Your privacy is important to us and we do everything we can to protect and respect your personal information and keep your library records confidential. The library strives to collect the least amount of personally identifiable information we can and avoids creating unnecessary records.

The Library follows Pennsylvania State Lawswhich require public libraries to guarantee the privacy of user records.

This website uses cookies. You will need to update your browser settings if you do not wish to accept cookies. Learn more, including how to opt out and how information and ad targeting are used, by visiting:

Pages on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Note: Some online services offered by the library are serviced by third-party vendors, and some links may lead to third-party websites. These third parties have their own privacy policies and terms of service, and they are not beholden to the library’s privacy policies or terms or service.

The library works with third-party vendors to provide online learning, digital collections, streaming media content, analytics, and more. These third-party vendors include providers like Overdrive/Libby, Kanopy, Hoopla, Facebook, Instagram, and LibCal.

When you leave the library website or interact with embedded content, your interaction with these systems will be governed by their individual privacy policies. Some of these vendors may collect and share information you provide to them or require you to create a personal account in order to use their services.

Check the vendor’s privacy statement and terms of service to learn more about how your data is tracked, stored, and used by them. We have provided links to individual privacy policies and terms of statements for a majority of our third-party vendors for your review:

The library collects both personally identifiable information (PII) and anonymous information in order to provide library service to users. 

Personally identifiable information is any information that could potentially identify a specific individual. The library strives to collect the least amount of personally identifiable information possible in order to provide services. We avoid creating unnecessary records. The personally identifiable information collected by the library could include:

  • Name
  • Address
  • Telephone Number
  • Email address
  • Date of Birth
  • Library barcode number
  • Items currently checked-out, requested, canceled holds, and interlibrary loans
  • Overdue items (until returned)
  • Fine history
  • Sign-up information for library classes and events

Anonymous information is information that does not specifically identify an individual. The anonymous information collected by the library could include:

  • URL (uniform resource locator) of the web site you visited previous to the library’s website
  • Domain names and/or IP addresses (numbers automatically assigned to your computer whenever you are connected to the internet)
  • The browser version you are using to access the web site
  • Hardware and software type and language
  • Cookie data
  • Date and time of requests
  • Demographic data
  • Interaction data
  • Page Views, click data, and navigation flow

Who has access to it?

All library user records are confidential. Library records may only be disclosed to:

  • Library staff performing job duties
  • Cardholders upon proof of identity
  • Anyone with the library card number
    • Only share your card number with people you trust and report lost or stolen cards immediately
  • Law enforcement with a valid subpoena, national security letter, or warrant

The library does not keep a record of your borrowing history beyond operational requirements. Once you return an item, it is removed from your account. Items with lost or damaged fees will remain on your account until paid. 

Barcode technology is used to check out library materials, keep a record of the library collection, and secure the collection from theft. No personal library user or transaction information is on the barcode.