- Creator
- Levine, Jack, 1907-
- Size
- 21.8 linear feet (31 boxes, 1 flat box, 4 card boxes, 6 flat folders, 2 cartons)
- Call number
- MC 00308
This collection contains materials related to Levine's research interests, as well as those documenting his publications and university career. Correspondence includes letters about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Research contains notes, computer printouts, article reprints, and note cards related to Levine's research interests in cryptography. Writings includes Levine's published and unpublished essays and pamphlets. Teaching Career includes class notes and other student-related material. Collected Works includes articles, books, and bibliographic information of other authors in the fields of mathematics and cryptography. Unprocessed Material contains copies of articles and publications on cryptography. Most of the materials are from Levine's lifetime, but some of the items in the Collected Works series are from as early as 1716.
The Jack Levine Papers documents Levine's career as a crytographic researcher and mathematics professor at North Carolina State College (later North Carolina State University) from 1936 to 1995. The collection contains information on Levine's research, writings, university career, and correspondence. His main interests were tensor analysis, geometrics of generalized spaces, differential geometry, combinatorial analysis, theory of symmetric functions, algebraic cryptography and mathematical physics.
Biographical/historical note
Jack Levine was born on December 15, 1907, in Philadelphia, Pennsylvania. He received his A.B. degree with honors in Mathematics and Physics from the University of California at Los Angeles in 1929, and then spent a year there as an Assistant Professor in Mathematics. He attended Princeton University in 1930, and received his Ph.D. in mathematics in 1934, during which time he was also a part-time instructor. From 1935 to 1936 he was an instructor in mathematics at North Carolina State College. From 1936 to 1939 he served as Assistant Professor, and from 1939 to 1946 as Associate Professor. In 1946 he was appointed a full Professor and served in that capacity until 1976. He continued to teach part time until 1995.
Levine served as Technical Sergeant in the Second Signal Service Battalion of the Signal Corps from 1943 to 1945. In 1946 he was awarded the Legion of Merit Award for his outstanding service with the Army Security Agency. In 1970 Dr. Levine received an Outstanding Teacher Award at North Carolina State University. He was a member of several honorary and professional organizations, including Pi Mu Epsilon, Sigma Xi, American Mathematical Society, Mathematical Association of America, American Society for Engineering Education, and Phi Kappa Phi.
Still active in research after his retirement, his areas of interest included tensor analysis, geometrics of generalized spaces, differential geometry, combinatorial analysis, theory of symmetric functions, algebraic cryptography and mathematical physics. In addition to over one hundred research papers, Levine also published several books, including a definitive four-volume work on pattern word lists used in cryptography and a comprehensive compilation of United States cryptographic patents, 1861-1981.
Levine was also an avid reader, especially of mystery books. He was a life member of the Friends of the Library at North Carolina State University. In 1987 he donated a collection of over 1,500 mystery books to D. H. Hill library at North Carolina State University. In 1992 he donated an additional 665 titles to the collection.
Scope/content
This collection contains materials related to Levine's research interests, as well as those documenting his publications and university career. Correspondence includes letters about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Research contains notes, computer printouts, article reprints, and note cards related to Levine's research interests in cryptography. Writings includes Levine's published and unpublished essays and pamphlets. Teaching Career includes class notes and other student-related material. Collected Works includes articles, books, and bibliographic information of other authors in the fields of mathematics and cryptography. Unprocessed Material contains copies of articles and publications on cryptography. Most of the materials are from Levine's lifetime, but some of the items in the Collected Works series are from as early as 1716.
Arrangement
The collection is organized into five series: Correspondence, Research, Writings, Teaching Career, and Collected Works. Original order has been preserved as much as possible.
Use of these materials
North Carolina State University does not own copyright to this collection. Individuals obtaining materials from the NC State University Libraries' Special Collections Research Center are responsible for using the works in conformance with United States copyright law as well as any donor restrictions accompanying the materials.
This collection may contain materials with sensitive or confidential information that is protected under federal or state right to privacy laws and regulations. Researchers are advised that the disclosure of certain information pertaining to identifiable living individuals represented in this collection without the consent of those individuals may have legal ramifications (e.g., a cause of action under common law for invasion of privacy may arise if facts concerning an individual's private life are published that would be deemed highly offensive to a reasonable person) for which North Carolina State University assumes no responsibility.
