SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
Privacy and libraries
LIS 644
Dorothea Salo
Privacy vs. security
• A security problem can violate privacy, sure.
• But the violation is inadvertent! And often
involves some illegality!
• We’re not talking about that today; we’ve
done so already.
• We’re talking about perfectly legal (usually)
uses of information that still (potentially or
actually) violate privacy.
• This is a minefield. I don’t have all the answers.
We MUST still ask the questions.
What is privacy, really?
• “Exposure of personal information” is too
easy an answer.
• Exposure of what to whom, exactly?
• danah boyd: “respecting context”

• Consider your social circles. You have several
of them. What happens to them online?
• So privacy is partly the ability to practice “selective
disclosure” (another boyd-ism).

• Privacy is also trust that those we interact
with will not betray us.
• What’s betrayal in a library context, and how do libraries
avoid it?
Why do we care?
• Privacy of information use is a cornerstone of
intellectual freedom.
• ALA Code of Ethics:
• III. We protect each library user's right to privacy and
condentiality with respect to information sought or
received and resources consulted, borrowed, acquired or
transmitted.

• Additional concerns include:
• Privacy of research subjects in collected data
• Privacy of living individuals mentioned in archival materials
• Privacy of confidential business records
• Privacy for especially vulnerable individuals
What is “freedom to read?”
• Historically: preventing Big Brother from
watching patrons’ checkout histories
• Remember the Patriot Act? How ‘bout that NSA?
• What happens to circ records nowadays? How did
moving circ records digital help privacy?

• Today: is Big Brother the only threat?
• Who else wants information, and will pay and/or bug
to get it?

• Historically: censorship and book banning
• Today: is that all that keeps good
information out of the hands of patrons?
Do we have privacy laws?
• Not in the US. Not really.
• We have libel and slander laws, and laws about
children’s information online (remember those?).
Limited “invasion of physical space” laws.
• Consumer-privacy laws have been introduced in
Congress. No joy... yet.

• We often have laws/ordinances around
library patron information.
• And even in the absence of law we SHOULD (and
usually do) have policy.
• KNOW THE LAW AND POLICY where you are.

• It’s different in Canada and Europe.
• Canada has even taken Facebook to the cleaners once
or twice.
Why do privacy problems happen?
• Monetary benefit
• Accident or ineptitude (see thedailywtf.com)
• Privilege and associated thoughtlessness
• Google Buzz: testing with its own (white, male, healthy, wealthy,
educated) engineers and no one else.

• Collapse of realspace social boundaries on the web
• This is a service-design problem! Human beings manage just fine
in realspace. Our online tools don’t give us the affordances we
need to replicate that success online.

• Web is more than the sum of its parts.
• Most scarily: DESIRE TO OFFER GOOD SERVICE,
e.g. recommender engines.
Libraries and privacy
• It’s not as simple as “always protect
patron privacy!”
• What about libraries and social media? Will we wipe
librarians off the Web? Really?
• What about user studies for service improvement?
• What about patron communities that form around
our materials and services?
• What about users who WANT to share what they
read, watch, and listen to? Will we shake our
paternalistic ngers at them and tell them no?
• What about digitization projects? Research?

• “How” is getting harder to figure out too.
Known privacy issues
Law hinders privacy research
• DMCA!
• If there’s information about you on a machine you
own (or even one you don’t), and the only way you
can nd out about it is to hack the machine...

• These lawsuits have happened.
• Often they go away very quickly as the vocal tech
community shames the plaintiff.
• But Ed Felten of Princeton has been in and out of
court so many times...
Public records
• Back in the day, if you wanted a public
record, you went to a physical building,
combed through le cabinets, and paid for
the privilege.
• This is a variant on security-by-obscurity.

• Now many public records are online. Easy
discovery and easy access make them A
LOT MORE PUBLIC.
• How should we, as citizens, respond?
• As records managers/archivists/librarians, how should
we educate, train, and refer?
An example
An example
Email
• So how ‘bout that Petraeus guy?
• Email is only very loosely legally protected at present.
• Larger point: we have the privacy protections we do
because they are enshrined in law, not because
they’re societal norms. They’re pretty clearly not.

• Email is sent in the clear unless you take
encryption precautions.
• Even then it may be readable if your inbox is hacked.

