ch3

Chapter 3. Why Data Is Collected and How It Is Used

A vast majority of the analyzed policies provide some rationale as to why the library collects data and how it is used. Some policies provide broad umbrella statements, conceivably covering a whole range of systems, data, and transactions. Others include such statements but also provide further detail on one or more particular systems, transactions, or data types. ALA’s “Library Privacy Checklist—Overview” notes that library policies should “specify that the library is not collecting more user information than what it needs” and should “[include] information about what information the library is tracking, why, and for how long the data is kept.”1 ALA’s Resolution on the Retention of Library Usage Records notes that because “library usage records containing personally identifiable information (PII) are maintained for the sole purpose of effectively managing library resources,” libraries should “limit the degree to which personally identifiable information is collected, monitored, disclosed, and distributed” and “avoid creating unnecessary records.”2

As noted in many policies, libraries collect data in association with the library fulfilling its core business and administrative responsibilities of providing access to library resources and services. This chapter provides policy statement examples for both levels of detail—broad and overarching statements, and granular and specific statements. To begin, many library policies incorporate some level of overarching phrasing (some examples of which are provided in the ALA Privacy Tool Kit). For example, Rutgers University Libraries’ policy notes,

The Rutgers University Libraries gather information about current and valid library users for the sole purpose of providing library services. Where it is necessary for the Libraries to identify users, it is our goal to gather only the minimum information necessary and to retain that information for only as long as it is needed to complete a particular transaction. We avoid creating unnecessary records and retaining records not needed for the fulfillment of the mission of the Libraries. Furthermore, we do not engage in practices that might place personally identifiable information in or on public view.3

Additional broad, high-level statements noting data collection associated with fulfilling library operational requirements are provided below (and in some of the instances below, the library’s policy later provides greater detail on one or more data types):

Colby College Libraries
We do not collect information about patron activities . . . beyond what is basic and necessary to conduct and fulfill the mission of the library.4
California Polytechnic State University Robert E. Kennedy Library
To aid understanding of the use or value of resources and services, the Kennedy Library may aggregate and retain user data for a reasonable period of time. It will, however, neither collect nor retain information identifying individuals except for the purpose of furnishing a specific service.5
Northeastern University Library
The Libraries collect information about visitors and visits for statistical purposes, to administer access to Library materials and services, and to inform users of Library services and programs.6
Temple University Libraries
For certain defined business purposes the University Libraries do collect PII which data are individually or collectively sensitive or confidential according to current Temple University data classification. Both sensitive information and confidential information are held in strict confidence and exchanged among library staff or other University staff only in relation to the business purpose. . . .
PII collected is made accessible only to those specific individual staff who need access to the information in order to conduct library business or who will be compiling and anonymizing data for statistical or assessment purposes.7
University of Chicago Library
In order to conduct Library business, the Library collects and maintains personally identifiable information about library users. . . .
Identifiable information may be retained, in some cases indefinitely, when doing so serves an institutional purpose.8
University of Michigan Library
The University of Michigan Library may collect some data about your library use in order to improve services and to integrate with broader University teaching and learning initiatives.
. . .
When you use library applications, systems, and websites, you generate data. We use and store these data to provide and improve services and resources.9
Syracuse University Libraries
The Libraries provide a vast array of services. Many services do not require users to divulge any information to Libraries staff or systems. Other services, however, require users to provide some information in order to receive or benefit from the service.10
Brooklyn Public Library
All library records that identify patrons by name are strictly confidential, and access to them is limited to staff for legitimate library business.11
Jessamine County Public Library
The Jessamine County Public Library acts to limit the amount of personally identifiable information it retains. Some information, however, is necessarily and understandably retained for the transaction of day-to-day business.
Most information related to customers is kept for the purposes of circulating materials and ensuring that responsibility is attributed to the correct person when an item is borrowed.12
Mount Prospect Public Library
Staff should create records with patron-identifiable information only as reasonably necessary for the Library’s operations.
Staff should consult records with patron-identifiable information only for legitimate purposes related to the Library’s operations.13
Pierce County Library System
Information and usage records with personally identifiable customer information are maintained for the purpose of effectively managing library resources and providing library services.14

Several policies reference or directly quote state law, which in some instances itself directly speaks to the purpose and use of some data collected by a library within that state. For example, Princeton University Library’s policy notes, “As required under New Jersey law (N.J. Stat. § 18AG73-43.1 – 43.2), Princeton University Library records relating to an individual patron’s use of the Library and its resources shall be treated as confidential,” and then quotes the relative New Jersey statute section passage that speaks to how library records can be “necessary for the proper operation of the library.”15 Deer Park Public Library’s policy quotes New York Civil Practice Law and Rules, Section 4509, which also references how records can be used “for the proper operation” of the library: “Library records, which contain names or other personally identifying details regarding the users . . . may be disclosed to the extent necessary for the proper operation of such Library.”16