Preferred Citation
[Identification of item], Jack Levine Papers, MC 00308,
Special Collections Research Center, North Carolina State University Libraries, Raleigh, NC
Source of acquisition
Gift of Jack Levine, 1995 and 2011 (Accession nos. 1995.0016, 2011.0209).
The collection is organized into six principal series:
Correspondence 1940-1994
Size: 0.5 linear feet
This series includes correspondence about general cryptography, articles written by Levine and others, Levine's cryptographic patents book, and cryptographic computer tests. Major correspondents include Joel Brawley, Michael Willet, Louis Kruh, and Cryptologia Magazine.The series is organized chronologically, with the topic or correspondent indicated when available.
Statistical Cryptography Tests 1940,
Beale Cypher Association 1979,
Patent Serial Numbers 1982-1985,
Michael Willet 1983-1984,
John C. King [Folder 1 of 2] 1991,
John C. King [Folder 2 of 2] 1991,
Research
Size: 10.25 linear feet
This series is broken down into four subseries: Notes, Computer Printouts, Notecards, and Reprints.
The Notes subseries contains handwritten materials relating to patents, the Hill System of cryptography, and general cryptography.Only a few folders' contents could be clearly identified; the majority of materials did not have dates or titles.Folders are arranged alphabetically, with general topics at the end.
The Computer Printouts subseries also consists of materials relating to general cryptography, the Hill System, and patents.Materials on general cryptographic problems and systems are arranged alphabetically.These materials include oversize items and IBM computer punch cards.The Hill System folders are arranged first by Modulus (Mod) number and then chronologically.At the end of this subseries are materials pertaining to United States patents.These folders are divided into those organized by the name of the patent holder and those organized by classification mode; both types are arranged chronologically.
The notecards in the Notecards subseries list patent names, numbers, and the patent holder.These materials are arranged in original order.
The Reprints subseries consists of photocopies of patent descriptions from the United State patent office.They are arranged in original order.
19.5 archival boxes and 6 oversize folders
Patents, Introduction to the Second Edition [Folder 1 of 2]
Patents, Introduction to the Second Edition [Folder 2 of 2]
Hill System, Hill System with Unknown Cipher Alphabet [Folder 1 of 2]
Hill System, Hill System with Unknown Cipher Alphabet [Folder 2 of 2]
Hill System, The Method of Stages
Hill System, Proposal Outline
Hill System [Folder 1 of 15]
Hill System [Folder 2 of 15]
Hill System [Folder 3 of 15]
Hill System [Folder 4 of 15]
Hill System [Folder 5 of 15]
Hill System [Folder 6 of 15]
Hill System [Folder 7 of 15]
Hill System [Folder 8 of 15]
Hill System [Folder 9 of 15]
Hill System [Folder 10 of 15]
Hill System [Folder 11 of 15]
Hill System [Folder 12 of 15]
Hill System [Folder 13 of 15]
Hill System [Folder 14 of 15]
Hill System [Folder 15 of 15]
General Cryptography, 2 Message Property
General Cryptography, Army Extension Course
General Cryptography, Depth Problems
General Cryptography, Equivalence and Decimations
General Cryptography, Five Letter Words
General Cryptography, Locating a Probable Word
General Cryptography, Log 10 N!