• Your employer owns its email systems and
email sent on them. Behave accordingly.
• Students: using non-university email may
bypass FERPA protections.
What is “reidentification” or
“de-anonymization”?
• Imagine this scenario:
• One website has your name, age, zipcode, and gender.
• Another has your age, gender, zipcode, pseudonym, and
dubious or sensitive taste in entertainment.

• If the info from both sites can be collated,
you can be pegged to your taste.
• And your pseudonym just got exposed. Hope you
weren’t using it anywhere else...
• We aren’t as unique as we think!

• “Anonymizing” data doesn’t fix this.
• We can be identified by our attributes, friends, and
behavior almost as easily as by regular identiers.

• What price public records NOW?
Reidentication horror scenarios
• Health information
• Wouldn’t your insurance company like to know...?
• Becoming a major issue in health research!

• “Character witnessing”
• Are you an atheist? A gamer (this came up in a 2012
political campaign)? GLBTQ and not out? A person of
color who’s passing? A woman in IT? A whistleblower?

• A target for harm
• Physical, legal, financial, employment, mental/emotional
(bullying)

• Where could library-patron information
gure in to this? Archives informants?
Commercial privacy
violation on the web
What information does the
web collect about us?
• “Personal information”
• Including health information, demography.

• Financial information
• Information about our habits
• Purchasing habits
• Entertainment habits (including, yes, reading habits)
• Search habits

• Information about our physical location
• through IP addresses or through web services like
Foursquare

• Information about our social lives
• And then it correlates as much of this as it can!
How is this information collected?
• Through server and search logs (IP addresses)
• Through sign-ins
• some of which are “real name required”

• Geolocation of our gadgetry
• Browser “fingerprinting”
• Which version, with what add-ons, on which OS... unique!

• Human error (and exploitation thereof )
• Through observation of our behavior on individual
websites and across websites
• Cookies, Flash cookies, “web bugs.” Worst case: “keyloggers.”

• Our online associates’ behavior
• Which we obviously don’t control!

• How much of this are we actually aware of? How
much do sites disclose? Let us control?
Effects
• ... on citizenship
• ... on open discourse
• ... on vulnerable populations
• ... on markets
• is privacy-endangerment a winner-take-all market?
• what about online redlining?
Examples
Privacy and ebooks
• Ebook vendors, unlike libraries, do not
necessarily purge records of what you read.
• You are entirely at their mercy as far as who they share those
records with and what they do with them.
• Are they collecting info from library patrons too? Unclear!

• Because of this and DRM, they can also take
away what you want to read.
• And then there’s what you search for, or look at,
but don’t read.
• What do we do about this? What should we do?
Facebook has sold...
•
•
•
•

Your phone number
Information about your purchases
Information about your social network
Information about Facebook campaigns you’ve
participated in
• Information about what you’ve “liked.”
• While refusing to let you opt out of the sale of this information.

• Your likeness, for advertisers to use on your
friends.
• Google ain’t much better, and is getting worse.
Others have tried to use
Facebook to...
• Screen employees
• including by requiring applicants to hand over Facebook
passwords!
• (To Facebook’s credit, it actually fought this one.)

• Perform background checks (for employment or
other reasons)
• Do social-science research, sans informed consent
• At Harvard, some researchers made their RAs hand over their
Facebook passwords so they could see friendslocked material.

• How are you feeling about your Facebook?
Guess what?
• Facebook has sold MY information too, and
I refuse to use Facebook!
• Look up “shadow profiles” sometime.

• If you delete your account, Facebook keeps
and continues to sell your information.
• Facebook may or may not actually delete
photos when you delete them.
• Guess why I don’t use Facebook?
• Should libraries? Conflict between privacy ethics and
“go where the patrons are.”
“Like” buttons
• When you log into Facebook, Facebook knows
you visited any page with a “Like” button on it,
even if you do not click Like.
• Facebook has also been caught tracking this on logged-out
users. They claim they’ve stopped.

• If your library puts Like buttons on catalog
pages... (you do the math)
• Not just a Facebook issue, by the way.
• Social-media truism:
• “If you are not paying for it, you’re not the customer; you’re
the product being sold.” —blue_beetle on MetaFilter
Amazon
• OverDrive signs a deal with Amazon to
lend Kindle ebooks through libraries.
• To do this, patrons have to tell Amazon their Kindle
identier, just as though they were buying the book.