Geauga County Public Library references Ohio Revised Code Section 149.432, which notes that a library record includes

a) Information that the library requires an individual to provide in order to be eligible to use library services or borrow materials;
b) Information that identifies an individual as having requested or obtained specific materials or materials on a particular subject;
c) Information that is provided by an individual to assist library staff answer a specific question or provide information on a particular subject.17

Las Vegas–Clark County Library District’s policy references Nevada Revised Statutes NRS 239: “In accordance with NRS 239, the District will not retain any records pertaining to a patron’s use of library resources longer than necessary to provide appropriate stewardship of those resources.”18

Moving to examples of policy statements providing more detail on how particular data may be used, Duke University Libraries’ policy concludes with a section titled “Examples of How the Libraries Use Data to Improve Services.” This section provides details and accompanying data graphs that help illustrate how library staff utilize textbook circulation data, interlibrary loan request data, physical space swipe entrance data, Google Analytics data, and data analyzed from their EZproxy proxy server logs.19 The rest of this chapter will share policy statement examples regarding the following types of data and how and why such data is collected and in the process will surface a rich variety of policy phrasing, nuance, and focus:

  • web server logs and associated analytics data
  • cookies
  • electronic resource usage and logs
  • e-mail and web forms
  • virtual reference transactions, including components such as chat transcripts
  • survey data
  • core patron and circulation records typically managed by a library services platform or integrated library system
  • interlibrary loan and document delivery data
  • authentication services and computer use data
  • social media
  • donors
  • video camera surveillance footage
  • photos and videos (not related to surveillance)
  • various miscellaneous data

Web Server Logs and Analytics

Web server logs, their associated analysis through analytics programs such as Google Analytics, and other data related to the library website represented the single most mentioned data or record type with an associated reason provided for such collection. Some level of detail appeared in at least twenty-two of the academic library policies and a dozen public library policies. Phrasing can vary significantly, but many focus on common threads of collecting and using such data to assist with troubleshooting issues, to better understand and meet the needs of users (e.g., improving the website), and for statistical purposes.

University at Albany Libraries
The information that is collected automatically is used to improve this Web site’s content and to help the University Libraries understand how users are interacting with its Web site. This information is collected for statistical analysis and to determine what information is of most and least interest to our users.20
Indiana University Libraries
Web site developers and owners review usage data on their web pages to identify resources that are being used and to evaluate the provision of information on the site and the effectiveness of the organization and design of that information.21
Syracuse University Libraries
The Libraries use this information to track site usage, monitor site performance, and generate aggregate statistics.22
San Diego State University Library
The Library may record aggregated data (stripped of identifying characteristics) on website and resource usage in order to improve website usability and collection relevance.23
University of Miami Libraries
The UM Librariesʼ web servers may also use browser “cookies” or other technologies to maintain session and preference information and to provide other complex functionality. The Library will use cookies to capture IP addresses for collecting data on web usage.24
University of Chicago Library
This automatically collected information is only used internally for technical troubleshooting, to monitor compliance with the Library’s Policy on Acceptable Use of Electronic Resources, to improve the usability of our website, and to record aggregate statistics.25
University of North Carolina at Chapel Hill Libraries
For site administration functions, information, other than personal information linked to a particular individual, is collected for analysis and statistical purposes of Web site navigation. This information is used to help diagnose problems, assess what information on the sites is of most interest, determine technical design specifications, identify system performance and/or problem areas, and other administration functions.
. . .
Our use of tracking technologies allows us to analyze trends and statistics to improve our Web site and your Web experience.26
University of California Berkeley Library
In the course of providing you with Web-based services, The Library collects and stores certain information automatically through our Web site. We use this information on an aggregate basis to maintain, enhance or add functionality to our Web-based services.27
University of Michigan Library
The U-M Library also uses Google Analytics (including the use of demographics and interest reports), a web analytics service provided by Google, Inc. (“Google”) to help understand how U-M Library websites are being used and to improve our interface and services. . . .
The U-M Library uses this information for analytical and feature-improvement related purposes only.28
Villanova University Falvey Memorial Library
We routinely collect information from website usage to help us improve functionality, navigation, and performance.29
University of Oregon Libraries
When users visit our website, we may automatically collect certain information. . . . This is standard practice for websites, and is not used for any purpose other than to evaluate how we can design the site to best serve user needs.30
Auburn University Libraries
We use non-identifying and aggregate information to better design our services. For example, we may let it be known publicly that a specific number of individuals visited a certain area on our website, but we would not disclose anything that could be used to identify those individuals.31
Atlanta-Fulton Public Library System
This information is collected for statistical analysis using third-party or proprietary software programs to create summary statistics. The statistics are used for the purpose of determining what information is of most and least interest to all visitors and for identifying system performance issues or problem areas in order to better plan future portal enhancements.32
Berkshire Athenaeum
The Berkshire Athenaeum will collect and store only the information necessary to measure the number and timing of visitors to different areas of the Athenaeum’s website to assist in making these sites more useful.33
Lower Macungie Library
Statistical Information: This information is used by the Lower Macungie Library for the operation of the service, to maintain quality of the service, and to provide general statistics regarding use of Lower Macungie Library web sites.34
Mount Prospect Public Library
We use your IP address to help diagnose problems with our server, and to administer and create generalized statistics on our Web site. We may also use an IP address to block abusive users of public forums.35
Nashville Public Library
The library and its third party vendors do keep track of how users navigate our web sites: which pages are most frequently used, popular search paths, domains of users (to find out where our users are visiting from), and other information that helps us make adjustments and improve our service. This information is not shared, and is used by us for general and not individual statistics.36
Ann Arbor District Library
Log Files
When a user visits our website, his/her IP address is recorded. We use this information to analyze trends, administer the site, determine popularity of content, and gather broad demographic information for aggregate use.37
Phoenix Public Library
Statistical Information: Phoenix Public Library collects information to maintain the quality of its services and to report aggregate information on the usage of its website to City management, as well as state and federal agencies and national library organizations.38
Queens Borough Public Library
The Library uses this information to help the Library make our site more useful to visitors and to learn about the number of visitors to our site and the types of technology our visitors use.39