General Cryptography, Multiplication Table
General Cryptography, Probable Word Problems
General Cryptography, Programs for Encipherment
General Cryptography, Progressive Cipher
General Cryptography, Riordan Combinatorial Analysis
General Cryptography, Symmetry, Direct and Indirect
General Cryptography, Variations on the Vigenere
General Cryptography [Folder 1 of 15]
General Cryptography [Folder 2 of 15]
General Cryptography [Folder 3 of 15]
General Cryptography [Folder 4 of 15]
General Cryptography [Folder 5 of 15]
General Cryptography [Folder 6 of 15]
General Cryptography [Folder 7 of 15]
General Cryptography [Folder 8 of 15]
General Cryptography [Folder 9 of 15]
General Cryptography [Folder 10 of 15]
General Cryptography [Folder 11 of 15]
General Cryptography [Folder 12 of 15]
General Cryptography, Algebraic Encipherment Wheels (2)
General Cryptography, Multiplication Table
General Cryptography, Band Transposition
General Cryptography, Circulant Permanents
General Cryptography [Folder 13 of 15]
General Cryptography [Folder 14 of 15]
General Cryptography [Folder 15 of 15]
General Cryptography, A-1
General Cryptography, A-9
General Cryptography, B-1
General Cryptography, B-9
General Cryptography, Cases 1-7
General Cryptography, Prime Factors of Polynomials
General Cryptography, Project M.B0525
General Cryptography [Folder 1 of 2]
General Cryptography [Folder 2 of 2]
General Cryptography, Alphabets (Oversize Material)
General Cryptography, Factor Table (Oversize Material)
General Cryptography, Multiplication Tables. Mod K, K= 5-70 (Oversize Material)
General Cryptography, Pattern Words [1 of 3] (Oversize Material)
General Cryptography, Pattern Words [2 of 3] (Oversize Material)
General Cryptography, Pattern Words [3 of 3] (Oversize Material)
General Cryptography, Plain-text punch cards [1 of 3]
General Cryptography, Plain-text punch cards [2 of 3]
General Cryptography, Plain-text punch cards [3 of 3]
Hill System, Mod 2, July-August 1983
Hill System, Mod 2, undated
Hill System, Mod 5, July 1983
Hill System, Mod 7, June-August 1983
Hill System, Mod 7, June 1984
Hill System, Mod 7, July 1984
Hill System, Mod 7, undated
Hill System, Mod 10, July-August 1983
Hill System, Mod 11, June-August 1983
Hill System, Mod 11, January 1984
Hill System, Mod 11, undated
Hill System, Mod 13, July 11 1983
Hill System, Mod 13, July 14 1983
Hill System, Mod 13, July 29 1983
Hill System, Mod 13, August 1983
Hill System, Mod 13, January 1984
Hill System, Mod 13, July 12 1984
Hill System, Mod 13, July 17 1984
Hill System, Mod 13, undated [Folder 1 of 6]
Hill System, Mod 13, undated [Folder 2 of 6]
Hill System, Mod 13, undated [Folder 3 of 6]
Hill System, Mod 13, undated [Folder 4 of 6]
Hill System, Mod 13, undated [Folder 5 of 6]
Hill System, Mod 13, undated [Folder 6 of 6]
Hill System, Mod 14, August 1983
Hill System, Mod 19, July 14 1983
Hill System, Mod 19, July 29 1983
Hill System, Mod 19, April 1984
Hill System, Mod 19, July 10 1984
Hill System, Mod 19, July 17 1984
Hill System, Mod 19, undated [Folder 1 of 65]
Hill System, Mod 19, undated [Folder 2 of 5]
Hill System, Mod 19, undated [Folder 3 of 5]
Hill System, Mod 19, undated [Folder 4 of 5]
Hill System, Mod 19, undated [Folder 5 of 65]
Hill System, Mod 22, August 1983
Hill System, Mod 26, August 1983
Hill System, Mod 26, March 11 1984
Hill System, Mod 26, March 19 1984 [Folder 1 of 2]
Hill System, Mod 26, March 19 1984 [Folder 2 of 2]
Hill System, Mod 26, April 1984
Hill System, Mod 26, undated [Folder 1 of 6]
Hill System, Mod 26, undated [Folder 2 of 6]
Hill System, Mod 29, August 1983
Hill System, Mod 29, undated
Hill System, Mod 10 and Mod 2, undated
Hill System, Mod 10 and Mod 5, undated
Hill System, Mod 26 and Mod 2, undated
Hill System, Mod 26 and Mod 13, undated [Folder 1 of 2]
Hill System, Mod 26 and Mod 13, undated [Folder 2 of 6]
Hill System, Program Listings, July-August 1983
Hill System, Problems 8-13, July-August 1983
Hill System, Unknown Cipher Alphabet, July 1983
Hill System, Unknown Cipher Alphabet, January 1984
Hill System, Unknown Mod, May 1983-April 1984
Hill System, Unknown Mod, March 16 1984
Hill System, Unknown Mod, March 18 1984 [Folder 1 of 2]
Hill System, Unknown Mod, March 18 1984 [Folder 2 of 2]
Hill System, Unknown Mod, April 6 1984
Hill System, Unknown Mod, undated
Hill System, Mod 5, undated
Hill System, Mod 11, undated [Folder 1 of 4]
Hill System, Mod 11, undated [Folder 2 of 4]
Hill System, Mod 11, undated [Folder 3 of 4]
Hill System, Mod 11, undated [Folder 4 of 4]
Hill System, Mod 13, undated [Folder 1 of 4]
Hill System, Mod 13, undated [Folder 2 of 4]
Hill System, Mod 13, undated [Folder 3 of 4]
Hill System, Mod 13, undated [Folder 4 of 4]
Hill System, Mod 19, undated [Folder 1 of 8]
Hill System, Mod 19, undated [Folder 2 of 8]
Hill System, Mod 19, undated [Folder 3 of 8]
Hill System, Mod 19, undated [Folder 4 of 8]
Hill System, Mod 19, undated [Folder 5 of 8]
Hill System, Mod 19, undated [Folder 6 of 8]
Hill System, Mod 19, undated [Folder 7 of 8]
Hill System, Mod 19, undated [Folder 8 of 8]
Hill System, Mod 29, undated
Hill System, Unknown Mod, undated
Patents, Names, 1861-1989
Patents, Names, 1887-1981
Patents, Names, 1982-1989 [Folder 1 of 3]
Patents, Names, 1982-1989 [Folder 2 of 3]
Patents, Names, 1982-1989 [Folder 3 of 3]
Patents, Names, 1982-1985
Patents, Names, 1985-1987
Patents, Names, 1987-1989
Patents, Classification Modes, August 9 1989
Patents, Classification Modes, August 10 1989
Patents, Classification Modes, September-October 1989
Patents, Classification Modes, March 1990
Patents, Classification Modes, undated [Folder 1 of 4]
Patents, Classification Modes, undated [Folder 2 of 4]
Patents, Classification Modes, undated [Folder 3 of 4]
Patents, Classification Modes, undated [Folder 4 of 4]
Patents, Alphabetic Index of U.S. Cryptographic Patents, 1861-1989
Patents, List of Primary Patents, 1861-1989
Patents, List of Secondary Patents, 1861-1989
Patents, U.S. Patents, Cryptographic Devices
Patents [Folder 10 of 25]
Patents [Folder 11 of 25]
Patents [Folder 12 of 25]
Patents [Folder 13 of 25]
Patents [Folder 14 of 25]
Patents [Folder 15 of 25]
Patents [Folder 16 of 25]
Patents [Folder 17 of 25]
Patents [Folder 18 of 25]
Patents [Folder 19 of 25]
Patents [Folder 20 of 25]
Patents [Folder 21 of 25]
Patents [Folder 22 of 25]
Patents [Folder 23 of 25]
Patents [Folder 24 of 25]
Patents [Folder 25 of 25]
Writings 1935-1991
Size: 0.75 linear feet
This series contains published articles and typewritten or handwritten manuscripts.They are grouped by publisher or title and are arranged chronologically.Articles without dates are at the end of the series and are organized alphabetically.
American Mathematical Society, 1935-1960
Duke Mathematical Society, 1949-1974
"Note on the Number of Pattern Sequences of a Given Length," 1952
"Some Permutation Problems Related to Circulant Permanents," 1954
Mathematics Magazine, 1958-1961
Various Publishers, 1958-1975
American Mathematical Monthly, 1959-1962
German Publisher, 1963-1967
"Characteristic Functional Structure of Infintesimal Symmetry Mappings of Classical Dynamical Systems," 1985-1988
Cryptographic Patents Book (Revisions) 1991 [Folder 1 of 5]
Cryptographic Patents Book (Revisions) 1991 [Folder 2 of 5]
Cryptographic Patents Book (Revisions) 1991 [Folder 3 of 5]
Cryptographic Patents Book (Revisions) 1991 [Folder 4 of 5]
Cryptographic Patents Book (Revisions) 1991 [Folder 5 of 5]
"A Class of Symmetries for Conservative Dynamical Systems," undated
"A Trigraphic Frequency of 20,000 Letters," undated
"Circulant Permanents," undated
"Cryptographs and Enciphering Machines," undated
Cryptologia Publications, undated
"Note on Continuant Permanents," undated
"Problems in Cryptanalysis," undated
"Simple Substitution Ciphers," undated
"Some Further Cryptographic Applications of Permutation Polynomials," undated
Teaching Career
Size: 1 linear foot
This series is organized alphabetically by topic, such as class notes, programs, reports.When available, the class number is indicated.
The following course descriptions are taken from North Carolina State College catalogs. Some courses have more than one course number, in which case all course numbers are listed (i.e. MA202/242). Each description is followed by a year in parentheses, indicating from which catalog the course description was taken.
MA202/242, Calculus II (prerequisite: MA201): Methods of integration; definite integral with applications to length of arc, surface area, volumes, centroids and moments of inertia; Simpson's rule; indeterminant forms, infinite series, expansion of functions, hyperbolic functions, partial differentiation; multiple integration. (1959-1960 catalog)
MA405, Introduction to Determinants and Matrices (prerequisite: MA202): Properties of determinants; differentiation; products; theorems of Laplace and Jacobi; systems of linear equations.Elementary operations with matrices; inverse rank, characteristic roots and eigenvectors.Introduction to algebraic forms. (1959-1960 catalog)
MA522, Theory of Probability (prerequisite: MA 401): Definitions, discrete and continuous sample spaces, combinatorial analysis, Stirling's formula, simple occupancy and ordering problems, conditional probability, repeated trials, compound experiments, Bayes' theorem, binomial, Poisson and normal distributions, the probability integral, random variables, expectation. (1959-1960 catalog)
Class Notes, General [Folder 1 of 13]
Class Notes, General [Folder 2 of 13]
Class Notes, General [Folder 3 of 13]
Class Notes, General [Folder 4 of 13]
Class Notes, General [Folder 5 of 13]
Class Notes, General [Folder 6 of 13]
Class Notes, General [Folder 7 of 13]
Class Notes, General [Folder 8 of 13]
Class Notes, General [Folder 9 of 13]
Class Notes, General [Folder 10 of 13]
Class Notes, General [Folder 11 of 13]
Class Notes, General [Folder 12 of 13]
Class Notes, General [Folder 13 of 13]
Collected Works 1716-1989
Size: 5.5 linear feet
This series is divided into three subseries.Reprints are organized chronologically, then alphabetically by author and subject. Reprints without dates are at the end of the series and are organized alphabetically by author and subject. Bibliographies are organized chronologically. Notecards are organized alphabetically by author.
British Museum Deciphers of Diplomatic Papers 1716
British Museum Deciphers of Diplomatic Papers 1780
Memento Cryptographie 1898
Yves Gylden and Ivor Damm 1918
Flynn's Weekly 1924-1928 [Folder 1 of 2]
Flynn's Weekly 1924-1928 [Folder 2 of 2]
Problems: The Command and General Staff School 1926-1927
M.K. Dirigo 1930s-1940s [Folder 1 of 3]
M.K. Dirigo 1930s-1940s [Folder 2 of 3]
M.K. Dirigo 1930s-1940s [Folder 3 of 3]
Luigi Sacco 1936 [Folder 1 of 2]
Luigi Sacco 1936 [Folder 2 of 2]
Hans Rohrbach 1948 [Folder 1 of 4]
Hans Rohrbach 1948 [Folder 2 of 4]
Hans Rohrbach 1948 [Folder 3 of 4]
Hans Rohrbach 1948 [Folder 4 of 4]
Howard Oakley 1950 [Folder 1 of 2]
Howard Oakley 1950 [Folder 2 of 2]
Probability and Statistics in Cryptanalysis 1952
Maurits de Vries 1953 [Folder 1 of 3]
Maurits de Vries 1953 [Folder 2 of 3]
Maurits de Vries 1953 [Folder 3 of 3]
Lester Hill 1956 [Folder 1 of 3]
Lester Hill 1956 [Folder 2 of 3]
Lester Hill 1956 [Folder 3 of 3]
Eve and V.J. Bofinger 1958
H.W Gould 1959 [Folder 1 of 2]
H.W. Gould 1959 [Folder 2 of 13]
Wayne Baker 1961 [Folder 1 of 2]
Wayne Baker 1961 [Folder 2 of 2]
W.M. Bowers 1962 [Folder 1 of 2]
W.M. Bowers 1962 [Folder 2 of 2]
Cryptography Article 1962
Translated by Steven Taylor 1969
James Reeds 1972 [Folder 1 of 5]
James Reeds 1972 [Folder 2 of 5]
James Reeds 1972 [Folder 3 of 5]
James Reeds 1972 [Folder 4 of 5]
James Reeds 1972 [Folder 5 of 5]
Edna Grossman and Bryant Tuckerman 1977
Rivest, Shamir, and Adleman 1977
Cryptographic Textbook (partial copy) 1978 [Folder 1 of 3]
Cryptographic Textbook (partial copy) 1978 [Folder 2 of 3]
Cryptographic Textbook (partial copy) 1978 [Folder 3 of 3]
D.W. Davies and D.A. Bell 1978
Advances in Cryptography 1982
Alberti on Deciphering, undated
Analysis of a Periodic P.A.S. undated
Analyzing Cryptograms undated
Richard V. Andree, undated
Autokey, Cipher Text as Key, undated
