51 SPEC Kit 360: Learning Analytics EMORY UNIVERSITY LIBRARIES Policy on the Collection, Use, and Disclosure of Personal Information http://web.library.emory.edu/privacy-policy/personal-information.html are not permitted to seek out such information where not germane to the foregoing purposes, or disclose or otherwise use what they have observed. Such unavoidable inspection of personally identifiable information is limited to the least invasive degree of inspection required to perform such duties. This exception does not exempt systems personnel from the prohibition against disclosure of personal and confidential information. Except as provided above, systems personnel shall not intentionally search electronic records or transactional information for violations of law or policy. However, they shall report violations discovered inadvertently in the course of their duties to the Emory University Trust Line (www.finadmin.emory.edu/internalaudit/trustline.html). Back-up Services Operators of Library electronic systems shall provide information about back-up procedures to users of those systems upon request. Changes to Our Privacy Policy The Libraries may change our Privacy Policy at any time by posting revisions on the website. By accessing or using our website, you agree to be bound by all the terms and conditions of our Privacy Policy as posted on the website at the time of your access or use. If you do not agree to the terms of this Privacy Policy or any revised statement, please exit the site immediately. Contact Information If you have any questions about our Privacy Policy, please contact the Administration Office of Emory University Library at 404-727-6861. Notes Personally identifiable information is any information that can be directly or indirectly associated with a known individual. For example, all information contained in personnel, patron, and circulation files is personally identifiable. 1. Library business refers to activities involved in the provision, maintenance, and management of the Library's systems and services to its patrons and staff. Circulating books and journals, enforcing Library contracts, and troubleshooting problems with the Library's e-mail system are all examples of Library business. Trying to discover who used a Library workstation to issue a harassing message would typically not be Library business, however. 2. Substantiated reason to believe requires reliable evidence, as distinguished from suspicion, rumor, gossip, or other unreliable evidence. 3.
Previous Page Next Page