Cookies

Many library policies note the use of cookies and provide brief definitions of what a cookie is. Cookies can be used by website analytics programs, but for other purposes as well, as shown below:

Michigan State University Libraries
This Site uses cookies for two main purposes: (a) to carry information about your current session at this Site from one web page to the next, which also allows you to automatically login to other Michigan State University websites, and (b) to identify you on this Site on return visits.40
University of Oregon Libraries
Users of networked computers will need to enable cookies in order to access a number of resources available through the Libraries. . . . Cookies are often used to remember information about preferences and pages visited. . . . Our library servers use cookies solely to verify that a person is an authorized user in order to allow access to licensed library resources.41
Josephine-Louise Public Library
One of the primary purposes of cookies is to provide a convenience feature to save you time. The purpose of a cookie is to tell the Web server that you have returned to a specific page. . . . When you return to the same Josephine Louise Public Library—Walden, New York Web site, the information you previously provided can be retrieved, so you can easily use the Josephine Louise Public Library—Walden, New York features that you customized.42
Pierce County Library System
Examples in which the Library might use cookies would be to customize content areas; to analyze site activity or user behavior; or to maintain the state of authentication for member privileged pages during a given session.43
Los Angeles Public Library

Los Angeles Public Library’s Online Privacy Policy provides extensive detail on the types of information collected when a user visits the library’s website. Notably, it also states,

How we use information collected on lapl.org for digital advertising of library services
We utilize third-party tools for outreach
Our team and affiliates use third-party web services to conduct outreach and education through the use of digital advertising for the Los Angeles Public Library initiatives.44

It then proceeds to provide definitions for, and details on, the library’s utilization of Google Adwords, Facebook Ads, Google Analytics, Hotjar cookies, web beacons, session cookies, persistent cookies, click tracking, conversion tracking, retargeting, and targeted advertising. It notes why the library uses these technologies as well as methods to opt out of data collection.

Other References Related to Electronic Resource Usage and Logs

A few library policies make references to data collection and use focused on assessing electronic resource usage, such as licensed library databases:

Penn State University Libraries
Collection and analysis of data on usage of the licensed commercial online databases and materials offered by the Libraries through its system assists both the publisher and the University Libraries to understand the impact of this technology and service.45
Harvard Library
Harvard does gather data about system and resource usage for administrative purposes. . . .
The resulting logs contain information necessary for analyzing the use of resources, troubleshooting problems and improving services.
Log data is also used to distribute resource costs among Harvard libraries and faculties.46
Syracuse University Libraries
The Libraries may use information that they collect about online database use for internal business purposes and to improve the Libraries’ services.47
University of Denver Libraries (in reference to their EZproxy proxy server logfiles)
We may use these logs to troubleshoot authentication errors or prevent and/or stop security breaches when they occur. We may also anonymize and analyze these logs in order to assess our collections and their use.48

E-mail and Web Forms

Several policies discuss collection and use of data associated with e-mail and web forms. Examples include the following:

