Approved by Westerly Library and Wilcox Park Board of Trustees September 20, 2022.
- Information Collection
- Information You Provide.
We collect information from you in several ways, including when you choose to share information with us through use of library computers, use of all electronic and print resources the library offers, use of all items printed on 3D printers, and use of other items related to library programs and services through one of the library’s electronic resources. This information may include information that identifies you personally, such as your first and last name, e-mail address, payment information, mailing and billing addresses, credit card information, date of birth, and telephone number.
- Donor Information
To the extent any donations are processed through a third-party service provider, our donors’ information (name, address, payment card information, and amount and timing of donations) will only be used for purposes necessary to process the donation, and by us for our donor communication and cultivation purposes.
- Automated Information Collection
In addition to any information that you choose to submit to us via our Website, we and our third-party service providers may use a variety of technologies that automatically (or passively) store or collect certain information whenever you visit or interact with our Website (“Usage Information”). This Usage Information may be stored or accessed using a variety of technologies that may be downloaded to your Device whenever you visit or interact with our Website. To the extent we associate Usage Information with your Personal Information we collect directly from you through our Website, we will treat it as Personal Information.
This Usage Information may include:
- your IP address, UDID or other unique identifier (“Device Identifier”). A Device Identifier is a number that is automatically assigned to your Device used to access our Website, and our computers identify your Device by its Device Identifier;
- your Device functionality (including browser, operating system, hardware, mobile network information);
- the URL that referred you to our Website;
- the areas within our Website that you visit and your activities there, including remembering you and your preferences;
- your Device location;
- your Device characteristics; and
- certain other Device data, including the time of day, among other information.
Tracking Technologies. We may use various methods and technologies to store or collect Usage Information (“Tracking Technologies”). Tracking Technologies may set, change, alter or modify settings or configurations on your Device. A few of the Tracking Technologies include, without limitation, the following (and subsequent technology and methods later developed):
- Cookies. A cookie is a data file placed on a Device when it is used to visit our website. HTML5 cookies can be programmed through HTML5 local storage.
- Web Beacons. Small graphic images or other web programming code called web beacons (also known as “1×1 GIFs” or “clear GIFs”) may be included in our Website’s pages and messages. Web beacons may be invisible to you, but any electronic image or other web programming code inserted into a page or e-mail can act as a web beacon. Web beacons or similar technologies may be used for a number of purposes, including, without limitation, to count visitors to our Website, to monitor how users navigate our Website, to count how many e-mails that were sent were actually opened or to count how many particular articles or links were actually viewed.
- Embedded Scripts. An embedded script is programming code that is designed to collect information about your interactions with our Website, such as the links you click on. The code is temporarily downloaded onto your Device from our web server or a third-party service provider, is active only while you are connected to our Website and is deactivated or deleted thereafter.
- Browser Fingerprinting. Collection and analysis of information from your Device, such as, without limitation, your operating system, plug-ins, system fonts and other data, for purposes of identification.
- ETag, or Entity Tag. A feature of the cache in browsers. It is an opaque identifier assigned by a web server to a specific version of a resource found at a URL. If the resource content at that URL ever changes, a new and different ETag is assigned. Used in this manner ETags are a form of Device Identifier. ETag tracking may generate unique tracking values even where the consumer blocks HTTP, and/or HTML5 cookies.
- Recognition Technologies. Technologies, including application of statistical probability to data sets, which attempt to recognize or make assumptions about users and devices (e.g., that a user of multiple devices in the same user).
- Tracking Technologies Usage. We may use Tracking Technologies for a variety of purposes, including:
- Targeting‑Related. We may use Tracking Technologies to deliver content relevant to your interests on our Website and third party sites based on how you interact with our content. This includes using Tracking Technologies to understand the usefulness of the content delivered to you.
- Use of Collected Information
Confidentiality extends to all records with identifying information about patrons, including their borrowing records, requests for information, materials, and their loan transactions. The library will keep patron records confidential and will not disclose this information except as necessary to library staff and vendors for the proper operation of the library, upon consent of the user, pursuant to a subpoena or court order, or as otherwise required by law.
The only exception to this policy is for borrowers under the age of 13. Parents or legal guardians of children under age 13 may have access to information on their child's library card. Parents or legal guardians of 13-17 year olds may have access to their child’s library record to settle their child’s financial obligations. In accordance with the Child Online Privacy Protection Act, in the event that we learn that we have collected personal information from a child under age thirteen (13) without verification of parental consent; we will delete that information as quickly as possible. If you believe that we might have any personal information from or about a minor, please contact us at email@example.com Please see below for further information concerning the collection of children’s information.
- Information Sharing
- Links to Third-Party Websites
Our website may include links to third-party websites or other online services. We are not responsible for these other sites and services, and they may collect and use information about you. You should review the privacy policies for such third parties before using their sites or services to understand how they collect and use information.
- Third-Party Tracking and Do Not Track
- Analytic Services and Targeted Ads
We use third-party analytics services, like Google Analytics, to collect, monitor and analyze data we collect through our Website to better understand how our Website is used and to improve its functionality. These services may track details about your online activities over time and across different websites. These services may also allow us and others to provide you with targeted advertisements or other content that you may be interested in based on your online activities.
The Google Analytics service tracks and reports website traffic and provides us insight into behavior information relating to visitor age, gender and interests. Google Analytics Demographics and Interest Reporting give us insight into behavior to help us understand browsing behavior and give you a better experience when you visit our website. You can opt-out of Google Analytics for Display Advertising and customize Google Display Network ads using the Ads Settings.
These third-party services have their own privacy policies addressing how they use such information. We recommend you review their privacy policies. If you want to prevent your data from being used by Google Analytics, you may wish to take advantage of Google Analytics' currently available opt-outs for the web.
If you would like to learn more about targeted ads that may be based on your online activities, and the choices that you may exercise for certain sites and advertisers, you may wish to visit the Network Advertising Initiative or the Digital Advertising Alliance.
- Information Protection
We use reasonable and standard security technologies and safeguards to protect the information that we collect and use. We do not currently encrypt emails sent to Westerly Library and Wilcox Park. As a result, please do not send email to us containing information you consider sensitive.
- Changing Information and Communication Preferences
You are responsible for maintaining the accuracy of the information you submit to us, such as personal information provided for use of items related to library services.
If you do not wish to receive any material or contact from Westerly Library and Wilcox Park, please contact firstname.lastname@example.org. Once we receive your request, we will remove your information from future communications.
- Users Outside of the United States
- Children’s Privacy
Our sites and applications are intended for general audiences, and we do not knowingly seek or collect personal information from children under the age of eighteen (18). In accordance with the Child Online Privacy Protection Act, in the event that we learn that we have collected personal information from a child under age thirteen (13) without verification of parental consent, we will delete that information as quickly as possible. If you believe, we might have any personal information from or about a minor, please contact us at email@example.com
- Contact Us