• Amazon sends “hi, your loan is ending,
how about buying the book?” messages
to patrons.
• And is, as far as anybody knows, keeping information
about who checked out what.
Try it yourself: JSTOR
• JSTOR “Register and Read” program
• Give non-affiliated scholars/interested public unpaid
access to JSTOR, in return for a signup that ties reading
to the signup’s email address.

• Let’s look at their privacy policy.
• http://www.jstor.org/page/info/about/policies/privacy.jsp
• What info are they collecting? Reidentification risk?
• What risks might there be to program participants with
respect to what they read?
• What do they say they can do with it?
• How is this different from standard library policies,
practices, and legal protections?
Try it yourself: JSTOR

• Real reason to worry: Swartz case.
• Is loss of privacy an unintended side effect
of library disintermediation/disruption?
• If so, what do we do? Without sounding like
a bunch of luddite worrywart Trithemiuses
just out to protect our own jobs?
Privacy in archives
• Boston College IRA case
• Oral histories collected from Northern Irish people
who fought for IRA
• Archivists promised informants not to release until
after those informants died.
• UK authorities: “Fork it over, archivists.”
• Lawsuits flew!

• What would you do?
• You need to decide this. Before something similar
happens to you.
What now?
What people want
• Control of which pieces of data they share.
• Choice about how their data will be used.
• Commitment that their personal data (i.e.,
email address, phone number) won't be
passed on to third parties.  
• Compensation: Consumers also want a
reason to share data, and to understand
how they will benet.
• (via http://www.mediapost.com/publications/article/161410/consumerswilling-to-share-data-but-at-a-price.html)

• Can we do this in libraries? How?
More suggestions
• Don’t collect data you don’t need.
• And throw away data once it’s no longer of use.
• This includes computer logs! (IM chat ref, anyone?)

• Think outside your own demographic box.
• As Google seems to have so much trouble doing...

• Be transparent.
• Be activist. We have a bully pulpit!
• PAY ATTENTION to the security and privacy of
library IT infrastructure.
• This EMPHATICALLY includes the ramifications of thirdparty IT such as “like” buttons.
• It also includes contracts with content providers. A privacy
review should be an intrinsic part of collection development.
Rule of thumb?
• In the absence of a warrant or subpoena,
don’t keep or disclose information about
the behavior of identiable patrons until
the patron has not only consented, but
ASKED YOU to retain or disclose the
information.
• AND MAYBE NOT EVEN THEN.
• We know people make poor choices here!
Protecting digital privacy
• My suggestions: encryption, deletion,
awareness.
• Encryption is where it’s at, folks. It’s not perfect, but
it’s the best we’ve got.
• Delete digital records. As often as possible. Perhaps
oftener. (Sorry, records managers and digital
archivists! Privacy comes rst!)
• Try to be aware of when your data are being
collected. Websites like tosdr.org (and the
associated browser plugins) help!
Example: cloud storage
• Cloud storage services almost all encrypt
data at some point.
• Google Drive, not so much. Just so you know.

• Important questions: who holds the key, and
when are the data locked up?
• Dropbox, Box (for now): They hold the key. This means
they can rat you out, snoop, etc. Also means that data
travel in the clear, and are vulnerable to packet-sning!
NOT SECURE.
• SpiderOak: YOU hold the key, and encryption happens
on YOUR machine, before data move over the network.
SpiderOak doesn’t even see your data unencrypted,
can’t decrypt it. Secure, but don’t lose passwords!
Example: protecting your
web surng from marketers
• Remember the stuff I discussed last week with
respect to browser security? It can help protect your
privacy as well.
•
•
•
•
•

On an untrusted network, use a VPN to prevent packet-sning.
Do not let your browser accept third-party cookies.
Use adblocking, tracking-blocking browser add-ins liberally.
Grab the “HTTPS Everywhere” browser add-in from the EFF.
Turn on the “Do Not Track” setting in your browser; it doesn’t do
much, but it does something at least.

• Serious question: which of these should we install on
patron computers?
• Or is that too paternalistic, and patrons will be upset when
Facebook likes don’t work?
• Can we at least raise awareness, e.g. with tosdr.org plugin?
Example: smartphones
• I DON’T EVEN KNOW, folks.
• Smartphone owners do not control their
phone’s privacy/security. Either Apple or
their carrier (Android phones) does.
• Phones leak data all over the place!
• Location data particularly, but all “metadata” is of
concern.

• I don’t see an answer except better law.
• Carriers are constrained by current legal framework
to keep metadata indenitely!
Bottom line:
• Libraries and archives generally do privacy
right. We certainly care about it!
• A lot of online businesses are doing privacy
very, very wrong.
• Not to mention the feds!

