Privacy policy and disclaimer

Privacy notice

Who we are

Our website, the Integration and Implementation Insights blog, is located at https://i2insights.org/. The blog is run by a team at The Australian National University (ANU), as an Integration and Implementation Sciences (i2S) project. You can find an introduction to this blog on our ‘About’ page and our contact details as well.

What personal data we collect, why we collect it, what we do with it and what rights you have over your data

There are three systems that determine the way that personal data are controlled on https://i2insights.org/.

First is the website provided by WordPress.com and utilising Akismet, Gravatar and Jetpack services. These services are part of the company Automattic. For a broad overview of how visitor data are dealt with by WordPress, Gravatar, Jetpack and Akismet services, please see: https://automattic.com/privacy-notice/, especially ‘Information We Collect About Visitors to Our Users’ Sites’.

In addition, if you hold a WordPress.com and/or Gravatar account and access https://i2insights.org/ whilst logged into your account/s, you may also have extra information collected by Automattic – this is detailed in the Automattic privacy policy for users found at https://automattic.com/privacy/ (and distinct from the above Automattic privacy notice for visitors).

Second, the Integration and Implementation Sciences team is governed by applicable sections of the ANU privacy policy, found at https://www.anu.edu.au/privacy. As we operate from within ANU, there is some overlap between ANU systems and WordPress.com systems – where applicable, these areas are detailed below.

Third are the data generated by your interaction with the website at https://i2insights.org/, and which we, the Integration and Implementation Sciences team, knowingly have access to. This is divided into two sub-sections: (1) the provision of specific services and, (2) our general approach to data sharing and rights.

(1) Provision of specific services

  • Followers:
    • Follow blog by email: When a visitor signs up to follow https://i2insights.org/ by email, we have access to the email address and the date the request was made.
      • Pathway to deletion: WordPress allows control over this data by providing an unsubscribe option at the bottom of an email notification or you can contact us and we will delete it.
      • Timeframe in which we hold data: While you agree to follow the blog via email, we have access to the email address you use. Once you unsubscribe we no longer have access to your email address.
    • Follow blog via WordPress: When a visitor follows https://i2insights.org/ while logged into their WordPress.com account, we have access to the sign-up information stored by our website, which typically includes a user identifier, a website address and the date the request was made.
      • Pathway to deletion: WordPress allows control over this data by providing an unsubscribe option within the user WordPress dashboard or you can contact us and we will delete the entry.
      • Timeframe in which we hold data: While you are subscribed to the blog, we have access to the user identity and web-address associated with that identity along with the date it was submitted. Once you unsubscribe, we no longer have access to this data.
  • Site comments: When a visitor leaves a comment on https://i2insights.org/, that comment is stored on our website, alongside other information that the visitor provides with the comment. For visitors leaving a comment via logging into a service such as WordPress, Facebook, Twitter or Google, this information is the user identity (name of identity and link to the authenticated service involved). For other visitors this information is the IP address, visitor’s chosen username and the email address and website (if provided by the visitor). We have access to that information, as does WordPress.com, which additionally collects the browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available at: https://automattic.com/privacy/. After approval of your comment, your Gravatar profile picture (if you are using one) is visible to the public in the context of your comment.
    • Pathway to deletion: If you wish to have a public comment deleted, please contact us. Although we will delete a public comment, we may be obliged to keep some data for administrative, legal, or security purposes.
    • Obtaining your data: If you have left comment/s, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us (on verification of your identity as the commenter).
    • Timeframe in which we hold data: If you leave a comment, the comment and its metadata are retained indefinitely. This allows the WordPress system to recognize and approve any follow-up comments quickly instead of sending them to a moderation queue.
  • Cookies:
    • Comment cookies: if you leave a comment on https://i2insights.org/ you may opt-in to saving your name, email address and website in cookies that reside on the device you used to enter the information to our website. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year and you have control of these cookies on your device. For more information, see: https://automattic.com/cookies/.
    • Cookies – general use: Automattic through its affiliated services, eg., WordPress, Jetpack, Akismet and Gravatar) use cookies for a variety of purposes, including technical reasons and to enable a personalised experience for both visitors and registered (logged in) users to these services. These cookies may be set when a page is loaded, or when a visitor takes a particular action (eg., clicking a ‘like’ button on a post). For more information, see: https://automattic.com/cookies/.
  • Media (eg., images): media on our site are provided by the authors, by ourselves or by third-parties we have engaged with (and includes copyright attribution). Wherever possible, we aim to remove personal and metadata associated with any uploaded media. Any owner of media we host and who wishes to discuss the data associated with that media should contact us directly.
  • Author blog post submissions: all authors work directly with us and we post their material via a generic WordPress account. Any author who wishes to discuss the data associated with any of their blog posts should contact us directly.
  • The ‘Like’ button: if you click the Like button on (the bottom of) any post or page, and you are logged into your WordPress.com account, your Gravatar will appear next to the ‘like’ on that post. You can control the ‘likes’ you have made via your WordPress/Gravatar account dashboard (https://wordpress.com/support/likes/).
  • Aggregated data:
    • Blog visitors:
      • WordPress data: WordPress provides aggregated data on the number of views and visitors the site has over time. These data are provided at a high level of generality (ie., a simple counter and country of origin). As far as we are aware, individuals cannot be identified from this information. This aggregated data is built from site visitors, and is served to us in this aggregated form, through the collection of individual IP addresses, WordPress.com user ID (if logged in), WordPress.com username (if logged in), user agent, visiting URL, referring URL, timestamp of event, browser language and country code (for detail, see: https://jetpack.com/support/wordpress-com-stats/, or; https://wordpress.com/support/stats/).
      • Our data calculations: We also aggregate some data, notably the number of comments over time (see: https://i2insights.org/blog-statistics/). In this case, we aggregate data that is already publicly available (being the comments found in the blog posts).
    • Blog authors:
      • WordPress data: WordPress provides aggregated data on the number of views of an authors post the site has over time. This is provided through the same mechanism as detailed immediately above under ‘Blog visitors: WordPress data‘. An individual author can be identified from this data, but the identification of an individual author is, in part, the purpose of this blog.
      • Our data calculations: We aggregate some data, notably authors by country (see: https://i2insights.org/blog-statistics/). In this case, we aggregate data that is already publicly available (being the author biographies in the blog posts).
  • Third-party systems: The https://i2insights.org/ site uses a number of third-party plugins as follows:
    • Social media platforms: We allow Facebook, Twitter and Google (via a standard account) as authentication systems for comments. We also allow logged in users of these services to action ‘share this’ options to Facebook, Twitter and LinkedIn. Users should note that these services may lodge cookies or collect data to track your online data.
    • Supportive third-party software and services: To enhance the administration and operation of https://i2insights.org/, we use a small number of such services. These services are all focused on supporting website functionality and are not generally about obtaining visitor data (to provide extra visitor services). The primary exceptions beyond Akismet, Gravatar and Jetpack are Google Translate and the search plugins, none of which, as far as we understand, utilise data entered to them in any other way than to provide the indicated service (ie., translation or search). We endeavor to use European Union General Data Protection (GDPR) Regulation compliant services.
  • Search query: When a search query is undertaken in a search engine (like Google, Yahoo, or Bing) to find material on the blog, we have access to some of these search terms in the form of a search string (text). We are not aware that there is any identifying information available with the search string nor do we log searches conducted through use of the blog’s own search function.

