS requirements help ensure the secure handling of payment information.

 

The payment processors we work with are:

●      Apple Store In-App Payments

â—‹      Their Privacy Policy can be viewed at https://www.apple.com/legal/privacy/en-ww/

●      Google Play In-App Payments

â—‹      Their Privacy Policy can be viewed at https://www.google.com/policies/privacy/

●      Stripe

â—‹      Their Privacy Policy can be viewed at https://stripe.com/us/privacy

●      PayPal or Braintree

â—‹      Their Privacy Policy can be viewed at https://www.paypal.com/webapps/mpp/ua/privacy-full

●      Authorize.net

â—‹      Their Privacy Policy can be viewed at https://www.authorize.net/company/privacy/

●      Infusionsoft by Keap

â—‹      https://keap.com/legal/privacy-policy

â—‹      https://keap.com/legal/data-security

â—‹      https://keap.com/legal/data-protection-faq

●      WePay by Chase

â—‹      https://go.wepay.com/terms-of-service#us

â—‹      https://go.wepay.com/privacy-policy

 

Links To Other Sites

Our Service may contain links to other sites that are not operated by us. If you click on a third party link, you will be directed to that third party's site. We strongly advise you to review the Privacy Policy of every site you visit. We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Children's Privacy

We believe that protecting the privacy of all people is of paramount importance. Protecting the privacy of children is especially important. For that reason we will never collect or maintain information that is not necessary for the delivery of the Service. For account holders of student accounts we only collect a Pseudonym (nick name), username, and password to login to our services. This information is never shared or publicly displayed. Our Service does not address anyone under the age of 13 ("Children") as parents must create and maintain the account.

 

We do not knowingly collect personally identifiable information from anyone under the age of 13. If you are a parent or guardian and you are aware that your Children has provided us with Personal Data, please contact us. If we become aware that we have collected Personal Data from children without verification of parental consent, we take steps to remove that information from our servers.

We are proud supporters of the Student Privacy Pledge. Our collection and use of Student Records is governed by our contracts with the Schools, by our Privacy Policy, and by applicable privacy laws. For example, we work with Schools to help protect personal information from the Student's educational record, as required by the Family Educational Rights and Privacy Act ("FERPA"), and to protect the personal information of students under 13 consistent with the Children's Online Privacy Protection Act ("COPPA"). If you have any questions about reviewing, modifying, or deleting the personal information of a School User accessing the Service through a School partner agreement, please contact your School directly.

When our Service is  used by a School in an educational setting, we may rely on the School to provide the requisite consent from the child's parents for Anomaly Studios, LLC to collect information from a School User under the age of 13. Look at our Terms of service to see more details on consent for children to use our services

Teachers can create accounts on behalf of Students. When registering an account for a Student who is under the age of 13 (a "Child"), the Teacher represents and warrants that they or the educational organization they work for has proper permission to register the Child to use our services.

Information Your Child Can Share

By registering and creating an account for your child, your child will not be able to share information, including photos, videos, audio, and location, publicly and with others. If your child shares information publicly, it would have to be outside of our system and it is strongly advised to not do so as it may be indexable by search engines like Google Search. We are not responsible for the content uploaded by any user.

 

Anomaly Studios, LLC will not serve personalized ads to your child, which means ads will not be based on information from your child's account. Instead, ads may be served to a parent or teacher if they have visited our website for marketing purposes. Your child will never be served  ads served by other (non-Google) ad providers, including ads personalized by third parties because we never advertise to children.

 

 

Changes To This Privacy Policy

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

 

We will let you know via email and/or a prominent notice on our Service, prior to the change becoming effective and update the "effective date" at the top of this Privacy Policy.