• And a lot of regular people are in no position
to navigate the hazards.
• So we have a serious problem on our hands!
• And we owe it to civil society to continue to set a good
example.

Weitere ähnliche Inhalte

Was ist angesagt?

Zak Mensah: Self-publishing in Education
Zak Mensah: Self-publishing in EducationZak Mensah: Self-publishing in Education
Zak Mensah: Self-publishing in EducationARLISUKI
 
Educators & Librarians in SL
Educators & Librarians in SLEducators & Librarians in SL
Educators & Librarians in SLLorri Mon
 
Paul Gough: Keynote Speech
Paul Gough: Keynote SpeechPaul Gough: Keynote Speech
Paul Gough: Keynote SpeechARLISUKI
 
Closing Plenary: National Digital Forum
Closing Plenary: National Digital ForumClosing Plenary: National Digital Forum
Closing Plenary: National Digital ForumGeorge Oates
 
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...lisbk
 
The time for Libraries is NOW
The time for Libraries is NOWThe time for Libraries is NOW
The time for Libraries is NOWNed Potter
 
Social media for the scared february 2013
Social media for the scared february 2013Social media for the scared february 2013
Social media for the scared february 2013Bex Lewis
 
Where are Repository's Going?
Where are Repository's Going?Where are Repository's Going?
Where are Repository's Going?benosteen
 
Transforming Our Vision to Enhance Library Services
Transforming Our Vision to Enhance Library ServicesTransforming Our Vision to Enhance Library Services
Transforming Our Vision to Enhance Library ServicesSt. Petersburg College
 
Caslis Feb2010
Caslis Feb2010Caslis Feb2010
Caslis Feb2010guest4d312f
 
Scanned and Delivered: How the DHLab made remote research work
Scanned and Delivered: How the DHLab made remote research workScanned and Delivered: How the DHLab made remote research work
Scanned and Delivered: How the DHLab made remote research workYHRUploads
 
UKSG 2015 Mechanical curator and British Library labs
UKSG 2015  Mechanical curator and British Library labsUKSG 2015  Mechanical curator and British Library labs
UKSG 2015 Mechanical curator and British Library labsbenosteen
 
DPLA - an introduction for historians
DPLA  - an introduction for historiansDPLA  - an introduction for historians
DPLA - an introduction for historiansLarry Naukam
 
Web 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy TeachersWeb 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy Teacherssraslim
 
Using Web 2 0 Tools To "Enliven" Projects Nov 20
Using Web 2 0 Tools To "Enliven" Projects Nov 20Using Web 2 0 Tools To "Enliven" Projects Nov 20
Using Web 2 0 Tools To "Enliven" Projects Nov 20Anna Koval
 

Was ist angesagt? (20)

Zak Mensah: Self-publishing in Education
Zak Mensah: Self-publishing in EducationZak Mensah: Self-publishing in Education
Zak Mensah: Self-publishing in Education
 
Educators & Librarians in SL
Educators & Librarians in SLEducators & Librarians in SL
Educators & Librarians in SL
 
Thumbs up!
Thumbs up!Thumbs up!
Thumbs up!
 
Paul Gough: Keynote Speech
Paul Gough: Keynote SpeechPaul Gough: Keynote Speech
Paul Gough: Keynote Speech
 
Closing Plenary: National Digital Forum
Closing Plenary: National Digital ForumClosing Plenary: National Digital Forum
Closing Plenary: National Digital Forum
 
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...
Web 2.0: How to Stop Thinking and Start Doing: Addressing Organisational Barr...
 
The time for Libraries is NOW
The time for Libraries is NOWThe time for Libraries is NOW
The time for Libraries is NOW
 
Hacking Libraries
Hacking LibrariesHacking Libraries
Hacking Libraries
 
Social media for the scared february 2013
Social media for the scared february 2013Social media for the scared february 2013
Social media for the scared february 2013
 
Where are Repository's Going?
Where are Repository's Going?Where are Repository's Going?
Where are Repository's Going?
 
