We respect the privacy of website visitors to the extent permitted by law. This online privacy statement is intended to inform users of what information is collected by this website and how the information is used.
Use of links to other websites is subject to the privacy statement of the providers of those websites. We encourage users to be aware when leaving this website and to read the privacy statement on each website visited. Often users can tell when they are leaving our website by looking at the URL of the destination site.
Contact us with questions about this site's collection of information or its online privacy statement.
Non-Personally Identifiable Information
For security purposes and to ensure that the website remains available to all users, we use software to monitor network traffic to identify unauthorized attempts to upload or change information, or otherwise cause damage.
We collect non-personal information about a user's Internet connection on this website, including but not limited to:
- the Internet Protocol (IP) and the name of the Internet domain used to access the Internet
- the IP address or URL of the website from which a user directly linked to this website
- the date and time a user accessed this website
- the pages visited on this website
- the browser and operating system used to access this website
- the search terms used on our search engines
We use this non-personal information to help manage the website and improve service.
Personally Identifiable Information
Some pages on the Minnesota Digital Library website record Personally Identifiable Information when voluntarily supplied by users of the site (for example, feedback/contact forms). We collect and use this data only for the purpose conveyed on the page or form.
Our data gathering and dissemination are governed by state and federal laws, including the Minnesota Government Data Practices Act, Minnesota Statutes, Chapter 13. Personally identifiable information is not released to external parties without your consent unless required by law.
When appropriate, we use encryption technologies, user authentication systems, and access control mechanisms.