Ithaka is committed to protecting the privacy of the users of its website. To better inform you of our policy concerning user privacy, we have adopted the following guidelines.
The Information Ithaka Collects
Ithaka collects no personally identifiable information. Thus, you can perform all of the functions on the Ithaka website without providing Ithaka with any personally identifiable information. By visiting the Ithaka site, however, you necessarily provide us with an IP address, which does not identify you personally, but enables Ithaka to communicate with your computer while you are visiting the site. If you send an email to us at firstname.lastname@example.org or any other email address provided on the Ithaka website, you also necessarily provide us with an email address to which we can reply.
Use of the Information
We use the information you provide to facilitate your use of the Ithaka website, to respond to your inquiries about Ithaka, to improve the design of our site, for system administration and troubleshooting purposes, and to track and analyze site usage.
We have physical, electronic, and managerial measures in place to prevent unauthorized access to the above user information. We do not, however, claim any responsibility for information collected by or from websites linking to or from Ithaka. These sites may have their own privacy policies, or no policies at all. We encourage you to read the privacy policies of these other sites before providing them with any personally-identifying information.
Ithaka does not share user information unless required to do so by law, or unless we believe in good faith that such action is necessary to comply with the law or a legal proceeding, or to protect and defend our rights and property or the rights and property of contributors to the Ithaka website.
Upon request, Ithaka will remove from our database personal information you provided.
Access and Correction
If you would like to review or update your information, you may contact us using the contact information below. We will take reasonable steps to permit you to correct, amend, or delete information that is demonstrated to be inaccurate. Please note, because of the way we maintain certain services, after you delete or amend your information, residual copies may take a period of time before they are deleted from our active servers and may remain in our backup systems.
You will need to provide sufficient identifying information, such as your name and email address and possible additional identifying information as a security precaution. We may limit or deny access to personal information where providing such access would be unreasonably burdensome or expensive under the circumstances, or as otherwise permitted by the Safe Harbor Principles.
Enforcement and Dispute Resolution
Any claim arising out of or relating to our adherence to the Safe Harbor Principles, or the breach thereof, that cannot be resolved through our internal processes will be settled by arbitration administered by the American Arbitration Association in accordance with its applicable commercial rules. Any arbitrator will be either an attorney or retired judge having significant and recognized experience with and knowledge of privacy issues and information technology. The arbitration panel should apply New York law, without regard to its conflict of laws principles, as well as the Safe Harbor Enforcement Principles issued by the U.S. Department of Commerce (http://www.export.gov/safeharbor/eg_main_018247.asp). In addition, the exclusive location for such arbitration will be New York, New York. All decisions of the arbitration panel will be final and binding on the parties, which waive any right to further appeal the arbitration award, to the extent an appeal may be lawfully waived.
As a not-for-profit organization, we are not subject to the jurisdiction of the United States Federal Trade Commission, which oversees the implementation of Safe Harbor Principles; however, we agree to adhere to the Safe Harbor Principles in recognition of their importance in ensuring the protection of user information.