Transforming Our Vision to Enhance Library Services
Transforming Our Vision to Enhance Library ServicesTransforming Our Vision to Enhance Library Services
Transforming Our Vision to Enhance Library Services
 
Caslis Feb2010
Caslis Feb2010Caslis Feb2010
Caslis Feb2010
 
Scanned and Delivered: How the DHLab made remote research work
Scanned and Delivered: How the DHLab made remote research workScanned and Delivered: How the DHLab made remote research work
Scanned and Delivered: How the DHLab made remote research work
 
Curation North Carolina
Curation North CarolinaCuration North Carolina
Curation North Carolina
 
UKSG 2015 Mechanical curator and British Library labs
UKSG 2015  Mechanical curator and British Library labsUKSG 2015  Mechanical curator and British Library labs
UKSG 2015 Mechanical curator and British Library labs
 
DPLA - an introduction for historians
DPLA  - an introduction for historiansDPLA  - an introduction for historians
DPLA - an introduction for historians
 
Situation Dänemark
Situation DänemarkSituation Dänemark
Situation Dänemark
 
Web 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy TeachersWeb 2.0 Excerpt for Troy Teachers
Web 2.0 Excerpt for Troy Teachers
 
Using Web 2 0 Tools To "Enliven" Projects Nov 20
Using Web 2 0 Tools To "Enliven" Projects Nov 20Using Web 2 0 Tools To "Enliven" Projects Nov 20
Using Web 2 0 Tools To "Enliven" Projects Nov 20
 
SWONtech News for July, 2012
SWONtech News for July, 2012SWONtech News for July, 2012
SWONtech News for July, 2012
 

Andere mochten auch

Canoe the Open Content Rapids
Canoe the Open Content RapidsCanoe the Open Content Rapids
Canoe the Open Content RapidsDorothea Salo
 
Databases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDatabases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDorothea Salo
 
Escaping the Red Queen's Race with Open Access
Escaping the Red Queen's Race with Open AccessEscaping the Red Queen's Race with Open Access
Escaping the Red Queen's Race with Open AccessDorothea Salo
 
Research Data and Scholarly Communication
Research Data and Scholarly CommunicationResearch Data and Scholarly Communication
Research Data and Scholarly CommunicationDorothea Salo
 
MARC and BIBFRAME; Linking libraries and archives
MARC and BIBFRAME; Linking libraries and archivesMARC and BIBFRAME; Linking libraries and archives
MARC and BIBFRAME; Linking libraries and archivesDorothea Salo
 
Le IR, c'est mort. Vive le IR!
Le IR, c'est mort. Vive le IR!Le IR, c'est mort. Vive le IR!
Le IR, c'est mort. Vive le IR!Dorothea Salo
 
Taming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsTaming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsDorothea Salo
 
Risk management and auditing
Risk management and auditingRisk management and auditing
Risk management and auditingDorothea Salo
 
Digital preservation and institutional repositories
Digital preservation and institutional repositoriesDigital preservation and institutional repositories
Digital preservation and institutional repositoriesDorothea Salo
 
Library Linked Data
Library Linked DataLibrary Linked Data
Library Linked DataDorothea Salo
 
What We Organize
What We OrganizeWhat We Organize
What We OrganizeDorothea Salo
 
The Social Journal
The Social JournalThe Social Journal
The Social JournalDorothea Salo
 
Codnuita IAB
Codnuita IABCodnuita IAB
Codnuita IABFreelancer
 
Altctrl Presentation Geek
Altctrl Presentation GeekAltctrl Presentation Geek
Altctrl Presentation GeekFreelancer
 
Librarians love data!
Librarians love data!Librarians love data!
Librarians love data!Dorothea Salo
 
Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Dorothea Salo
 
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)Dorothea Salo
 
Social Networks And Private Life
Social Networks And Private LifeSocial Networks And Private Life
Social Networks And Private LifeFreelancer
 
Din Cascada, Prin Spirala, Inspre Programari
Din Cascada, Prin Spirala, Inspre ProgramariDin Cascada, Prin Spirala, Inspre Programari
Din Cascada, Prin Spirala, Inspre ProgramariFreelancer
 
Web Stock09 Viorel Spinu
Web Stock09 Viorel SpinuWeb Stock09 Viorel Spinu
Web Stock09 Viorel SpinuFreelancer
 

Andere mochten auch (20)

Canoe the Open Content Rapids
Canoe the Open Content RapidsCanoe the Open Content Rapids
Canoe the Open Content Rapids
 
Databases, Markup, and Regular Expressions
Databases, Markup, and Regular ExpressionsDatabases, Markup, and Regular Expressions
Databases, Markup, and Regular Expressions
 
