30 Jan 2009 - 13 Feb 2022
JSTORSkip to Main ContentClick to Show/Hide NavigationSkip to Main Content
You are not currently logged in through a participating institution or individual account. See the login page
for more information.
This privacy statement describes how ITHAKA collects and uses the personal information you provide on our Web sites: www.ithaka.org
. It also describes the choices available to you regarding our use of your personal information and how you can access and update this information. ITHAKA is committed to protecting the privacy of users of its website and services, including users of JSTOR and JSTOR-branded services (Current Scholarship Program, Individual Access, Publisher Sales Service), Ithaka S+R, JSTOR Global Plants and Portico (collectively, "ITHAKA Websites"). To better inform you of our policy concerning user privacy, we have adopted the following terms, which adhere to the Safe Harbor Principles issued by the U.S. Department of Commerce.
including transparency, accountability and choice regarding the collection and use of your personal information. The TRUSTe program covers information collected through these Web sites, www.ithaka.org
. If you are not satisfied with our response you can contact TRUSTe here
The Information ITHAKA Collects
ITHAKA does not knowingly collect personally identifiable information from anyone under the age of 13. If it is discovered that we have collected PII from someone under 13 we will delete that information immediately.
Data Integrity; Use of the Information
We use the personal information collected in ways that are compatible with the purposes for which it was intended to be used: to enable your use of ITHAKA Websites and ITHAKA's services; to facilitate the Publisher Sales Service; to create your MYJSTOR and/or a MyPlants account; to facilitate your purchase of ITHAKA-branded merchandise; to respond to your inquiries; for system administration, customer support, and troubleshooting purposes; and product service announcements; for sending newsletters; to improve the design of ITHAKA Websites; to enable us to enforce our JSTOR Terms and Conditions of Use
and the Portico Terms and Conditions of Use
; and in aggregate form, to track and analyze site usage. Further, in connection with postings you may make that are available to the general public on any ITHAKA-related page on social networking sites, including but not limited to statements made on the JSTOR page on Facebook and on Twitter, we may use your name, statement, comment, and affiliation in conference presentations, ITHAKA's (including JSTOR's and Portico's') newsletters, and marketing and announcement materials. ITHAKA will take reasonable steps to ensure that personal information is relevant to its intended use, accurate, complete, and current. If you wish to opt out of our use of your personally identifiable information see the "Your Consent;Opting out" section below.
In addition, ITHAKA and/or third party service providers may use technologies such as cookies to gather information about your activities on the Ithaka Websites in order to provide you advertising for other JSTOR products or services or our relevant Publisher partner products or services based upon your location, browsing activities and interests. If you wish to not have this information used for the purpose of serving you interest-based ads, you may opt-out by clicking here
. Please note that if you opt-out you will continue to see generic advertising and messages for JSTOR products or services or Publisher partner products or services.
Other Tracking Technologies
As is true of most web sites, ITHAKA gathers certain information automatically and stores it in log files. This information may include internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and/or clickstream data.
Technologies such as: web beacons, tags and scripts are used by ITHAKA and third party service and analytics providers. These technologies are used in analyzing trends, administering the site, tracking users’ movements around the site and to gather demographic information about our user base as a whole for the purposes of gathering analytics and improving site performance. We may receive data on the use of these technologies by these partners on an individual as well as aggregated basis.
Third parties with whom we partner to provide certain features on our site based upon your browsing activity on the site use Local Stored Objects (“LSOs”) such as HTML 5 or Flash to collect and store information. Various browsers may offer their own management tools for removing HTML5 LSOs. To manage Flash LSOs please click here.
Onward Transfer of Information
ITHAKA may work with other organizations that provide specific services for us, such as credit card processing. We will provide only the personal information necessary for the third party to provide these services for us. These organizations may not use personal information except for the purpose of providing these services.
ITHAKA does not sell or share personal information about or the purchasing history of individual users, except as set forth above and in the following circumstances:
- if required to do so by law or if we believe in good faith that such action is necessary to comply with the law or a legal proceeding; to protect against violations of our Terms and Conditions of Use; or to protect and defend our rights and property or the rights and property of rights holders whose content is made available through ITHAKA Websites;
- with service providers with whom we have entered into agreements to assist us with our business operations;
- if ITHAKA is involved in a merger, acquisition, or sale of all or a portion of its assets, you will be notified via email and/or a prominent notice on our Web site of any change in ownership or uses of your personal information, as well as any choices you may have regarding your personal information;
- if you are accessing JSTOR through a token provided by your institution, on request from the institution solely for user verification purposes by the institution that provided the token; and other third parties, such as an institution with which you are affiliated, where you explicitly consent to our sharing your information.
