SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Privacy Audits in the Law Library
What is a privacy audit?
 Review existing privacy policies
 Evaluate practices to ensure compliance
with goals/policies
 Protect from liability
Federal Laws
 1st Amendment: right to not have the subject of your interest scruti-
nized
 Video Privacy Protection Act: video borrowing data protected
 Freedom of Information Act: certain libraries may have to disclose
certain information
 Family Educational Rights and Privacy Act (FERPA)
State Laws
 Privacy: look for statutes governing privacy of business records
 Library privacy: most states have statutes (2 have AG Opinions)
 Records retention/destruction: timeframe for retention/destruction
may be set by statute for certain data in certain libraries
 Open records: libraries receiving public funds may have to disclose
certain information
Definitions:
Privacy: the right to open inquiry without having the
subject of one’s interest examined or scrutinized by others. (ALA)
Confidentiality: exists when a library is in possession of personally
identifiable information about users and keeps that information private
on their behalf. (ALA)
Personally Identifiable Information (PII): Information that alone or in
conjunction with other data points can identify a specific individual. See
diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it
needs to be collected, and how long it should be retained
Areas to audit
 Circulation data (what is collected?, who can see data on screen?,
what happens to inadvertent prints?, how are histories managed?)
 Payments received (do you keep copies of checks/credit card
receipts?)
 Reference logs (keep general statistics but nothing that identifies an
individual)
 Public computer settings and logs (level of tracking, filter settings)
 Holds (cover names if shown on materials)
 Fines & notices (paper records should be secured if retained)
Components of a good privacy policy
 Notice of rights and applicable laws: definitions and standards set
 Choice and consent: opt-in for contact not related to library activities
 Access and updating: provide users access to own data
 Data integrity and security: state what is retained and for how long
 Data aggregation: PII not included, aggregate data may be disclosed
 Required disclosures: law enforcement compliance
Initial Considerations/Questions
 What laws apply in your state?
 Does your library have an existing privacy policy?
 Who is/will be responsible for the policies?
 Will the policies apply to one library or several across an institution?
Audit—Step 2: Categorize the data based on degree of security needed
Sample categories
 Public: can be disclosed freely
 Confidential: may be subject to disclosure under open records laws
 Sensitive: includes PII , cannot be disclosed by law, policy, or
contractual obligation
Audit—Step 4: Train staff & test your security measures
 Engage staff during audit process to gain buy-in
 Student workers may handle some privacy-related requests, so
include privacy issues in their initial training and provide refresher
training periodically to keep knowledge fresh.
 Use scenarios to develop a deeper understanding of the reasoning
behind a policy.
 Spend time observing interactions at the reference and circulation
desks to ensure that practice matches goals/policies.
Audit—Step 3: Assess sensitivity, security risks, and public percep-
tions of collected information
 Assure that access is restricted to staff who need the information.
 Only collect what is reasonably necessary to library functions.
 Assess how information is stored and ensure security
 Identify staff members responsible for ongoing data privacy/audits
Audit—Step 5: Destroy data at correct time in the correct manner
 Check for statutes governing time of retention/destruction (even if
they apply to different types of data/organizations they can be
valuable as guidelines).
 Check for statutes governing manner of destruction (GA options are
erase, shred, redact).
 Don’t retain things indefinitely because you don’t know what to do
with them. Examine the process and determine why you’re keeping
something in order to determine how long you reasonably need to
keep it.
Resources
Audit Checklist
Rachel Gordon For a copy of this poster:
Mercer University School of Law
Macon, Georgia
gordon_r@law.mercer.edu
ALA Materials
 Privacy: An Interpretation of the Library Bill of Rights:
www.ala.org/Template.cfm?
Section=interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=34182
 Questions & Answers on Privacy and Confidentiality:
www.ala.org/Template.cfm?
Section=Interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=15347
 Policy Concerning Confidentiality of Personally Identifiable
Information About Library Users: www.ala.org/Template.cfm?
Section=otherpolicies&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=13087
 Privacy Tool Kit: www.ala.org/advocacy/
privacyconfidentiality/toolkitsprivacy/privacy
 Office for Intellectual Freedom, State Privacy Laws:
www.ala.org/offices/oif/ifgroups/stateifcchairs/
stateifcinaction/stateprivacy
Books and Articles
 THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR
LIBRARIES AND THEIR LAWYERS (2009). Very detailed information
on how to handle various types of law enforcement requests.
 PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND
INFORMATION PROFESSIONALS (2008). Explains privacy-related
causes of action in tort.
 Anne Klinefelter, First Amendment Limits on Library Collection
Management, 102 L. LIBRARY J. 343 (Summer, 2010).
 Anne Klinefelter, Privacy and Library Public Services: Or, I
Know What You Read Last Summer, 26 LEGAL REFERENCE SER-
VICES Q. 253 (2007).
 Ann Mackay Snowman, Privacy and Confidentiality: Using
Scenarios to Teach Your Staff about Patron’s Rights, 10 J.
ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to
reinforce staff training on patron privacy.
 Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477
(2006). Good overview of privacy law.
Selected Library Privacy Policies
 library.law.unc.edu/about/policies/privacy
 www.lib.wayne.edu/info/policies/privacy.php
 briefs.lalawlibrary.org/about/privacy.aspx
1. When do we collect information? (Identify the process)
2. What information is being collected?
o Name
o Mailing Address
o Email Address
o Phone/Fax Number
o ID Number (Student ID, Driver’s License, or Bar Number)
o Age/DOB
o Ethnicity
o Marital Status
o Gender
o Medical Information
o Mother’s Maiden Name
o Spouse Information
o Financial Information
o Educational Information
o IP Address
o Signature
3. Why is the information being collected?
4. Who is collecting this information?
5. Who else uses or has access to the information?
6. How is this information being kept, and for how long?
7. Where is this information being kept?
8. How is the information being used?
9. How is the information secured?
10. How and when is the information destroyed?