Autokey, Plain Text as Key, undated
Charles Babbage, undated [Folder 1 of 2]
Charles Babbage, undated [Folder 2 of 2]
Bacon Library Collection on Cryptology, undated
Joel V. Brawley and Richard Millman, undated
Lambus Callimahos, undated
Joaquin Carmona, undated [Folder 1 of 2]
Joaquin Carmona, undated [Folder 2 of 2]
R.L. Cave and L.P. Neuwirth, undated
Poe Cipher Solution, undated
Columnar Transposition, undated
Cryptanalysis of a Public-Key Cryptosystem, undated
Delastelle Cipher Systems, undated
Different Systems of Cipher, undated
Kasiski Method, undated [Folder 1 of 2]
Don Kooken, undated [Folder 2 of 2]
Kryha Machine Examples and Solutions, undated
Charles Mendelsohn, undated [Folder 1 of 2]
Charles Mendelsohn, undated [Folder 2 of 2]
Nihilist Substitution Cipher, undated
Nihilist Transposition, undated
Nyphos Robot System, undated
Periodic Ciphers, undated
Probability Definitions, undated
Probable Diagram Method, undated
Progressive Keys, undated
The Quagmire Question, undated
James Reeds, undated [Folder 1 of 3]
James Reeds, undated [Folder 2 of 2]
James Reeds, undated [Folder 3 of 3]
Gustavus J. Simmons, undated
Spotting Vowels in Simple Substitution Ciphers, undated
The Zendian Problem, undated
Unknown, undated [Folder 1 of 2]
Unknown, undated [Folder 2 of 2]
Yves Gylden and Ivar Damm 1918 [Folder 1 of 2]
Yves Gylden and Ivar Damm 1918 [Folder 2 of 2]
Charles-Hubert Desnoyers 1967
Cryptography Seminars 1970s-1980s
Book entitled 'Map Problems' 1926-1927
Unprocessed Material 1563-1970
Copies of articles and publications on cryptography 1563-1970
Copies of articles and publications on cryptography 1563-1970
2 slide rules and cases Circa 1960 (Accession 2021.0009)
Cryptography: alphabetic / numeric code strips and 2 strip holders Circa 1960 (Accession 2021.0009)
Reprints from other mathematicians in European journals 1927-1960 (Accession 2021.0009)
Reprints from other mathematicians, A-G Circa 1890-Circa 1950 (Accession 2021.0009)
Reprints from other mathematicians, H Circa 1930-Circa 1960 (Accession 2021.0009)
Reprints from other mathematicians, K-M Circa 1930-circa 1960 (Accession 2021.0009)
Reprints from other mathematicians, O-T Circa 1930-Circa 1960 (Accession 2021.0009)
Reprints from other mathematicians, T, V, W, Z Circa 1930-Circa 1970 (Accession 2021.0009)
Reprints from other mathematicians, Y Circa 1930-Circa 1970 (Accession 2021.0009)
Access to the collection
This collection is open for research; access requires at least 48 hours advance notice.
Because of the nature of certain archival formats, including digital and audio-visual materials,
access to digital files may require additional advanced notice.
Preferred Citation
[Identification of item], Jack Levine Papers, MC 00308,
Special Collections Research Center, North Carolina State University Libraries, Raleigh, NC
Use of these materials
North Carolina State University does not own copyright to this collection. Individuals obtaining materials from the NC State University Libraries' Special Collections Research Center are responsible for using the works in conformance with United States copyright law as well as any donor restrictions accompanying the materials.
This collection may contain materials with sensitive or confidential information that is protected under federal or state right to privacy laws and regulations. Researchers are advised that the disclosure of certain information pertaining to identifiable living individuals represented in this collection without the consent of those individuals may have legal ramifications (e.g., a cause of action under common law for invasion of privacy may arise if facts concerning an individual's private life are published that would be deemed highly offensive to a reasonable person) for which North Carolina State University assumes no responsibility.