In addition, ITHAKA shares general usage data in aggregated form so that no personal information is identifiable to participating institutions, content providers, researchers, and the general public. ITHAKA will provide you all of your retained personal information provided at registration (where applicable) on request.
Your Consent; Opting Out
By using ITHAKA Websites, you consent to the collection and use, in accordance with this policy, of the information you provide to us. We will remove you and your personally identifiable information from our records or refrain from using your personally identifiable information in connection with certain services on request if you contact us with your request at email@example.com
. Please note that this may prevent you from accessing ITHAKA's services, including JSTOR, MyJSTOR, and the Publisher Sales Service.
You may choose to stop receiving our newsletter or marketing emails by following the unsubscribe instructions included in these emails or you can contact us at firstname.lastname@example.org
We protect your personal information from unauthorized access and disclosure through the use of passwords, physical security measures, managerial measures, and (in connection with credit card information for order sales through the Publisher Sales Service, Current Scholarship Program, Individual Access, and for purchase of ITHAKA and its services' brand merchandise) encryption through our third party service providers. We nonetheless recognize that third parties may obtain access to information through unlawful actions, and thus do not promise that your information always will remain private, despite our efforts and the importance we place on maintaining your privacy. In addition, we do not claim any responsibility for information collected by or from websites linking to or from ITHAKA Websites.
In the event that we discover or are notified of a security breach where personal information is at risk, we will notify you electronically if we have your email address. If you do not wish to be notified via email in the event of a breach, please contact us at email@example.com
Access and Correction
If you would like to review, delete or update your information, you may contact us using the contact information below. We will take reasonable steps to permit you to correct, amend, or delete information that is demonstrated to be inaccurate. Please note, because of the way we maintain certain services, after you delete or amend your information, residual copies may take a period of time before they are deleted from our active servers and may remain in our backup systems.
You will need to provide sufficient identifying information, such as your name and email address and possible additional identifying information as a security precaution. We may limit or deny access to personal information where providing such access would be unreasonably burdensome or expensive under the circumstances, or as otherwise permitted by the Safe Harbor Principles.
We will retain your information for as long as your account is active or as needed to provide you services. If you wish to cancel your account or request that we no longer use your information to provide you services contact us at firstname.lastname@example.org
. We will retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.
If you choose to use our referral service to send a citation to a friend, we will ask you for your friend's email address. We will automatically send your friend a one-time email inviting him or her to visit the site. ITHAKA stores this information for the sole purpose of sending this one-time email.
Your friend may contact us at email@example.com
to request that we remove this information from our database.
Enforcement and Dispute Resolution
Any claim arising out of or relating to our adherence to the Safe Harbor Principles, or the breach thereof, that cannot be resolved through our internal processes will be settled by arbitration administered by the American Arbitration Association in accordance with its applicable commercial rules. Any arbitrator will be either an attorney or retired judge having significant and recognized experience with and knowledge of privacy issues and information technology. The arbitration panel should apply New York law, without regard to its conflict of laws principles, as well as the Safe Harbor Enforcement Principles issued by the U.S. Department of Commerce (http://export.gov/safeharbor/eu/eg_main_018475.asp
). In addition, the exclusive location for such arbitration will be New York, New York. All decisions of the arbitration panel will be final and binding on the parties, which waive any right to further appeal the arbitration award, to the extent an appeal may be lawfully waived.
As a not-for-profit organization, we are not subject to the jurisdiction of the United States Federal Trade Commission, which oversees the implementation of Safe Harbor Principles; however, we agree to adhere to the Safe Harbor Principles in recognition of their importance in ensuring the protection of user information.
151 East 61st Street
New York, New York 10065
Last updated on August 28, 2014
JSTOR is part of ITHAKA, a not-for-profit organization helping the academic community use digital technologies to preserve the scholarly record and to advance research and teaching in sustainable ways.
©2000-2015 ITHAKA. All Rights Reserved. JSTOR®, the JSTOR logo, JPASS®, and ITHAKA® are registered trademarks of ITHAKA.