Auburn University Libraries
We use e-mail addresses to respond to the e-mail we receive, to send library notices, to confirm online program registrations, and occasionally to alert customers to new services they may want to use. Mailing addresses may be used to send library-related notices. Such addresses are not used for any other purpose and are not shared with outside parties.49
University at Albany Libraries
Your e-mail address and the information included in your message will be used to respond to you, to address issues you identify, to improve this Web site, or to forward your message to another SUNY campus for appropriate action.50
University of Chicago Library
If you choose to submit personally identifiable information to the Library (through web forms, email messages, or other communication), that information will be used only for the purpose for which you submitted it, with the exception that the Library may make reasonable statistical reports that do not identify particular individuals.51
University of Denver Libraries
We may collect e-mail addresses and other contact information, in order to provide and improve our services.
. . .
If you fill out an electronic form on our site, such as those for reporting a problem, reserving study rooms, requesting a consultation, asking a question, etc., we keep these data in order to trouble-shoot, improve services, and/or to keep statistics on our work.52
Pierce County Library System
The Library may use personally identifiable information to contact you for promotional purposes. For example, on occasion the Library may wish to send e-mails to inform you of new exhibitions or other events the Library deems may be of interest. You will not receive such communications unless you have willingly provided your personal contact information.53
Queens Borough Public Library
Personally identifying information that you provide by e-mails or web forms will be used only for such purposes as are described at the point of collection (for example on a web form), such as to send information or provide library services to you, update your membership record, or to respond to your questions or comments.
If you provide contact information, the Library may contact you to clarify your comment or question, or to learn about your level of customer satisfaction with library services.54
San José Public Library
Any personal information given in email messages, chat sessions, web forms, in-person or telephone reference, or other communications is only used for the purpose for which you submitted it.55

Virtual Reference Transactions

As evidenced above, some policies specifically note how e-mail can be used for reference services. Several library policies provide further details related to virtual reference services (such as chat transcripts), and some libraries have dedicated virtual reference service policies, such as Texas State University Libraries.

Duke University Libraries
The Libraries collect and store personal information that you submit via the Libraries’ web-based management tools, such as forms related to asking reference questions or booking reservable study rooms. We also interact with our library users regularly and receive personal information via email messages, chat sessions, web forms, and other communications. If you submit personal information via one of these platforms, we use your personal information only for the purpose for which you submitted it.56
Middlebury Library
We access these transcripts to evaluate the quality of our service and for statistical purposes.57
Temple University Libraries
These transcripts are restricted for the purposes of internal training, statistical reporting, and may at times be repurposed, once stripped of any identifying information. . . .
The transcripts are analyzed for the amount and types of questions we are being asked. This helps determine appropriate staffing levels and aids in training librarians to staff the reference service. Frequently asked questions may at times be mined and repurposed in order to populate the FAQ knowledge-base, but no identifying information is made public.58
Texas State University Libraries
  • The Alkek Library Ask a Librarian service records all reference transactions, including the chat conversation and the URLs for all the web sites visited.
  • At the end of the session, you have the option to have the transcript emailed to you and a copy will be stored in our database for a period of one year.
  • Transcripts maintained by the library will be used for assessment and training purposes only.
  • We will not disclose any personal data we collect from you to any other party in a manner that would identify you, except where required by law, or in order to fulfill your service request.59
Syracuse University Libraries
The Libraries may use information they collect during reference transactions for internal business purposes and to improve the Libraries’ services.60

Surveys

Several policies discuss data collected through surveys, oftentimes associated with user assessment activities.

Syracuse University Libraries
Libraries Research Initiatives: In order to improve their service to the community, the Libraries occasionally may conduct survey studies, issue questionnaires, or perform other data gathering activities. During these initiatives, the Libraries may ask visitors to provide Individual Information or University Information. In these circumstances, the Libraries consider this information optional; the visitor or user can choose whether or not to provide this information. Further, a visitor’s decision to withhold Individual Information or University Information from a Libraries employee who is conducting a research initiative will not harm, diminish, or otherwise affect the level of service that visitor receives from the Libraries.61
University of North Carolina at Chapel Hill Libraries
Library Surveys and Assessments
Periodically, The University of North Carolina at Chapel Hill Libraries conduct library surveys and assessments. Information and data obtained through electronic, group or individual surveys are considered confidential and will adhere to Institutional Review Board policies, as appropriate, unless otherwise publicly stated in the collection process or permission is explicitly obtained from the respondent(s).
Periodically, the libraries review and use demographic and similar aggregated data for reports, both internal and external. This use does not identify individuals.62
Brown County Library
Any information the library user chooses to provide, such as information gathered through voluntary library user surveys, will be used only to provide or improve library services.63
Josephine-Louise Public Library
Josephine Louise Public Library—Walden, New York may also contact you via surveys to conduct research about your opinion of current services or of potential new services that may be offered.64
Lower Macungie Library
Survey information is used for purposes of monitoring or improving the satisfaction of LML patrons.65

Patron Records and Circulation Services

Patron identification data (e.g., name, address, etc.) and collecting this information to establish a patron record allowing the circulation of materials and the providing of other services is frequently mentioned in policies.