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (7)

Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
 
Next generation data services at the Marriott Library
Next generation data services at the Marriott LibraryNext generation data services at the Marriott Library
Next generation data services at the Marriott Library
 
Data management federal requirements 9 2015
Data management federal requirements 9 2015Data management federal requirements 9 2015
Data management federal requirements 9 2015
 
Data Management - Lynn Woolfrey
Data Management - Lynn WoolfreyData Management - Lynn Woolfrey
Data Management - Lynn Woolfrey
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Case studyworkshoponprovenance
Case studyworkshoponprovenanceCase studyworkshoponprovenance
Case studyworkshoponprovenance
 

Andere mochten auch

Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Fernando Farias
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correção
Alexandre Ribeiro
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015
MAYANK SHARMA
 
Eyetouch
Eyetouch Eyetouch
Eyetouch
glide93
 

Andere mochten auch (20)

Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015
 
Conferencia d anido_abril2010_def
Conferencia d anido_abril2010_defConferencia d anido_abril2010_def
Conferencia d anido_abril2010_def
 
M&d formazione la metafora del ristorante ita eng
M&d formazione   la metafora del ristorante ita engM&d formazione   la metafora del ristorante ita eng
M&d formazione la metafora del ristorante ita eng
 
Rapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentRapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatment
 
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
 
Turismo Parroquia Purunuma
Turismo Parroquia PurunumaTurismo Parroquia Purunuma
Turismo Parroquia Purunuma
 
Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correção
 
Wild Dog Design - Websites
Wild Dog Design - WebsitesWild Dog Design - Websites
Wild Dog Design - Websites
 
eCommerce homepage pop-up
eCommerce homepage pop-upeCommerce homepage pop-up
eCommerce homepage pop-up
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015
 
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
 
Paseo en velero
Paseo en veleroPaseo en velero
Paseo en velero
 
Mundo Plano 2
Mundo Plano 2Mundo Plano 2
Mundo Plano 2
 
Enjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DEEnjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DE
 
Eyetouch
Eyetouch Eyetouch
Eyetouch
 
Soporteusuario
SoporteusuarioSoporteusuario
Soporteusuario
 
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
 
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de español
 

Ähnlich wie Privacy Audits in Law Libraries

Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
Brad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
Brad Houston
 

Ähnlich wie Privacy Audits in Law Libraries (20)

Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
 
Levine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal ConsiderationsLevine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal Considerations
 
Niso library law
Niso library lawNiso library law
Niso library law
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Data Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesData Management Lab: Session 4 Slides
Data Management Lab: Session 4 Slides
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
 
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxPR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Data Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsData Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructions
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Research data life cycle
Research data life cycleResearch data life cycle
Research data life cycle
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
RDM: a briefing for Health Sciences
RDM: a briefing for Health SciencesRDM: a briefing for Health Sciences
RDM: a briefing for Health Sciences
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Privacy Audits in Law Libraries

