Privacy policy

Privacy is essential to the exercise of free speech, free thought, and free association. The Indiana University libraries define the right to privacy as the right to open inquiry without having the subject of one’s interest examined or scrutinized by others. Confidentiality exists when a library is in possession of personally identifiable information about users and keeps that information private on their behalf.

The courts have recognized a right of privacy based on the Bill of Rights of the U.S. Constitution. The state of Indiana guarantees privacy in its constitution and statutory law. IU Libraries’ privacy and confidentiality policies are intended to comply with applicable federal, state, and local laws, as well as with any IU policies on privacy, including the IU Policy on Privacy of Information Technology Resources.

User rights, as well as the institution's responsibilities, outlined here are based in part on what are known as Fair Information Practice Principles. These five principles outline the rights of Notice, Choice, Access, Security, and Enforcement.

Our commitment to our users’ privacy and confidentiality has deep roots not only in law but also in the ethics and practices of librarianship. In accordance with the American Library Association’s Code of Ethics: "We protect each library user’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired, or transmitted."

This privacy policy explains our users’ privacy and confidentiality rights, the steps this library takes to respect and protect privacy, and how we deal with personally identifiable information that we may collect from our users.

Notice and Openness

The IU Libraries affirm that our library users have the right of “notice”—to be informed about the policies governing the amount and retention of personally identifiable information, and about why that information is necessary for the provision of library services.

The IU Libraries post publicly and acknowledge openly the privacy and information-gathering policies of the IU Libraries. Whenever policies change, notice of those changes is made publicly available. In all cases involving personally identifiable information, it is our policy to avoid creating unnecessary records, to avoid retaining records not needed for the fulfillment of the mission of the library, and to avoid engaging in practices that might place sensitive information on public view.

Information that the IU Libraries may gather and retain about current and valid library users includes, but is not limited to, the following.

  • Circulation information: All information that identifies a user as borrowing specific materials, including reserve materials.
  • Collection development and resource management: Information regarding the request, purchase, transfer, and related collection management requests linked to individual users or groups of users (e.g., departments).
  • Electronic access information: All information that identifies a user as accessing specific electronic resources, whether library subscription resources, electronic reserves, or other Web resources.
  • Interlibrary loan/document delivery: Includes all information that identifies a user as requesting specific materials.
  • Library surveys/assessment projects: Any information or data obtained by any IU library through surveys (group or individual interviews or other means) in support of assessment of services, collections, facilities, resources, etc., or in support of research related to library and information services. Any data collected in the course of research is subject to additional review of privacy and confidentiality protections.
  • Reference/research consultations: Any information regarding the identity of library users, the nature of their inquiry, and the resources that they consult.
  • User registration information: Includes any information the library requires users (faculty, staff, students, or others) to provide in order to become eligible to access or borrow materials. Such information includes addresses, telephone numbers, and identification numbers.

Other Information Required to Provide Library Services

This includes any identifying information obtained to provide library services not previously listed.

Choice and Consent

This policy explains our information practices and the choices users can make about the way the IU Libraries collect and use this information.

To provide borrowing privileges, we must obtain certain information about our users in order to give them a library account. If users are affiliated with Indiana University, the library automatically receives personally identifiable information (name, address, e-mail address, student, faculty, or staff status, identification number, etc.) in order to create and update their library account from the Office of Registrar Services(for students) or the Office of Personnel Administration (for employees). When visiting the library’s Web pages and using electronic services, users may choose to provide their name, e-mail address, library card barcode, phone number, or home address.

Users who are not affiliated with Indiana University have the option of providing us with their e-mail address for the purpose of notifying them about their library account. At any time users may request that we remove their e-mail address from their record.

The IU Libraries never use or share the personally identifiable information provided to us in ways unrelated to the ones described above without also providing users an opportunity to prohibit such unrelated uses, unless we are compelled to do so under the law. Our goal is to collect and retain only the information we need to provide library-related services. The IU Libraries strive to keep all personally identifiable information confidential and do not sell, license, or disclose personal information without consent unless compelled to do so under the law or as necessary to protect library resources or conduct necessary library operations.

We attempt to fulfill all requests made by individuals who use library services that require the provision of personally identifiable information and to update their information through proper channels. Users may be asked to provide some sort of verification (e.g., PIN number, photo or network identification card, etc.) to ensure verification of identity.