Duke University Libraries
The Libraries maintain personally identifiable information in library users’ online accounts. . . . We use this information to maintain your library account and to provide services to you.66
Montana State University Library
If you wish to receive borrowing privileges, we must obtain certain information about you in order to provide you with a library account.67
Texas Tech University Libraries
We will use the personally identifiable information only to maintain your library account and respond to your requests.68
Syracuse University Libraries
The Libraries require all users to provide University Information in order to borrow materials from the Libraries, including books and laptop computers.
The Libraries may use circulation information they collect for internal business purposes and to improve Libraries services.69
Fairbanks North Star Borough Public Libraries
The library maintains a confidential database of its users which includes information for personal identification, as well as any library items currently checked out to that borrower. . . . Collection and maintenance of this information is necessary so that the library can account for Borough property.70
Geauga County Public Library
Circulation records and other records identifying the names of library users with specific materials are retained while the materials are charged to a patron and when materials are returned until of no further administrative value.71
Las Vegas–Clark County Library District
In order to provide borrowing privileges, the District must obtain certain information about its patrons.72

Interlibrary Loan and Document Delivery Services

Interlibrary loan and document delivery services data are also mentioned in several policies.

Cornell University Library
Interlibrary Loan lending and borrowing records have been retained since at least 2001. They are used in case there are billing problems and to comply with the record keeping requirements suggested by the CONTU (National Commission on New Technological Uses of Copyright Works) guidelines. . . . In some cases, information about requests (including the name of the requestor) is shared within the library staff for collection development purposes, but staff are instructed not to further disseminate such information.73
University of California San Diego Library
The Library also collects information in conjunction with Library Express, Interlibrary Loan, or San Diego Circuit patron requests submitted via Roger or Melvyl, to allow us to complete the requested service transaction for you.74

Authentication Services and Computer Use

User IDs and passwords associated with providing access to databases or logging on to a computer are mentioned in several policies.

Southern Illinois University Morris Library
Use of the full resources of the World Wide Web and of the full power of some subscription databases requires that a user log on to the workstation.75
San Diego State University Library
All SDSU affiliated patrons will be required to sign onto internet access terminals using their SDSUid. This is necessary to identify SDSU affiliates from community users and is done solely to be in compliance with legal contracts.76
Rutgers University Libraries
When using library services through our website, you may need to provide your name, e-mail address, NetID, password, barcode, and/or password. To use licensed subscription electronic resources from an off-campus location, users are required to submit a NetID and password or library barcode and password to be authenticated as a currently affiliated user.77
Ann Arbor District Library
In order to use the Internet stations at an AADL branch, a user must provide his/her name and address and show valid identification. This information is only used in the event that the user breaks one of the AADL rules of behavior during his/her session.78

Social Media

Several public library policies note how the libraries may use social media data.

Nashville Public Library
By accessing NPLʼs blog and social media sites, as well as interacting with content there . . .
What You Should Know.
The Library Owns the Content.
What This Means: NPL can use content without limits.79
Berkshire Athenaeum
The Berkshire Athenaeum shall also be granted the right to reproduce comments, posts, and messages in other public venues. For example, a response to a YouTube book review may be quoted in a newspaper or on the library website.80
Jessamine County Public Library
Many social media sites allow users of those sites to become a “friend,” “fan” or otherwise associate their own “profiles” or virtual presences with the library’s profile on these sites. The library does not collect, maintain, or otherwise use the personal information stored on any third party site in any way other than to communicate with users on the site.81

Donors

Several policies include specific references to donor-related data.

Ann Arbor District Library
Donating to the Library
When a donation is given to AADL, we will record the donor’s name, address and type and amount of gift to comply with AADL auditing procedures and to issue the donor a receipt for tax purposes.82
Genesee District Library
Donor lists may be used by Genesee District Library for ongoing communication and the solicitation of future gifts, in accordance with Michigan Law, unless the donor has stipulated otherwise.83

Video Camera Surveillance Data

Footage captured by video surveillance systems is frequently mentioned in policies, and several libraries have separate, individual policies focused on video surveillance.

Ocean County Library
The Library uses surveillance cameras in some of its facilities to complement other measures to ensure a safe and secure environment for customers and staff. The equipment helps to protect the libraryʼs property against theft or vandalism and can assist in identifying intruders and persons breaking the law or violating the libraryʼs Rules of Conduct.84
Jessamine County Public Library
The Library will use digital video to enhance the safety and security of Library customers, staff, and property, while protecting individuals’ right to privacy. The primary use of security cameras is to discourage inappropriate and illegal behavior and to improve the opportunity to apprehend offenders.85
Alpha Park Public Library District
Security cameras are in use to discourage illegal behavior and violations of library policies, and to provide recorded footage to assist law enforcement in prosecuting criminal activity and staff in enforcing library policies.86
University of Oregon Libraries
The University of Oregon Libraries (UO Libraries) values academic freedom and personal privacy, and employs security cameras only to the extent required to assist in protecting library resources and providing safety for library users.
. . .
Security cameras may be placed strategically in and around the UO Libraries to meet the specific needs of library departments and to assist the UO Police Department (UOPD) in its efforts to deter crime; protect library staff and patrons; protect facilities, collections and equipment; assist with emergency response situations; and investigate suspected criminal behavior.87
University of North Carolina at Chapel Hill Libraries
Some campus libraries have security cameras installed to improve safety for patrons and staff and to help prevent theft and vandalism. These recordings are used by library staff and law enforcement officials investigating incidents that occur in the libraries.88

Photos and Videos for Promotional Purposes

Distinct from video surveillance footage, several public library policies reference promotional use of photos and videos.

