{"id":12776,"date":"2025-10-28T10:24:49","date_gmt":"2025-10-28T14:24:49","guid":{"rendered":"https:\/\/libraries.mercer.edu\/?page_id=12776"},"modified":"2025-10-28T10:26:19","modified_gmt":"2025-10-28T14:26:19","slug":"privacy-policy-2","status":"publish","type":"page","link":"https:\/\/libraries.mercer.edu\/index.php\/university-libraries\/mercer-university-libraries-policies\/privacy-policy-2\/","title":{"rendered":"Privacy Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12776\" class=\"elementor elementor-12776\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ddd62b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ddd62b8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fd10d3f\" data-id=\"3fd10d3f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ff8b207 elementor-widget elementor-widget-heading\" data-id=\"2ff8b207\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Privacy Policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ec3b7c6 elementor-widget elementor-widget-text-editor\" data-id=\"2ec3b7c6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"row\"><div class=\"col-xs-12 col-sm-12\"><article id=\"content\"><div id=\"content-core\"><div><p><strong>Analytics<\/strong><\/p><p>We collect and store only the following information about you: the name of the domain from which you access the Internet, the date and time you access our site, and the Internet address of the Web site from which you linked to our site. We use the information we collect to measure the number of visitors to the different sections of our site and to help us make our site more useful to visitors.\u00a0<\/p><p>No personal information maintained by the Libraries is sold to third parties.<\/p><p><strong>Cookies<\/strong><\/p><p>This website may use cookies to collect information about your computer, including your IP address, operating system, and browser type. By using this website, you agree to the use of cookies for tracking and statistical data purposes. We do not collect any personally identifiable information.<\/p><p><strong>Anonymization<\/strong><\/p><p>Anonymization removes sensitive information for the purpose of privacy protection. This procedure modified a data set so that individuals reflected are anonymous. Mercer University Libraries anonymizes Circulation data after 14 days.<\/p><p><strong>Embedded content from other websites<\/strong><\/p><p>Articles on this site may include embedded content (e.g., videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.<\/p><p>These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.<\/p><p><strong>Contacting Us<\/strong><\/p><p>You also may decide to send us personally identifying information, for example, in an e-mail or via chat containing a question or comment, or by filling out a form that provides us this information. We use personally identifying information from email primarily to respond to your requests. We may forward your email to other employees who are better able to answer your questions.\u00a0Responses to information and reference questions may reside on secure servers for a period of time.\u00a0<\/p><p>We will not obtain personally identifying information about you when you visit our site unless you choose to provide such information to us. Providing such information is strictly voluntary. Except as might be required by law, we do not share any information we receive with any outside parties.<\/p><p><strong>Circulation Privacy <\/strong><\/p><p>Mercer University Libraries strives to protect the privacy of all patrons in compliance with federal and state laws, as well as professional standards. Basic patron privacy dictates an individual\u2019s right to read anonymously. As a result, library staff members hold in confidence all information about individual library users and their choices of resources and materials. Mercer University Libraries will not reveal personally identifiable information of patrons or reveal what information sources or services they consult.<\/p><p>Reasons for disclosure include:<\/p><ul><li>Being required by search warrant or subpoena.<\/li><li>If there is a substantiated reason to believe that violation of law or University policies have taken place<\/li><li>When failure to act might result in significant bodily harm or property loss<\/li><\/ul><p>This policy applies to all resources regardless of format or means of delivery and all services offered by Mercer University Libraries. This policy abides by the following:<\/p><p><u>Rights of Library Users (issued by the American Library Association)<\/u><\/p><p>Lack of privacy and confidentiality has a chilling effect on users&#8217; selection, access to, and use of library resources. All users have a right to be free from any unreasonable intrusion into or surveillance of their lawful library use. ALA and its members recognize that children and youth have the same rights to privacy as adults. Library users expect, and in many places have, a legal right to have their personally identifiable information and library-use data protected and kept private and confidential by anyone with access to that information. Libraries should never enact policies or practices that abridge users\u2019 right to privacy regardless of their age, ability, housing status, immigration status, involvement with the criminal justice system, religious affiliation, ethnicity, sexual orientation, gender identity, or other forms of identity or status unless explicitly required by law. Even then, libraries should consult with legal counsel before abridging any user\u2019s right to privacy.<\/p><p>Libraries have a responsibility to inform users about policies and practices governing the collection, security, and retention of personally identifiable information and library use data.<\/p><p>Additionally, users should have the choice to opt-in to any data collection that is not essential to library operations and the opportunity to opt-out again at any future time. All nonessential data collection should be turned off by default. In all areas of librarianship, best practice leaves users in control of as many choices as possible regarding their privacy. This includes decisions about the selection of, access to, and use of information. Information about options available to users should be prominently displayed, accessible, and understandable for a general audience.<\/p><p><u>State of Georgia Law (O.C.G.A. \u00a7 24-12-30, current as of 4\/14\/21)<\/u><\/p><p>(a)\u2002Circulation and similar records of a library which identify the user of library materials shall not be public records but shall be confidential and shall not be disclosed except:<\/p><p>(1)\u2002To members of the library staff in the ordinary course of business.<\/p><p>(2)\u2002Upon written consent of the user of the library materials or the user&#8217;s parents or guardian if the user is a minor or ward;\u2009or<\/p><p>(3)\u2002Upon appropriate court order or subpoena.<\/p><p>(b)\u2002Any disclosure authorized by subsection (a) of this Code section, or any unauthorized disclosure of materials made confidential by subsection (a) of this Code section shall not in any way destroy the confidential nature of that material, except for the purpose for which an authorized disclosure is made. A person disclosing material as authorized by subsection (a) of this Code section shall not be liable therefor.<\/p><\/div><\/div><\/article><\/div><\/div><footer class=\"row\"><\/footer>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-554ce29f elementor-widget elementor-widget-button\" data-id=\"554ce29f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/libraries.mercer.edu\/wp-content\/uploads\/2025\/10\/Privacy_Policy.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-pdf\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-293d394d elementor-widget elementor-widget-spacer\" data-id=\"293d394d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Privacy Policy Analytics We collect and store only the following information about you: the name of the domain from which you access the Internet, the date and time you access our site, and the Internet address of the Web site from which you linked to our site. We use the information we collect to measure [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":737,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Kathryn Thompson","author_link":"https:\/\/libraries.mercer.edu\/index.php\/author\/kathompson\/"},"uagb_comment_info":0,"uagb_excerpt":"Privacy Policy Analytics We collect and store only the following information about you: the name of the domain from which you access the Internet, the date and time you access our site, and the Internet address of the Web site from which you linked to our site. We use the information we collect to measure&hellip;","_links":{"self":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/12776"}],"collection":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/comments?post=12776"}],"version-history":[{"count":19,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/12776\/revisions"}],"predecessor-version":[{"id":12795,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/12776\/revisions\/12795"}],"up":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/737"}],"wp:attachment":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/media?parent=12776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}