 

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, please contact us:

●      By email: support@anomalystudios.com

●      By visiting this page on our website: http://www.anomalystudios.com/privacy-policy

●      By mail: Anomaly Studios, LLC. P.O. Box 682592. Franklin, TN 37064

 

 

 

 


Read More

2: Terms of Use and Conditions


Terms of Use and Conditions


 


Read More

3: Coding academy Landing Page


Keywords: coding, academy


This page redirects to the Coding academy


Coding academy Loading...


Read More

4: Coding Reference and Resources


Coding academy Resources


Processing Website


Read More

5: Coding academy Start


Coding academy Course Listing


academy-welcome">academy/CodingacademyProductImage.jpg" alt="Coding academy Product Image" width="300" height="300" />

Welcome to the Coding academy!

 

academy-welcome">Click here to get started.


Read More

6: About Us


About Us


academy/JoshandRuthPictureSquare.jpg" alt="Josh and Ruth" width="400" height="400" />

 

Hi, it's Josh and Ruth!

We are so glad you stopped by. We are educational practitioners and specialists and partner with educational institutions to help bring transformational learning experiences where they matter most. 

"We help teach students to be dreamers, thinkers and doers."

Firstly, we know that teaching is hard on multiple levels. 

Getting the "light bulb" to turn on and stay on for students is not easy.

When talking with teachers, this is the type of feedback we hear from them. We commonly hear the following three themes.

 
  • ​"Teaching currently is totally overwhelming and requires too much from teachers."
  • "We are expected to plan, report, provide and manage instruction, behavior, and classroom learning resources. "
  • "We are under-resourced and yet are expected to provide everything for every student in our classes."

Furthermore, there are other common challenges that make teaching and learning even more challenging. We have found these additional challenges fall into one or more of the following five categories. 

 
  • Stretched Budgets
  • Stretched Resources
  • ​Rigid Academic Standards
  • Tight Schedules
  • Challenging Students


Read More

7: Start your Character


003 - Continue Programming your Character



In this session we will be brainstorming your creative ideas for your character. Follow along and create your brainstorming sketches.

 

Get started with Processing by clicking here to load the editor

Check out the student example, academy-student-examples-project-a" target="_blank" rel="noopener">the Moody Ninja

Also, check out the student example, Josh's Water Bottle

 

 


Read More

8: Write your First Program


Write your First Program



 

 

Get started with Processing by clicking here to load the editor

 

Copy and paste the code below into Processing to load exactly like I show in the video above.

 

function setup() {
  createCanvas(400, 400);
}

function draw() {
  background(220);
  
  ellipse(200,200,100,100);
  
  
}

 

 

academy/002-write-your-first-program-code-snippet-capture-image.PNG" alt="Code Sample" width="1690" height="805" />


Get started with Processing by clicking here to load the editor

 

Check out the student example, academy-student-examples-project-a" target="_blank" rel="noopener">the Moody Ninja

Also, check out the student example, Josh's Water Bottle

 


Read More

9: Coding academy Welcome


Welcome to the Coding academy!


 


Unit 1 Table of Contents

  1. academy-welcome">Welcome
  2. Getting Started
  3. Write your First Program
  4. Refining Part 1
  5. Refining Part 2
  6. Start your Character
  7. Graphics Basics
  8. Create Digital Drawings
  9. Setup a Grid Part 1
  10. Add Color Values
  11. Create your Plan
  12. Programming Overview
  13. Character Dev Part 1
  14. Character Dev Part 2
  15. Character Dev Part 3
  16. Character Dev Part 4

 


Read More

10: Fully AI Generated Everything


Keywords: automation,content,creation,production,studio,digital,doubles,video,avatar,text,script,cloud-based,tools,slide,decks,PowerPoint,Canva,training,programs,staff,development,retention,coding,academy,method,four


Method Four of the Ultimate Content Creation Workflow enables creators to automate their entire video production process by leveraging cloud-based tools and digital technology. By mastering this method, content creators can clone their voice, generate video avatars, and produce high-quality training videos and presentations with minimal time and effort. The workflow allows you to transform a simple text script into a fully automated video production, complete with synchronized audio, visuals, and slide decks. Ultimately, this approach empowers busy professionals to scale their content creation without being constrained by traditional time-consuming production methods.