Genesee District Library
Photos and videos from general library scenes, public programs and events held in Library facilities and spaces may be used on the Library’s website and/or in social media and publications.89
St. Louis Public Library
The Library may utilize photos and videos from public programs and events at Library facilities and Library spaces on its website and in Library publications. Photos, images, and videos submitted to the Library by users for online galleries or contests may also be used by the Library for promotional purposes.90

Miscellaneous

Several policies address other miscellaneous types of data collected and how such data is used.

University of Denver Libraries
We collect data regarding how many people enter/exit the building and peoples’ usage of space during library operating hours. These data are anonymized. They are used to improve the design of physical space within the building.91
Ann Arbor District Library
Board Meetings
In order to make a citizen’s comment at an AADL Board Meeting, a citizen will be asked to present his/her name and address. The information given will not be used in any other way.92

Notes

  1. American Library Association, “Library Privacy Checklist—Overview,” last updated January 26, 2020, www.ala.org/advocacy/privacy/checklists/overview.
  2. American Library Association, Resolution on the Retention of Library Usage Records (Chicago: American Library Association, 2006), https://alair.ala.org/bitstream/handle/11213/1594/52.4.4%20Retention%20of%20Library%20Records.pdf.
  3. Rutgers University Libraries, “Privacy Policy,” October 19, 2010, https://www.libraries.rutgers.edu/privacy_policy.
  4. Colby College Libraries, “What Are the Privacy Policies in the Library?” Guidelines and Policies, https://www.colby.edu/libraries/about/guidelines-and-policies/.
  5. California Polytechnic State University, Robert E. Kennedy Library, “270.5.2 Privacy of Online Library Users,” Campus Administrative Policies, Chapter 200, Academic Affairs, 270 Robert E. Kennedy Library, 2015, https://policy.calpoly.edu/cap/200/cap-270.
  6. Northeastern University Library, “Privacy Statement,” last updated December 21, 2011, https://library.northeastern.edu/about/visitors/visitor-policies-and-forms/privacy-statement.
  7. Temple University Libraries, “Confidentiality of Patron Records,” last updated January 31, 2017, https://library.temple.edu/policies/confidentiality-of-patron-records.
  8. University of Chicago Library, “Privacy Statement,” https://www.lib.uchicago.edu/about/thelibrary/policies/privacy/.
  9. University of Michigan Library, “Library Privacy Statement,” last updated March 2016, https://www.lib.umich.edu/library-administration/library-privacy-statement.
  10. Syracuse University Libraries, “Privacy Policy,” version 2.0, last updated October 4, 2013, https://library.syr.edu/policy/documents/privacy-policy.pdf.
  11. Brooklyn Public Library, “Privacy Statement,” https://www.bklynlibrary.org/use-the-library/policy/privacy-statement.
  12. Jessamine County Public Library, “Information Se­curity Policy,” last updated August 21, 2019, https://jesspublib.org/wp-content/uploads/3.6-Information-Security-Policy-2019-09-25.pdf.
  13. Mount Prospect Public Library, “Privacy and Confidentiality of Patron Information Policy,” https://mppl.org/wp-content/uploads/2011/08/Privacy-Policy-111716.pdf.
  14. Pierce County Library System, “Confidentiality of Library Records and Customer Files,” last updated October 15, 2013, https://www.piercecountylibrary.org/about-us/policies/confidentiality-library-records.htm.
  15. Princeton University Library, “Patron Confidentiality,” http://library.princeton.edu/services/access/policies/confidentiality.
  16. Deer Park Public Library, “Library Patron Records Confidentiality Policy,” February 23, 2011, https://deerparklibrary.org/wp-content/uploads/2017/06/Library-Patron-Records-Confidentiality.pdf.
  17. Geauga County Public Library, “Confidentiality and Storage of Patron Personal Information and Circulation Records,” Geauga County Public Library Operating Policy Manual, last updated December 17, 2019, http://divi.geaugalibrary.net/wp-content/uploads/2020/01/710-Confidentiality-and-Storage-of-Patron-Circ-Records.pdf.
  18. Las Vegas–Clark County Library District, “Patron Privacy Policy,” last updated April 10, 2014, https://lvccld.org/wp-content/uploads/sites/54/2017/10/privacypolicy.pdf.
  19. Duke University Libraries, “Duke University Libraries Privacy Statement,” https://library.duke.edu/about/privacy.
