Information stored on a computer system or sent electronically over a network is the property of the individual who created it. Examination of that information without authorization from the owner is a violation of the owner’s rights to control his or her own property. Systems administrators, however, may gain access to user’s files when it is necessary to maintain or prevent damage to systems or to ensure compliance with other University rules.
Computer systems and networks provide mechanisms for the protection of private information from examination. These mechanisms are necessarily imperfect and any attempt to circumvent them in order to gain unauthorized access to private information (including both stored computer files and messages transmitted over network) will be treated as a violation of privacy and may subject a violator to disciplinary action.
In general, information that the owner would reasonably regard as private must be treated as private by other users. Examples include the contents of electronic mail boxes, the private file storage areas of individual users, and information stored in other areas that are not public. That measures have not been taken to protect such information does not make it permissible for others to inspect it.
On shared and networked computer systems certain information about users and their activities is visible to others. Users are cautioned that certain accounting and directory information (for example, user names and electronic mail addresses), certain records of file names and executed commands, and information stored in public areas, are not private. Nonetheless, such unsecured information about other users must not be manipulated in ways that they might reasonably find intrusive; for example, eavesdropping by computer and systematic monitoring of the behavior of others are likely to be considered invasions of privacy that would be cause for disciplinary action.
TCU does not systematically collect or record names, postal or e-mail addresses, phone numbers, gender identity, or other personally identifying data (the “Personal Data”) from visitors to the Site, unless such data is voluntarily submitted by visitors for the purposes outlined below.
The Guggenheim may compile and provide aggregate statistics about Site visitors, customers, sales, traffic patterns, and related information to third parties, but such information will not specify Personal Data. The Guggenheim collects IP addresses as a component of such aggregate information. Such information could, if necessary, be used to identify a user in order to comply with safety or security issues.
You may set your browser to notify you when you receive a cookie (letting you choose whether to accept it) or to disallow cookies altogether, without preventing your access to the Site.
The Guggenheim may provide certain third party service providers, including Google Analytics Remarketing, the cookies it has obtained in order for such service provider to inform, optimize and serve advertisements on other websites a user visits, based on such user's prior visits to the Site. The Guggenheim directs these service providers to not use the provided cookies for any purpose other than to provide the advertising services explicitly requested by the Guggenheim.
Google permits you to register your preferences (http://www.google.com/ads/preferences);
Google Analytics also provides an opt-out add-on for your browser (https://tools.google.com/dlpage/gaoptout);
The Self-Regulatory Program for Online Behavioral Advertising (http://www.aboutads.info/choices) and the National Advertising Initiative (http://www.aboutads.info/choices) and the National Advertising Initiative (http://www.networkadvertising.org/choices) have websites that allow you to register your choice to opt-out of receiving interest-based advertisements from certain companies that participate in such initiatives.
Any questions concerning this policy should be directed to: firstname.lastname@example.org.