(2) General approach to data sharing and rights

  • Information individuals share publicly:
    • Authors publicly share their blog posts, which includes author name, author image and institutional affiliation and any other details an author feels are pertinent to their post. i2Insights Ambassadors publicly share their name and institutional affiliation. Visitors to the blog can choose to make public comments that show a chosen username and, if they desire, an associated website. If logged into a WordPress account, blog posts can be ‘liked’, which can publicly show a visitor’s username and Gravatar (if one is being used).
  • Who we share data with:
    • We do not share an individual’s data, nor does the ANU, though an exception could occur in maintaining computer system functionality/security or in the unlikely event of being required to by law. WordPress and ancillary systems (Jetpack, Gravatar and Akismet) may share data in a restricted way – see: https://automattic.com/privacy-notice/.
    • We share aggregated data through the blog usage statistics at https://i2insights.org/blog-statistics/, excepting the comments data, these could not reasonably be used to identify an individual visitor to the blog. In regards the aggregated comments data, these are drawn from a simple count of comments on a post as summed across all posts – as an individual visitor to the blog has chosen to make a public comment, this information can be found by reading individual blog post comment scrolls. We may use aggregated data to promote and evaluate the blog, sometimes linking it to particular blog posts and authors (eg., blog ‘X’ has been viewed ‘Y’ times).
  • What rights you have over your data:
    • You can request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
  • Where we send your data:

Disclaimer

While the Integration and Implementation Sciences team has used all reasonable endeavours to ensure the information on this site is accurate, we give no warranty or guarantee that the material, information or publication made accessible is accurate, complete, current, or fit for any use whatsoever. No reliance should be made by a user of the material, information or publication accessed via this site.

The Integration and Implementation Sciences team accepts no liability or responsibility for any loss or damage whatsoever suffered as a result of direct or indirect use or application of any material, information or publication made accessible via its web site.

The i2Insights blog provides links to organisations and information external to Integration and Implementation Sciences and in providing such links the Integration and Implementation Sciences team does not accept responsibility for, or endorse the content or condition of, any linked site.

The i2S project reserves the right to vary the material, information or publication on this web site without notice.