Description

Method Four of the Ultimate Content Creation Workflow enables creators to automate their entire video production process by leveraging cloud-based tools and digital technology. By mastering this method, content creators can clone their voice, generate video avatars, and produce high-quality training videos and presentations with minimal time and effort. The workflow allows you to transform a simple text script into a fully automated video production, complete with synchronized audio, visuals, and slide decks. Ultimately, this approach empowers busy professionals to scale their content creation without being constrained by traditional time-consuming production methods.


Outcomes

Here are the key things you will be able to do after you watch this demo:

  1. Clone your voice for digital content creation

  2. Generate automated video avatars

  3. Transform text scripts into complete video presentations

  4. Automate slide deck production in PowerPoint and Canva

  5. Scale content creation with minimal time investment

  6. Develop training materials efficiently

  7. Leverage cloud-based production tools

  8. Create digital doubles of yourself

  9. Streamline video production workflows

  10. Produce high-quality educational content without extensive technical skills


 

Summary

  • Ultimate Content Creation Workflow Overview 0:08

    • Josh Lomelino introduces method four, which automates the entire content creation process.

    • This method combines the first three methods but focuses on automation, making it more efficient.

    • Josh emphasizes the importance of mastering the first three methods before attempting method four.

    • The method allows for the creation of high-quality content with minimal time, effort, and budget.

  • Method Four's Impact on Production 1:09

    • Josh describes the transformative power of method four, which revolutionized his production process.

    • A potential customer expressed interest in using the method for staff development and retention.

    • Josh explains how he creates digital doubles of himself to automate the production process.

    • The method enables large-scale production without the time constraints typically associated with video creation.

  • Addressing Time Constraints in Content Creation 1:49

    • Josh shares experiences of customers who face time constraints in creating training programs and classes.

    • He highlights the challenges of maintaining a busy schedule while keeping up with production demands.

    • Method four allows for the cloning of voices and creation of audio tracks to generate video avatars.

    • The method significantly reduces the time required to produce multiple videos.

  • Automation Capabilities of Method Four 2:29

    • Josh explains that everything in the final video is fully automated, starting from a text script.

    • The process involves copying and pasting the script into cloud-based production tools.

    • High-end computers are not necessary as most of the heavy lifting is done in the cloud.

    • The method also automates the creation of slide decks in tools like PowerPoint or Canva.

  • Step-by-Step Process Walkthrough 2:48

    • Josh mentions that he will walk through each part of the process in the following sections.

    • The detailed steps will provide a comprehensive understanding of method four.

    • The process aims to make content creation more efficient and less time-consuming.

    • Josh emphasizes the importance of understanding each step to effectively implement the method.

 


Read More

11: Locking and Unlocking Content


Locking and Unlocking Content


Description

After completing this video, viewers will understand how to lock and unlock class content by adjusting login and payment requirements. They will learn how to make classes accessible only to logged-in users, and optionally require payment for access. The video demonstrates how to easily update these settings for any class using a straightforward interface. By the end, users will be able to control who can view or participate in class content based on their login and payment status.


Outcomes

Following are the key things you will be able to do after you watch this demo:

  • Configure class access settings
  • Require user login for content access
  • Set payment requirements for classes
  • Manage user permissions based on login and payment status
  • Update and apply access controls through the class interface

 


Summary

Summary

  • Locking and Unlocking Content Overview 0:10

    • Josh Lomelino explains the purpose of the demo, which is to demonstrate how to lock and unlock content.

    • He mentions that content can be hidden or made accessible only to logged-in users, with additional conditions like requiring payment.

    • The process involves managing access at the class level, where each class contains units, content items, and resources.

    • Josh emphasizes that the class itself needs to be modified to control access to its content.

