Books at Rose

JMU Libraries provides library, educational technology, and instructional design services and resources in four library locations and online. We partner with you to explore ideas, spark creativity, meet your research and scholarship needs, and support teaching and learning. JMU Libraries collects and manages a variety of information, including patron profile information and the use of materials and services. 

  • Patron Profile Information
    we keep information about you, such as your name, address, phone, email, eID, JACard barcode, and university affiliation, as well as a record of fines you have incurred and/or paid. This information is normally retained for two years after the individual leaves the University, or indefinitely if the user has outstanding loans or fines
  • Information on Use of Library Materials and Services
    when you check items out of the library and access articles and databases from third-party providers, we retain data such as your IP address, eID, and information on the materials you requested or accessed. Equipment loan data is kept for a maximum of 30 days or 1 subsequent checkout, whichever comes first. Otherwise, no information is retained once the materials are returned. You can decide whether or not you would like your library catalog checkout history saved through your library account settings in the catalog. Other data collected from Interlibrary Loan transactions (name, address, phone, email, eID, JACard barcode, and university affiliation) and the Special Collections Reading Room (name, address, affiliation, topic of research, and materials requested and accessed) are kept indefinitely
  • Logging Information
    when you interact with library websites, we may record information such as eID, geographic location (country), the technology used, the pages accessed, and the length of your session. In some cases, your IP address is collected. This data is kept for at least 90 days
  • Reference and Workshop Information
    chat reference services collect IP address, the chat transcript, and any identifying information that may be provided by the patron. Email reference services collect name, email, university affiliation, and questions asked. In-person and phone consultation services collect questions asked, answers, eID, and university affiliation.  Workshop and programming services use a registration system that collects name, eID, email, status, and JMU college or unit

Library data is an institutional asset and may be used only by authorized university entities according to strict policy and processes established by the university and in compliance with federal and Virginia law. JMU Libraries uses library data for:

  • Service Support 
    we use transaction records of web interactions to troubleshoot resource access and system problems and provide services to students, faculty, and staff
  • Integration with Teaching and Learning Initiatives
    JMU Libraries collects some data about your use of library resources to help improve its services and integrate them with broader teaching and learning initiatives at JMU  
  • Planning and Institutional Reporting 
    JMU Libraries analyzes data to identify, evaluate, and respond to trends in library services and education. Examples include:
    • Examine and describe library use across campus populations (e.g., faculty, staff and student levels), in order to improve services, create personalized resource pathways, and allocate collection resources;
    • Analyzing patterns in Interlibrary Loan by department to understand the nature of scholarship in various disciplines and how our services can be improved to meet those needs
  • Research 
    summary data may be used for academic research purposes
  • Directly 
    the Libraries receives data directly from you when you complete forms, submit requests, and so on
  • Automatically 
    most of the Libraries' systems generate and store data based on system visits and online interactions with library and third-party resources
  • From External Sources 
    we use Google Analytics, which provides website traffic statistics. We use the information to better understand how library websites are being used and to improve our interface and services

Access to library data is safeguarded through several mechanisms, including university policy, the Institutional Review Board (IRB), professional standards (e.g. American Library Association), and state and federal law.

  • Service Providers 
    The Library engages service providers, such as software vendors, to support library systems and services. For example, when you request and use materials from the Libraries’ Special Collections, your identity and a record of the materials you use are stored on the vendor’s site. We require our service providers to keep your personal information secure and use it only for providing services on the university’s behalf.
  • Third-party/Licensed Content Providers
    The Library offers services and/or content such as online journals and subject databases from third-party vendors. When you follow a link from the library website to a third-party site, your interaction with these systems will be governed by those sites’ individual privacy policies. The majority of content providers rely on IP authentication and the library provides no additional personal information. For a small number of content providers, more information is shared via SSO authentication. This varies per provider and is displayed to the user upon initial access of the site, and periodically thereafter, to confirm that data may be passed along to the provider.
  • Other Research Institutions 
    As part of research grants or projects, the Libraries may share anonymized transaction logs with specific academic institutions and service providers involved in the grant, providing the researchers have obtained IRB approval and established a memorandum of understanding about data use and retention with the Libraries. 

More detailed information can be found in the Libraries’ Privacy Policy.

Personal information may also be shared when required by law, or as permitted by law to protect the safety, property, or rights of the university, its community members and guests.

 

Take Action

Sign in to your library catalog account

Find out More

Questions or feedback about the information found on this website? Send us a message!

Back to Top