  20. University at Albany Libraries, “Internet Privacy Policy,” https://library.albany.edu/privacy.
  21. Indiana University Libraries, “Indiana University Libraries Privacy Policy,” last updated February 1, 2012, https://policies.iu.edu/policies/lib-01-libraries-privacy/index.html.
  22. Syracuse University Libraries, “Privacy Policy.”
  23. San Diego State University Library, “Freedom of Access and Privacy,” https://library.sdsu.edu/about-us/policies-guidelines/freedom-access-privacy.
  24. University of Miami Libraries, “Privacy Policy,” https://www.library.miami.edu/about/privacy-policy.html.
  25. University of Chicago Library, “Privacy Statement.”
  26. University of North Carolina at Chapel Hill Libraries, “Privacy Policy,” last updated March 19, 2018, https://library.unc.edu/about/policies/privacy-policy/.
  27. University of California Berkeley Library, “Collection, Use, and Disclosure of Electronic Information,” last updated September 22, 2008, https://www.lib.berkeley.edu/about/privacy-electronic-information.
  28. University of Michigan Library, “Library Privacy Statement.”
  29. Villanova University, Falvey Memorial Library, “Privacy Policy,” last updated August 22, 2018, https://library.villanova.edu/using-the-library/access/privacy-policy.
  30. University of Oregon Libraries, “UO Libraries Privacy Statement,” last updated March 3, 2020, https://library.uoregon.edu/policies/privacystatement.
  31. Auburn University Libraries, “Auburn University Libraries Privacy Policy,” February 2006, https://www.lib.auburn.edu/policy/privacy_policy.pdf.
  32. Atlanta-Fulton Public Library System, “Privacy Statement,” http://afpls.org/privacy-statement.
  33. Berkshire Athenaeum, “Website Policy; Computer Services Policy,” 2010, https://static1.squarespace.com/static/5c7eed16e8ba44443d295e02/t/5cb17e6afa0d60178b15fcd3/1555136107037/BA_WebsitePolicy.pdf.
  34. Lower Macungie Library, “E-Privacy Statement,” Policies, https://www.lowermaclib.org/about-us/policies/.
  35. Mount Prospect Public Library, “Online Terms of Use,” https://mppl.org/wp-content/uploads/2011/08/Online-terms-of-use-0517.pdf.
  36. Nashville Public Library, “Privacy Notice,” last updated May 2, 2016, https://library.nashville.org/privacy-notice.
  37. Ann Arbor District Library, “Ann Arbor District Library Privacy Statement Policy,” last updated February 17, 2014, https://aadl.org/aboutus/policies/privacy.
  38. Phoenix Public Library, “E-Privacy,” June 16, 2010, https://www.phoenixpubliclibrary.org/AboutUs/Documents/Policies/E-Privacy.pdf.
  39. Queens Borough Public Library, “Privacy Policy,” December 2003, https://www.queenslibrary.org/about-us/library-policies/privacy.
  40. Michigan State University Libraries, “Michigan State University Libraries Privacy Statement,” https://lib.msu.edu/about/privacystmt/.
  41. University of Oregon Libraries, “Privacy Statement.”
  42. Josephine-Louise Public Library, “Privacy Statement,” https://www.waldenlibrary.org/privacy.aspx.
  43. Pierce County Library System, “Website Privacy Policy,” last updated October 11, 2007, https://www.piercecountylibrary.org/about-us/policies/website-privacy-policy.htm.
  44. Los Angeles Public Library, “Online Privacy Policy,” last updated March 2018, https://www.lapl.org/online-privacy-policy.
  45. Penn State University Libraries, “Policy UL-AD08: Confidentiality and Privacy of Patron Library Records,” last updated December 2017, https://libraries.psu.edu/policies/ul-ad08.
  46. Harvard Library, “Harvard Library’s Privacy Statement,” Privacy, Terms of Use and Copyright Information, https://library.harvard.edu/privacy-terms-use-copyright-information#privacy.
  47. Syracuse University Libraries, “Privacy Policy.”
  48. University of Denver Libraries, “Your Privacy and University Libraries,” https://library.du.edu/policies/records-privacy.html.
  49. Auburn University Libraries, “Privacy Policy.”
  50. University at Albany Libraries, “Internet Privacy Policy.”
  51. University of Chicago Library, “Privacy Statement.”
  52. University of Denver Libraries, “Your Privacy.”
  53. Pierce County Library System, “Website Privacy Policy.”
  54. Queens Borough Public Library, “Privacy Policy.”
  55. San José Public Library, “Privacy Policy,” last updated March 12, 2018, https://www.sjpl.org/privacy-policy.
  56. Duke University Libraries, “Privacy Statement.”
  57. Middlebury Library, “Privacy and Security of Library Records,” https://www.middlebury.edu/library/about/policies/privacy-security.
  58. Temple University Libraries, “Virtual Reference Privacy Guidelines,” https://library.temple.edu/services/privacy.