Escaping the Red Queen's Race with Open Access
Escaping the Red Queen's Race with Open AccessEscaping the Red Queen's Race with Open Access
Escaping the Red Queen's Race with Open Access
 
Research Data and Scholarly Communication
Research Data and Scholarly CommunicationResearch Data and Scholarly Communication
Research Data and Scholarly Communication
 
MARC and BIBFRAME; Linking libraries and archives
MARC and BIBFRAME; Linking libraries and archivesMARC and BIBFRAME; Linking libraries and archives
MARC and BIBFRAME; Linking libraries and archives
 
Le IR, c'est mort. Vive le IR!
Le IR, c'est mort. Vive le IR!Le IR, c'est mort. Vive le IR!
Le IR, c'est mort. Vive le IR!
 
Taming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation ToolsTaming the Monster: Digital Preservation Planning and Implementation Tools
Taming the Monster: Digital Preservation Planning and Implementation Tools
 
Risk management and auditing
Risk management and auditingRisk management and auditing
Risk management and auditing
 
Digital preservation and institutional repositories
Digital preservation and institutional repositoriesDigital preservation and institutional repositories
Digital preservation and institutional repositories
 
Library Linked Data
Library Linked DataLibrary Linked Data
Library Linked Data
 
What We Organize
What We OrganizeWhat We Organize
What We Organize
 
The Social Journal
The Social JournalThe Social Journal
The Social Journal
 
Codnuita IAB
Codnuita IABCodnuita IAB
Codnuita IAB
 
Altctrl Presentation Geek
Altctrl Presentation GeekAltctrl Presentation Geek
Altctrl Presentation Geek
 
Librarians love data!
Librarians love data!Librarians love data!
Librarians love data!
 
Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)Research Data and Scholarly Communication (with notes)
Research Data and Scholarly Communication (with notes)
 
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
The Canonically Bad (Digital) Humanities Proposal (and how to avoid it)
 
Social Networks And Private Life
Social Networks And Private LifeSocial Networks And Private Life
Social Networks And Private Life
 
Din Cascada, Prin Spirala, Inspre Programari
Din Cascada, Prin Spirala, Inspre ProgramariDin Cascada, Prin Spirala, Inspre Programari
Din Cascada, Prin Spirala, Inspre Programari
 
Web Stock09 Viorel Spinu
Web Stock09 Viorel SpinuWeb Stock09 Viorel Spinu
Web Stock09 Viorel Spinu
 

Ähnlich wie Privacy and libraries

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningHJ van Veen
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and uxEric Reiss
 
Ethics and ux ux sofia nov 2018
Ethics and ux ux sofia nov 2018Ethics and ux ux sofia nov 2018
Ethics and ux ux sofia nov 2018Eric Reiss
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Eric Reiss
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
privacy and security
privacy and securityprivacy and security
privacy and securityronit_jadhav
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revisedlibraryreeder
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalistsEllyn Angelotti
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionMarcus Leaning
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracySarah Uthoff
 
Ripped from the headlines 10 26-2011
Ripped from the headlines 10 26-2011Ripped from the headlines 10 26-2011
Ripped from the headlines 10 26-2011aswitzer1
 

Ähnlich wie Privacy and libraries (20)

Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better world
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine Learning
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 
Ethics and ux ux sofia nov 2018
Ethics and ux ux sofia nov 2018Ethics and ux ux sofia nov 2018
Ethics and ux ux sofia nov 2018
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revised
 
Legal issues facing journalists
Legal issues facing journalistsLegal issues facing journalists
Legal issues facing journalists
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 Introduction
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Digital Natives? Basics of Information Literacy
Digital Natives? Basics of Information LiteracyDigital Natives? Basics of Information Literacy
Digital Natives? Basics of Information Literacy
 
Ripped from the headlines 10 26-2011
Ripped from the headlines 10 26-2011Ripped from the headlines 10 26-2011
Ripped from the headlines 10 26-2011
 

Mehr von Dorothea Salo

Preservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesPreservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesDorothea Salo
 
Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Dorothea Salo
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing SerendipityDorothea Salo
 
Occupy Copyright!
Occupy Copyright!Occupy Copyright!
Occupy Copyright!Dorothea Salo
 
RDF, RDA, and other TLAs
RDF, RDA, and other TLAsRDF, RDA, and other TLAs
RDF, RDA, and other TLAsDorothea Salo
 