Data Integrity and Security

The data we collect and maintain at the library must be accurate and secure. Although no method can guarantee the complete security of data, we take steps to protect the privacy and accuracy of user data in the following ways:

  • Data integrity: We take reasonable steps to assure data integrity, including: using only reputable sources of data, providing our users access to their own personally identifiable data; updating data whenever possible, utilizing middleware authentication systems that authorize use without requiring personally identifiable information, destroying untimely data or converting it to anonymous form.
  • Data retention: We regularly review and purge personally identifiable information once it is no longer needed to manage library services. Information that is regularly reviewed for purging includes, but is not limited to, personally identifiable information on library resource use, material circulation history, and security/surveillance tapes and logs.

Indiana University libraries are committed to investing in appropriate technology to protect the security of personally identifiable information while it is in the library’s custody. The IU libraries follow university policy for the retention of data, and access to data is restricted to a small number of authorized university computing personnel. The IU libraries post announcements about the choice users make in signing up for customized or personalized services related to Web and database services.

  • Services that require user login: In-library computers allow guest use of most library resources without logging in. Use of the full resources of the web and of the full power of some subscription databases requires that a user log on to the workstation, either with his/her network ID and password or with a special guest account the user obtains from the library. Data about which users were connected to which machine is collected, in accordance with university policy, and kept for a limited time with very limited access by staff. Users of electronic resources that require authorization for their use are also asked to log in when they connect from outside the university IP address ranges. The data kept from these transactions does not include information linking the user to the resources to which the user connected or about searches completed and records viewed.
  • Cookies: Cookies are used by IUCAT to maintain the persistence of a default library search limit. These cookies are session cookies and are removed when the user exits the catalog and closes the browser. Some licensed databases also use cookies to remember information and provide services while the user is online. Users must have cookies enabled to use these resources.

We are committed to working with vendors of library resources to find solutions that respect the user’s privacy and we include a review of the privacy policy espoused by the vendor in purchasing decisions. We provide users with information about the risks of providing personally identifiable information so that they can make reasonable choices about use of personalized services from vendors of electronic library materials. We discourage users from choosing passwords or PINs that could reveal their identity, including Social Security numbers. We regularly remove cookies, Web history, cached files, and other use records from library computers and networks.

  • Security measures: Our security measures involve both managerial and technical policies and procedures to protect against loss and the unauthorized access, destruction, use, or disclosure of the data. Our managerial measures include internal organizational procedures that limit access to data and prohibit those individuals with access from utilizing the data for unauthorized purposes. Our technical security measures to prevent unauthorized access include encryption in the transmission and storage of data; limits on access through use of passwords; and storage of data on secure servers or computers that are inaccessible from a modem or network connection.
  • Staff access to personal data: We permit only authorized library staff with assigned confidential passwords to access personal data stored in the library’s computer system for the purpose of performing library work. The IU Libraries will not disclose any personal data collected from users to any other party except where required by law, to report a suspected violation of law or university policy, or to fulfill an individual user's service request. We do not sell or lease users' personal information to commercial enterprises, organizations, or individuals.

Enforcement and Redress

Indiana University libraries will not make library records available to any agency of state, federal, or local government unless required to do so under law or to report a suspected violation of the law. Nor will we share data on individuals with other parties including faculty, staff (including library staff except in the performance of their assigned duties), parents, students, campus security, and law enforcement personnel, except as required by law or university policy or as needed to perform our university duties.

Library staff are to refer all requests for confidential user records to the appropriate library dean or director or their designate. Only the library dean/director or designate has authorization to receive and respond to requests from law enforcement or other third parties. The dean/director will forward all requests from law enforcement or other government officials, all requests under applicable “open records” laws, to university counsel, and will consult with counsel regarding the proper response. Each library within Indiana University will develop written procedures to comply with this policy.

We conduct regular privacy audits in order to ensure that all library programs and services are enforcing our privacy policy. Library users who have questions, concerns, or complaints about the library’s handing of their personally identifiable data should file written comments with the director of the library in question. We will respond in a timely manner and may conduct a privacy investigation or review our policy and procedures.

Library Hours

Summer Hours

Beginning Monday, May 6

Monday - Friday: 8:30 a.m. - 5:00 p.m.
Saturday - Sunday: CLOSED


  • Monday, May 27: CLOSED
  • Wednesday, June 19: CLOSED
  • Thursday-Friday, July 4-5: CLOSED