  • Modifying Class Settings for Access Control 1:05

    • Josh demonstrates how to modify a class, using the example of the coding academy.

    • He sets "login required" to true to mandate that users must log in to access the class.

    • Josh explains the option to specify whether payment is required, either as a one-time payment or a recurring subscription.

    • He clarifies that if payment is not required, users can log in but do not need to pay, making the class free but still requiring a login.

  • Handling Payment and Access Permissions 1:57

    • Josh discusses the settings for blocking users without active payment.

    • If payment is not required, he sets this option to false to allow free access to logged-in users.

    • For paid classes, he sets this option to true to ensure that users must have an active payment to access the content.

    • He explains that the system checks if the payment is up to date, especially for recurring payments within the subscription period.

  • Finalizing and Applying Access Settings 2:31

    • Josh concludes by explaining that once the changes are applied and submitted, users will need to adhere to the new access settings.

    • He reiterates that these settings control whether a login is required and if payment is necessary.

    • The process allows for managing various access permutations through a simple user interface.

    • Josh emphasizes that these settings will be enforced when users attempt to access any content within the modified class.

 


 


Read More

12: Anomaly Apps academy Welcome


This welcome video guides your through a comprehensive, actionable UX design process that transforms innovative ideas into market-ready products. Viewers will learn how to uncover customer pain points, develop clear user personas, and rapidly iterate prototypes using Lean UX principles. The session demonstrates how to map out product strategies, conduct usability testing, and seamlessly prepare for product launch. Whether you’re a founder, designer, or product manager, this demo equips you with the tools to accelerate time-to-market and deliver a superior user experience.


Description

This welcome video guides your through a comprehensive, actionable UX design process that transforms innovative ideas into market-ready products. Viewers will learn how to uncover customer pain points, develop clear user personas, and rapidly iterate prototypes using Lean UX principles. The session demonstrates how to map out product strategies, conduct usability testing, and seamlessly prepare for product launch. Whether you’re a founder, designer, or product manager, this demo equips you with the tools to accelerate time-to-market and deliver a superior user experience.

After completing this video, viewers will understand a proven, step-by-step UX design process that turns innovative ideas into market-ready products with efficiency and clarity. They will be equipped to map out customer pain points, prioritize features, and create user personas that drive actionable insights. The video empowers participants to build and refine rapid prototypes, conduct usability testing, and confidently guide products toward a successful launch. By following this process, viewers can accelerate time to market and deliver a seamless, customer-focused experience.


Outcomes

Following are the key things you will be able to do after you watch this demo:

  • Identify and analyze customer and business pain points.
  • Map abstract product visions into actionable design blueprints.
  • Prioritize and strategize product features with agile roadmaps.
  • Create detailed user personas and scenarios based on research.
  • Develop and iterate rapid low-to-high fidelity prototypes.
  • Conduct usability testing and implement evidence-based refinements.
  • Define comprehensive visual design and brand guidelines.
  • Prepare technical specifications for seamless development handoff.
  • Launch a market-ready product using efficient, scalable frameworks.

 

Summary

  • Introduction to UX Design Process 0:00

    • Josh Lomelino introduces himself and expresses excitement about showcasing user experience design examples.

    • He emphasizes the importance of the Lean UX approach, which transforms innovative ideas into market-ready products efficiently.

    • The focus is on demonstrating the power and flexibility of their UX design process through various phases.

    • Josh mentions that he will show UX prototypes to illustrate each phase in context.

  • Phase One: Building the Foundation for Innovation 0:41

    • Josh explains that the first phase involves a deep dive into understanding the key questions about the product.

    • The goal is to identify customer and business pain points and map out the vision.

    • This phase involves a forensic exploration of customer pain points and proposing solutions.

    • The outcome is a laser-focused blueprint that transforms abstract concepts into actionable insights.

  • Phase Two: Execution Strategy and Rapid Ideation 1:48

    • In this phase, the focus is on turning insights into a rapid ideation process.

    • The team visualizes the customer experience and creates an actionable roadmap.

    • Detailed customer experience mapping is performed for strategic feature prioritization.

    • The approach is agile, allowing for a dynamic roadmap that adapts and evolves.

  • Phase Three: Product Leadership and Strategic Alignment 2:34

    • Josh describes this phase as connecting strategic dots to ensure every feature aligns with business objectives.

    • The product team and UX team become strategic partners, aligning product vision with business objectives.

    • The outcome is a unified strategic narrative and the basis for an actionable project plan.

    • The team starts building the product and approaches the MVP stage.

  • Phase Four: Pre-MVP Development and Product Reconnaissance 3:14

    • This phase involves identifying potential barriers before building the rapid prototype.

    • Product and technical reconnaissance is critical for success, uncovering technological limitations and design challenges.

    • The goal is to prevent future roadblocks and identify technology opportunities.

    • The team finalizes the pre-MVP development, ensuring a smooth transition to the next phase.

  • Phase Five: UX Design and Persona Development 4:03

    • Josh highlights the importance of user experience research in this phase.

    • The team creates detailed customer scenarios, mapping each pain point to specific system features.

    • The focus is on translating user research into detailed personas for rapid prototyping.

    • This phase brings interfaces to life with precision and continuous iteration.

  • Phase Six: Building the Rapid Prototype 4:47

    • The team transitions from paper sketches to interactive wireframes, moving from low to high fidelity.

    • Continuous feedback is gathered at each key point of the process, making adjustments as needed.

    • The goal is to go from imagination to a tangible experience, seamlessly integrating business logic into interface solutions.

    • The team progressively refines the prototype, ensuring it meets user needs and business objectives.

  • Phase Seven: Usability Testing and Continuous Refinement 5:27

    • Usability testing is conducted with continuous feedback and multiple rounds of revisions.

    • The focus is on continuous user experience refinement and evidence-based design solutions.

    • The team aims to hit the bullseye together, ensuring the product meets user needs and business objectives.

    • The process involves systematic improvement, leading to a polished final product.

  • Phase Eight: Finalizing Visual Design and Product Identity 5:49

    • Once the user experience is locked in, the team develops comprehensive style guides.

    • The goal is to create a comprehensive brand experience, going beyond aesthetics.

    • The development team gains a clear understanding of the visual voice of the product.

    • The team defines icons, typography, color, and user interface consistency.

  • Phase Nine: Design and Documentation for Development 6:35

    • As the project nears the end, the team prepares technical specifications and development guidelines.

    • The focus is on creating a seamless handoff to the development team.

    • The team provides technical blueprints and detailed implementation guidelines.

    • The goal is to ensure a smooth transition to development and preparation for launch.

  • Phase Ten: Launch and Final Transformation 6:57

    • The final phase involves transforming the prototype into a live product.

    • The team helps with the MVP launch, either using the client's development team or their tech stack.

    • The team provides all final specifications and the digital prototype from prior steps.

    • Clients can optionally choose to accelerate their time to market by leveraging the SAS MVP accelerator.

  • Conclusion and Call to Action 8:41

    • Josh emphasizes the importance of transforming concepts into reality.

    • The team has invested over 15,000 hours developing a framework that reduces front-end development time.

    • The mobile-first responsive architecture offers instant scalability and reduced technical complexity.

    • The team offers to partner with clients to augment design and technology efforts, ensuring a successful launch.

 


Read More

13: Building an Effective MVP


This demo walks you through a dynamic, actionable framework for transforming user pain points into a Minimum Viable Product (MVP) using Agile user stories. You'll learn how to brainstorm and document personas, reframe core problems as needs, and translate those into actionable features with step-by-step guidance. The session demonstrates both hands-on manual methods and the use of powerful AI tools—like ChatGPT—to rapidly generate and refine user stories, making the product development process more efficient. By the end, you'll be equipped with practical strategies to build, organize, and launch your own MVP, leveraging proven workflows and modern AI support.