  59. Texas State University Libraries, “Virtual Reference Policy (Ask a Librarian @Alkek),” 2014, https://www.library.txstate.edu/about/policies/virtual-reference.htm.
  60. Syracuse University Libraries, “Privacy Policy.”
  61. Syracuse University Libraries, “Privacy Policy.”
  62. University of North Carolina at Chapel Hill Libraries, “Privacy Policy.”
  63. Brown County Library, “Privacy and Confidentiality,” May 15, 2014, https://www.browncountylibrary.org/wp-content/uploads/2012/09/H_1-Privacy-and-Confidentiality.pdf.
  64. Josephine-Louise Public Library, “Privacy Statement.”
  65. Lower Macungie Library, “Patron/Donor Information Collection Policy,” June 30, 2011, https://www.lowermaclib.org/wp-content/uploads/2014/09/Patron-Donor-Information-Collection-Policy-1.pdf.
  66. Duke University Libraries, “Privacy Statement.”
  67. Montana State University Library, “Montana State University Privacy Policy,” www.lib.montana.edu/privacy-policy/.
  68. Texas Tech University Libraries, “Personally Identifiable Information,” TTU Libraries’ Privacy Policy, https://www.depts.ttu.edu/library/about/admin/privacy_policy.php.
  69. Syracuse University Libraries, “Privacy Policy.”
  70. Fairbanks North Star Borough Public Libraries, “Borrowing Services,” Policies and Procedures, last updated November 21, 2018, https://fnsblibrary.org/about/polpro/.
  71. Geauga County Public Library, “Retention of Circulation Records,” Geauga County Public Library Operating Policy Manual, December 17, 2019, http://divi.geaugalibrary.net/wp-content/uploads/2020/01/712-Retention-of-Records.pdf.
  72. Las Vegas–Clark County Library District, “Patron Privacy Policy.”
  73. Cornell University Library, “Library Practices on the Collection, Use, Disclosure, Maintenance and Protection of Personally-Identifiable Information,” https://www.library.cornell.edu/practices.
  74. University of California San Diego Library, “Privacy Policy,” last updated August 24, 2004, https://library.ucsd.edu/about/policies/privacy-policy.html.
  75. Southern Illinois University Morris Library, “Patron Privacy Policy,” December 2, 2015, https://lib.siu.edu/about/policies/patron-privacy-policy.php.
  76. San Diego State University Library, “Freedom of Access and Privacy.”
  77. Rutgers University Libraries, “Privacy Policy.”
  78. Ann Arbor District Library, “Privacy Statement Policy.”
  79. Nashville Public Library, “Social Media and Blog Guidelines for Using, Commenting, and More,” https://library.nashville.org/about/policies/social-media-and-blog-guidelines.
  80. Berkshire Athenaeum, “Social Networking Policy; Computer Services Policy,” 2010, https://static1.squarespace.com/static/5c7eed16e8ba44443d295e02/t/5cb17e4ae5e5f08d01334279/1555136074569/BA_SocialNetworkingPolicy.pdf.
  81. Jessamine County Public Library, “Social Media Policy,” last updated September 25, 2019, https://jesspublib.org/wp-content/uploads/3.5-Social-Media-Policy-2019-09-25.pdf.
  82. Ann Arbor District Library, “Privacy Statement Policy.”
  83. Genesee District Library, “GDL Policy 5.9: Fundraising,” Policy Manual (Flint, MI: Genesee District Library, 2016), https://www.thegdl.org/wp-content/uploads/Policies/Policy-Manual-for-Website.pdf.
  84. Ocean County Library, “Camera Surveillance,” Policies, Fees, and Forms, last updated April 19, 2016, https://theoceancountylibrary.org/policies-fees-forms.
  85. Jessamine County Public Library, “Security Camera Policy,” last updated August 18, 2010, https://jesspublib.org/wp-content/uploads/4.2-Security-Camera-Policy-2010-8-18.pdf.
  86. Alpha Park Public Library District, “Security/Surveillance System Policy,” Alpha Park Public Library District Policies, October 21, 2019, www.alphapark.org/images/webpolicies/securitysurveillancesystempolicy.pdf.
  87. University of Oregon Libraries, “Security Cameras—Unit Level Policy,” last updated June 20, 2016, https://library.uoregon.edu/policies/security_cameras.
  88. University of North Carolina at Chapel Hill Libraries, “Privacy Policy.”
  89. Genesee District Library, “GDL Policy 4.7: Photography and Video Recording,” Policy Manual (Flint, MI: Genesee District Library, 2016), https://www.thegdl.org/wp-content/uploads/Policies/Policy-Manual-for-Website.pdf.
  90. St. Louis Public Library, “Photography, Filming and Videography Policy,” 2013, https://www.slpl.org/service-policies/filming-and-photography-policy/.
  91. University of Denver Libraries, “Your Privacy.”
  92. Ann Arbor District Library, “Privacy Statement Policy.”

Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy