This privacy statement describes how ITHAKA collects and uses the personal information you provide on our websites: www.ithaka.org
. It also describes the choices available to you regarding our use of your personal information and how you can access and update this information. ITHAKA is committed to protecting the privacy of users of its website and services, including users of JSTOR and JSTOR-branded services (Current Scholarship Program, Individual Access, Publisher Sales Service), Ithaka S+R, JSTOR Global Plants and Portico (collectively, "ITHAKA Websites"). To better inform you of our policy concerning user privacy, we have adopted the following terms, which adhere to the Safe Harbor Principles issued by the U.S. Department of Commerce.
If you have an unresolved privacy or data use concern that we have not addressed satisfactorily, please contact our U.S.-based third-party dispute resolution provider (free of charge) at https://feedback-form.truste.com/watchdog/request
The Information ITHAKA Collects
ITHAKA does not knowingly collect personally identifiable information from anyone under the age of 13. If it is discovered that we have collected PII from someone under 13 we will delete that information immediately.
Data Integrity; Use of the Information
We use the personal information collected in ways that are compatible with the purposes for which it was intended to be used: to enable your use of ITHAKA Websites and ITHAKA’s services; to facilitate the Publisher Sales Service; to create your MYJSTOR and/or a MyPlants account; to facilitate your purchase of ITHAKA-branded merchandise; to respond to your inquiries; for system administration, customer support, and troubleshooting purposes; and product service announcements; for sending newsletters; to improve the design of ITHAKA Websites; to enable us to enforce our JSTOR Terms and Conditions of Use and the Portico Terms and Conditions of Use; and in aggregate form, to track and analyze site usage. Further, in connection with postings you may make that are available to the general public on any ITHAKA-related page on social networking sites, including but not limited to statements made on the JSTOR page on Facebook and on Twitter, we may use your name, statement, comment, and affiliation in conference presentations, ITHAKA’s (including JSTOR’s and Portico’s’) newsletters, and marketing and announcement materials. ITHAKA will take reasonable steps to ensure that personal information is relevant to its intended use, accurate, complete, and current. If you wish to opt out of our use of your personally identifiable information see the “Your Consent;Opting out” section below.
In addition, ITHAKA and/or third party service providers may use technologies such as cookies to gather information about your activities on the Ithaka Websites in order to provide you advertising for other JSTOR products or services or our relevant Publisher partner products or services based upon your location, browsing activities and interests. If you wish to not have this information used for the purpose of serving you interest-based ads, you may opt-out by clicking here
. Please note that if you opt-out you will continue to see generic advertising and messages for JSTOR products or services or Publisher partner products or services.
Other Tracking Technologies
As is true of most websites, we gather certain information automatically and store it in log files. This information may include internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and/or clickstream data. We link this automatically collected data to other information we collect about you.
Technologies such as: web beacons, tags and scripts are used by ITHAKA and our affiliates, or analytics or service providers [e.g. technology providers]. These technologies are used in analyzing trends, administering the site, tracking users’ movements around the site and to gather demographic information about our user base as a whole. We may receive reports based on the use of these technologies by these companies on an individual as well as aggregated basis.
We use Local Storage Objects (LSOs) such as HTML5 to store content information and preferences. Third parties with whom we partner to provide certain features on our site or to display advertising based upon your Web browsing activity use LSOs such as HTML 5 or Flash to collect and store information. Various browsers may offer their own management tools for removing HTML5 LSOs. To manage Flash LSOs please click here: http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager07.html
Onward Transfer of Information
ITHAKA may work with other organizations that provide specific services for us, such as credit card processing. We will provide only the personal information necessary for the third party to provide these services for us. These organizations may not use personal information except for the purpose of providing these services.
ITHAKA does not sell or share personal information about or the purchasing history of individual users, except as set forth above and in the following circumstances:
if required to do so by law or if we believe in good faith that such action is necessary to comply with the law or a legal proceeding such as to comply to a subpoena, bankruptcy proceedings or similar legal process; to protect against violations of our Terms and Conditions of Use; or to protect and defend our rights and property or the rights and property of rights holders whose content is made available through ITHAKA Websites;
with service providers with whom we have entered into agreements to assist us with our business operations
if ITHAKA is involved in a merger, acquisition, or sale of all or a portion of its assets, you will be notified via email and/or a prominent notice on our website of any change in ownership or uses of your personal information, as well as any choices you may have regarding your personal information
if you are accessing JSTOR through a token provided by your institution, on request from the institution solely for user verification purposes by the institution that provided the token; and
other third parties, such as an institution with which you are affiliated, where you explicitly consent to our sharing your information.
In addition, ITHAKA shares general usage data in aggregated form so that no personal information is identifiable to participating institutions, content providers, researchers, and the general public. ITHAKA will provide you all of your retained personal information provided at registration (where applicable) on request.
Your Consent; Opting Out
By using ITHAKA Websites, you consent to the collection and use, in accordance with this policy, of the information you provide to us. We will remove you and your personally identifiable information from our records or refrain from using your personally identifiable information in connection with certain services on request if you contact us with your request at email@example.com
. Please note that this may prevent you from accessing ITHAKA's services, including JSTOR, MyJSTOR, and the Publisher Sales Service.
You may choose to stop receiving our newsletter or marketing emails by following the unsubscribe instructions included in these emails or you can contact us at firstname.lastname@example.org
We protect your personal information from unauthorized access and disclosure through the use of passwords, physical security measures, managerial measures, and (in connection with credit card information for order sales through the Publisher Sales Service, Current Scholarship Program, Individual Access, and for purchase of ITHAKA and its services’ brand merchandise) encryption. We nonetheless recognize that third parties may obtain access to information through unlawful actions, and thus do not promise that your information always will remain private, despite our efforts and the importance we place on maintaining your privacy. In addition, we do not claim any responsibility for information collected by or from websites linking to or from ITHAKA Websites.
In the event that we discover or are notified of a security breach where personal information is at risk, we will notify you electronically if we have your email address. If you do not wish to be notified via email in the event of a breach, please contact us at email@example.com
Access and Correction
If you would like to review, delete or update your information, you may contact us using the contact information below. We will take reasonable steps to permit you to correct, amend, or delete information that is demonstrated to be inaccurate. We will respond to your request within a reasonable timeframe. Please note, because of the way we maintain certain services, after you delete or amend your information, residual copies may take a period of time before they are deleted from our active servers and may remain in our backup systems.
You will need to provide sufficient identifying information, such as your name and email address and possible additional identifying information as a security precaution. We may limit or deny access to personal information where providing such access would be unreasonably burdensome or expensive under the circumstances, or as otherwise permitted by the Safe Harbor Principles.
We will retain your information for as long as your account is active or as needed to provide you services. If you wish to cancel your account or request that we no longer use your information to provide you services contact us at firstname.lastname@example.org
. We will retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.
We display personal testimonials of participants on our website in addition to other endorsements. With your consent, we may post your testimonial along with your name. If you wish to update or delete your testimonial, you can contact us at email@example.com
Enforcement and Dispute Resolution
Any claim arising out of or relating to our adherence to the Safe Harbor Principles, or the breach thereof, that cannot be resolved through our internal processes will be settled by arbitration administered by the American Arbitration Association in accordance with its applicable commercial rules. Any arbitrator will be either an attorney or retired judge having significant and recognized experience with and knowledge of privacy issues and information technology. The arbitration panel should apply New York law, without regard to its conflict of laws principles, as well as the Safe Harbor Enforcement Principles issued by the U.S. Department of Commerce. In addition, the exclusive location for such arbitration will be New York, New York. All decisions of the arbitration panel will be final and binding on the parties, which waive any right to further appeal the arbitration award, to the extent an appeal may be lawfully waived.
As a not-for-profit organization, we are not subject to the jurisdiction of the United States Federal Trade Commission, which oversees the implementation of Safe Harbor Principles; however, we agree to adhere to the Safe Harbor Principles in recognition of their importance in ensuring the protection of user information.
2 Rector Street, 18th Floor
New York, New York 1006
Last updated on August 31, 2016