57 SPEC Kit 360: Learning Analytics INDIANA UNIVERSITY BLOOMINGTON LIBRARIES Privacy Policy https://policies.iu.edu/policies/lib-01-libraries-privacy/index.html Indiana University Policy: Indiana University Libraries Privacy Policy LIB-01 This PDF created on: 08/24/2017 3 This policy explains our information practices and the choices users can make about the way the IU Libraries collect and use this information. To provide borrowing privileges, we must obtain certain information about our users in order to provide them with a library account. If users are affiliated with Indiana University, the library automatically receives personally identifiable information (name, address, e-mail address, status [as student, faculty, staff], identification number, etc.) in order to create and update their library account from the Registrar's Office (for students) or Human Resources (for employees). When visiting our library's web site and using our electronic services, users may choose to provide their name, e-mail address, library card barcode, phone number or home address. Users who are not affiliated with Indiana University have the option of providing us with their e-mail address for the purpose of notifying them about their library account. Users may request that we remove their email address from their record at any time. The IU Libraries never use or share the personally identifiable information provided to us in ways unrelated to the ones described above without also providing users an opportunity to prohibit such unrelated uses, unless we are compelled to do so under the law. Our goal is to collect and retain only the information we need to provide library- related services. The IU Libraries strive to keep all personally identifiable information confidential and do not sell, license, or disclose personal information without consent unless compelled to do so under the law or as necessary to protect library resources or conduct necessary library operations. 3. Access by Users We attempt to fulfill all requests made by individuals who use library services that require the provision of personally identifiable information and to update their information through proper channels. Users may be asked to provide some sort of verification (e.g., PIN number, photo or network identification card, etc.) to ensure verification of identity. 4. Data Integrity & Security The data we collect and maintain at the library must be accurate and secure. Although no method can guarantee the complete security of data, we take steps to protect the privacy and accuracy of user data in the following ways: Data Integrity: We take reasonable steps to assure data integrity, including: using only reputable sources of data providing our users access to their own personally identifiable data updating data whenever possible utilizing middleware authentication systems that authorize use without requiring personally identifiable information destroying untimely data or converting it to anonymous form. Data Retention: We regularly review and purge personally identifiable information once it is no longer needed to manage library services. Information that is regularly reviewed for purging includes, but is not limited to, personally identifiable information on library resource use, material circulation history, and security/surveillance tapes and logs. The IU Libraries are committed to investing in appropriate technology to protect the security of personally identifiable information while it is in the library's custody. The IU Libraries follow University policy for the retention of data, and access to data is restricted to a small number of authorized university computing personnel. The IU Libraries post announcements about the choice users make in signing up for customized or personalized services related to web and database services. Services that Require User Login: In-library computers allow guest use of most library resources without logging in. Use of the full resources of the World Wide Web and of the full power of some subscription databases requires that a user log on to the workstation, either with his/her network ID and password or with a special guest account the user obtains from the library. Data about which users were connected to which machine is collected, in accordance with University policy, and kept for a limited time with very limited access by staff. Users of electronic resources that require authorization for their use are also asked to log in when they connect from outside the university IP address ranges. The data kept from these transactions does not include information linking the user to the resources to which the user connected or about searches completed and records viewed. Cookies: Cookies are used by IUCAT to maintain the persistence of a default library search limit. These cookies are session cookies and are removed when the user exits the catalog and closes the browser.
Previous Page Next Page