Description

This demo walks you through a dynamic, actionable framework for transforming user pain points into a Minimum Viable Product (MVP) using Agile user stories. You'll learn how to brainstorm and document personas, reframe core problems as needs, and translate those into actionable features with step-by-step guidance. The session demonstrates both hands-on manual methods and the use of powerful AI tools—like ChatGPT—to rapidly generate and refine user stories, making the product development process more efficient. By the end, you'll be equipped with practical strategies to build, organize, and launch your own MVP, leveraging proven workflows and modern AI support.

In this video, viewers will learn a practical framework for developing a Minimum Viable Product by systematically transforming user pains into actionable features through needs analysis and Agile user stories. By following along, participants will discover how to brainstorm and document user personas, define core problems, and leverage AI tools to accelerate feature development. Completing the video equips viewers with the skills to map out, organize, and build a comprehensive feature backlog tailored to their users' needs. Ultimately, you’ll be able to apply this structured approach to launch your own MVP efficiently and effectively.


Personas and Vision Document

Here is the template you can clone to define your app. 


Workflow Summary Guide

Click here to get the 10 step workflow summary guide and supplemental resources


Prompt Cheat Sheet

Click here to get the ultimate prompt cheat sheet of every prompt used end to end. Below is the Prompt Atlas showing the 8 categories of prompts in the prompt cheat sheet guide. 

 

academy/AI-Prompt-Atlas.png" alt="Prompts Guide Atlas" width="1024" height="1536" />


Outcomes

Following are the key things you will be able to do after you watch this demo:

  • Identify user pains and core challenges.
  • Articulate user needs from pain points.
  • Develop user personas representing target audiences.
  • Translate needs into actionable Agile user stories.- Leverage AI tools for feature generation and backlog creation.
  • Document and organize user stories in structured formats.
  • Create comprehensive feature backlogs.
  • Refine and adapt frameworks for rapid product development.

Summary

Introduction to MVP and Ecosystem Mapping (0:00:09)  
Josh introduces the concept of the Minimum Viable Product (MVP), emphasizing the importance of defining pain points, needs, and features for different stakeholders and mapping the overall project ecosystem

Three-Part Agile User Story Process (0:00:09)  
Josh outlines a sequential framework: converting pains into needs and then into features, which are written as Agile user stories, highlighting the value of progressing step-by-step rather than jumping directly to user stories.

Business Vision Planning and Personas (0:08:36)  
The importance of developing user personas is discussed, showing how various archetypes (e.g., medical doctors, programmers, teachers) help clarify specific needs by associating real-life pains and developing empathy-driven solutions.

Pain, Need, and Feature Transformation (0:18:15)  
Demonstrates, with the example of a medical doctor, how individual pains are rewritten into user needs and further translated into actionable features, using empathetic design as a core principle.

Manual and AI-Assisted User Story Generation (0:27:50)  
Josh explains how manually defining the framework prepares for leveraging AI tools, which accelerate the process of drafting needs and Agile user stories for each persona.

Leveraging AI for Brainstorming and Data Mining (0:37:51)  
Describes incorporating AI chatbots (e.g., ChatGPT, Gemini) to quickly generate, format, and expand user stories and pain points, as well as methods for data mining common user problems using AI.

Persona and Backlog Development Workflow (0:47:00)  
Shares how organizing and summarizing ideas with AI and mind mapping tools streamlines persona development and backlog creation, allowing for comprehensive project planning and smoother team collaboration.

Iterative Process and Documentation Completion (0:55:56)  
Details the ongoing, iterative approach of developing user personas and scenarios, curating and refining user stories, and documenting all features in structured formats for future product development steps.

 


Read More

Bible Search Results

There are no Main Site search results.