  • 1. Privacy Audits in the Law Library What is a privacy audit?  Review existing privacy policies  Evaluate practices to ensure compliance with goals/policies  Protect from liability Federal Laws  1st Amendment: right to not have the subject of your interest scruti- nized  Video Privacy Protection Act: video borrowing data protected  Freedom of Information Act: certain libraries may have to disclose certain information  Family Educational Rights and Privacy Act (FERPA) State Laws  Privacy: look for statutes governing privacy of business records  Library privacy: most states have statutes (2 have AG Opinions)  Records retention/destruction: timeframe for retention/destruction may be set by statute for certain data in certain libraries  Open records: libraries receiving public funds may have to disclose certain information Definitions: Privacy: the right to open inquiry without having the subject of one’s interest examined or scrutinized by others. (ALA) Confidentiality: exists when a library is in possession of personally identifiable information about users and keeps that information private on their behalf. (ALA) Personally Identifiable Information (PII): Information that alone or in conjunction with other data points can identify a specific individual. See diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it needs to be collected, and how long it should be retained Areas to audit  Circulation data (what is collected?, who can see data on screen?, what happens to inadvertent prints?, how are histories managed?)  Payments received (do you keep copies of checks/credit card receipts?)  Reference logs (keep general statistics but nothing that identifies an individual)  Public computer settings and logs (level of tracking, filter settings)  Holds (cover names if shown on materials)  Fines & notices (paper records should be secured if retained) Components of a good privacy policy  Notice of rights and applicable laws: definitions and standards set  Choice and consent: opt-in for contact not related to library activities  Access and updating: provide users access to own data  Data integrity and security: state what is retained and for how long  Data aggregation: PII not included, aggregate data may be disclosed  Required disclosures: law enforcement compliance Initial Considerations/Questions  What laws apply in your state?  Does your library have an existing privacy policy?  Who is/will be responsible for the policies?  Will the policies apply to one library or several across an institution? Audit—Step 2: Categorize the data based on degree of security needed Sample categories  Public: can be disclosed freely  Confidential: may be subject to disclosure under open records laws  Sensitive: includes PII , cannot be disclosed by law, policy, or contractual obligation Audit—Step 4: Train staff & test your security measures  Engage staff during audit process to gain buy-in  Student workers may handle some privacy-related requests, so include privacy issues in their initial training and provide refresher training periodically to keep knowledge fresh.  Use scenarios to develop a deeper understanding of the reasoning behind a policy.  Spend time observing interactions at the reference and circulation desks to ensure that practice matches goals/policies. Audit—Step 3: Assess sensitivity, security risks, and public percep- tions of collected information  Assure that access is restricted to staff who need the information.  Only collect what is reasonably necessary to library functions.  Assess how information is stored and ensure security  Identify staff members responsible for ongoing data privacy/audits Audit—Step 5: Destroy data at correct time in the correct manner  Check for statutes governing time of retention/destruction (even if they apply to different types of data/organizations they can be valuable as guidelines).  Check for statutes governing manner of destruction (GA options are erase, shred, redact).  Don’t retain things indefinitely because you don’t know what to do with them. Examine the process and determine why you’re keeping something in order to determine how long you reasonably need to keep it. Resources Audit Checklist Rachel Gordon For a copy of this poster: Mercer University School of Law Macon, Georgia gordon_r@law.mercer.edu ALA Materials  Privacy: An Interpretation of the Library Bill of Rights: www.ala.org/Template.cfm? Section=interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=34182  Questions & Answers on Privacy and Confidentiality: www.ala.org/Template.cfm? Section=Interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=15347  Policy Concerning Confidentiality of Personally Identifiable Information About Library Users: www.ala.org/Template.cfm? Section=otherpolicies&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=13087  Privacy Tool Kit: www.ala.org/advocacy/ privacyconfidentiality/toolkitsprivacy/privacy  Office for Intellectual Freedom, State Privacy Laws: www.ala.org/offices/oif/ifgroups/stateifcchairs/ stateifcinaction/stateprivacy Books and Articles  THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR LIBRARIES AND THEIR LAWYERS (2009). Very detailed information on how to handle various types of law enforcement requests.  PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND INFORMATION PROFESSIONALS (2008). Explains privacy-related causes of action in tort.  Anne Klinefelter, First Amendment Limits on Library Collection Management, 102 L. LIBRARY J. 343 (Summer, 2010).  Anne Klinefelter, Privacy and Library Public Services: Or, I Know What You Read Last Summer, 26 LEGAL REFERENCE SER- VICES Q. 253 (2007).  Ann Mackay Snowman, Privacy and Confidentiality: Using Scenarios to Teach Your Staff about Patron’s Rights, 10 J. ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to reinforce staff training on patron privacy.  Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477 (2006). Good overview of privacy law. Selected Library Privacy Policies  library.law.unc.edu/about/policies/privacy  www.lib.wayne.edu/info/policies/privacy.php  briefs.lalawlibrary.org/about/privacy.aspx 1. When do we collect information? (Identify the process) 2. What information is being collected? o Name o Mailing Address o Email Address o Phone/Fax Number o ID Number (Student ID, Driver’s License, or Bar Number) o Age/DOB o Ethnicity o Marital Status o Gender o Medical Information o Mother’s Maiden Name o Spouse Information o Financial Information o Educational Information o IP Address o Signature 3. Why is the information being collected? 4. Who is collecting this information? 5. Who else uses or has access to the information? 6. How is this information being kept, and for how long? 7. Where is this information being kept? 8. How is the information being used? 9. How is the information secured? 10. How and when is the information destroyed?