I own copyright, so I pwn you!
I own copyright, so I pwn you!I own copyright, so I pwn you!
I own copyright, so I pwn you!Dorothea Salo
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's WayDorothea Salo
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing SerendipityDorothea Salo
 
Lipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsLipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsDorothea Salo
 
Escaping Datageddon
Escaping DatageddonEscaping Datageddon
Escaping DatageddonDorothea Salo
 
So are we winning yet?
So are we winning yet?So are we winning yet?
So are we winning yet?Dorothea Salo
 
So are we winning yet?
So are we winning yet?So are we winning yet?
So are we winning yet?Dorothea Salo
 
Open Sesame (and other open movements)
Open Sesame (and other open movements)Open Sesame (and other open movements)
Open Sesame (and other open movements)Dorothea Salo
 

Mehr von Dorothea Salo (17)

Encryption
EncryptionEncryption
Encryption
 
Preservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanitiesPreservation and institutional repositories for the digital arts and humanities
Preservation and institutional repositories for the digital arts and humanities
 
Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?
 
FRBR and RDA
FRBR and RDAFRBR and RDA
FRBR and RDA
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing Serendipity
 
Occupy Copyright!
Occupy Copyright!Occupy Copyright!
Occupy Copyright!
 
RDF, RDA, and other TLAs
RDF, RDA, and other TLAsRDF, RDA, and other TLAs
RDF, RDA, and other TLAs
 
I own copyright, so I pwn you!
I own copyright, so I pwn you!I own copyright, so I pwn you!
I own copyright, so I pwn you!
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's Way
 
Manufacturing Serendipity
Manufacturing SerendipityManufacturing Serendipity
Manufacturing Serendipity
 
Open Content
Open ContentOpen Content
Open Content
 
Lipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library SystemsLipstick on a Pig: Integrated Library Systems
Lipstick on a Pig: Integrated Library Systems
 
Metadata
MetadataMetadata
Metadata
 
Escaping Datageddon
Escaping DatageddonEscaping Datageddon
Escaping Datageddon
 
So are we winning yet?
So are we winning yet?So are we winning yet?
So are we winning yet?
 
So are we winning yet?
So are we winning yet?So are we winning yet?
So are we winning yet?
 
Open Sesame (and other open movements)
Open Sesame (and other open movements)Open Sesame (and other open movements)
Open Sesame (and other open movements)
 

KĂźrzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

KĂźrzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Privacy and libraries

  • 1. Privacy and libraries LIS 644 Dorothea Salo
  • 2. Privacy vs. security • A security problem can violate privacy, sure. • But the violation is inadvertent! And often involves some illegality! • We’re not talking about that today; we’ve done so already. • We’re talking about perfectly legal (usually) uses of information that still (potentially or actually) violate privacy. • This is a mineeld. I don’t have all the answers. We MUST still ask the questions.
  • 3. What is privacy, really? • “Exposure of personal information” is too easy an answer. • Exposure of what to whom, exactly? • danah boyd: “respecting context” • Consider your social circles. You have several of them. What happens to them online? • So privacy is partly the ability to practice “selective disclosure” (another boyd-ism). • Privacy is also trust that those we interact with will not betray us. • What’s betrayal in a library context, and how do libraries avoid it?
  • 4. Why do we care? • Privacy of information use is a cornerstone of intellectual freedom. • ALA Code of Ethics: • III. We protect each library user's right to privacy and condentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted. • Additional concerns include: • Privacy of research subjects in collected data • Privacy of living individuals mentioned in archival materials • Privacy of condential business records • Privacy for especially vulnerable individuals
  • 5. What is “freedom to read?” • Historically: preventing Big Brother from watching patrons’ checkout histories • Remember the Patriot Act? How ‘bout that NSA? • What happens to circ records nowadays? How did moving circ records digital help privacy? • Today: is Big Brother the only threat? • Who else wants information, and will pay and/or bug to get it? • Historically: censorship and book banning • Today: is that all that keeps good information out of the hands of patrons?
  • 6. Do we have privacy laws? • Not in the US. Not really. • We have libel and slander laws, and laws about children’s information online (remember those?). Limited “invasion of physical space” laws. • Consumer-privacy laws have been introduced in Congress. No joy... yet. • We often have laws/ordinances around library patron information. • And even in the absence of law we SHOULD (and usually do) have policy. • KNOW THE LAW AND POLICY where you are. • It’s different in Canada and Europe. • Canada has even taken Facebook to the cleaners once or twice.
  • 7. Why do privacy problems happen? • Monetary benet • Accident or ineptitude (see thedailywtf.com) • Privilege and associated thoughtlessness • Google Buzz: testing with its own (white, male, healthy, wealthy, educated) engineers and no one else. • Collapse of realspace social boundaries on the web • This is a service-design problem! Human beings manage just ne in realspace. Our online tools don’t give us the affordances we need to replicate that success online. • Web is more than the sum of its parts. • Most scarily: DESIRE TO OFFER GOOD SERVICE, e.g. recommender engines.
  • 8. Libraries and privacy • It’s not as simple as “always protect patron privacy!” • What about libraries and social media? Will we wipe librarians off the Web? Really? • What about user studies for service improvement? • What about patron communities that form around our materials and services? • What about users who WANT to share what they read, watch, and listen to? Will we shake our paternalistic ngers at them and tell them no? • What about digitization projects? Research? • “How” is getting harder to gure out too.
  • 10. Law hinders privacy research • DMCA! • If there’s information about you on a machine you own (or even one you don’t), and the only way you can nd out about it is to hack the machine... • These lawsuits have happened. • Often they go away very quickly as the vocal tech community shames the plaintiff. • But Ed Felten of Princeton has been in and out of court so many times...
  • 11. Public records • Back in the day, if you wanted a public record, you went to a physical building, combed through le cabinets, and paid for the privilege. • This is a variant on security-by-obscurity. • Now many public records are online. Easy discovery and easy access make them A LOT MORE PUBLIC. • How should we, as citizens, respond? • As records managers/archivists/librarians, how should we educate, train, and refer?
  • 14. Email • So how ‘bout that Petraeus guy? • Email is only very loosely legally protected at present. • Larger point: we have the privacy protections we do because they are enshrined in law, not because they’re societal norms. They’re pretty clearly not. • Email is sent in the clear unless you take encryption precautions. • Even then it may be readable if your inbox is hacked. • Your employer owns its email systems and email sent on them. Behave accordingly. • Students: using non-university email may bypass FERPA protections.
  • 15. What is “reidentication” or “de-anonymization”? • Imagine this scenario: • One website has your name, age, zipcode, and gender. • Another has your age, gender, zipcode, pseudonym, and dubious or sensitive taste in entertainment. • If the info from both sites can be collated, you can be pegged to your taste. • And your pseudonym just got exposed. Hope you weren’t using it anywhere else... • We aren’t as unique as we think! • “Anonymizing” data doesn’t x this. • We can be identied by our attributes, friends, and behavior almost as easily as by regular identiers. • What price public records NOW?
  • 16. Reidentication horror scenarios • Health information • Wouldn’t your insurance company like to know...? • Becoming a major issue in health research! • “Character witnessing” • Are you an atheist? A gamer (this came up in a 2012 political campaign)? GLBTQ and not out? A person of color who’s passing? A woman in IT? A whistleblower? • A target for harm • Physical, legal, nancial, employment, mental/emotional (bullying) • Where could library-patron information gure in to this? Archives informants?
  • 18. What information does the web collect about us? • “Personal information” • Including health information, demography. • Financial information • Information about our habits • Purchasing habits • Entertainment habits (including, yes, reading habits) • Search habits • Information about our physical location • through IP addresses or through web services like Foursquare • Information about our social lives • And then it correlates as much of this as it can!
  • 19. How is this information collected? • Through server and search logs (IP addresses) • Through sign-ins • some of which are “real name required” • Geolocation of our gadgetry • Browser “fingerprinting” • Which version, with what add-ons, on which OS... unique! • Human error (and exploitation thereof ) • Through observation of our behavior on individual websites and across websites • Cookies, Flash cookies, “web bugs.” Worst case: “keyloggers.” • Our online associates’ behavior • Which we obviously don’t control! • How much of this are we actually aware of? How much do sites disclose? Let us control?
  • 20. Effects • ... on citizenship • ... on open discourse • ... on vulnerable populations • ... on markets • is privacy-endangerment a winner-take-all market? • what about online redlining?
  • 22. Privacy and ebooks • Ebook vendors, unlike libraries, do not necessarily purge records of what you read. • You are entirely at their mercy as far as who they share those records with and what they do with them. • Are they collecting info from library patrons too? Unclear! • Because of this and DRM, they can also take away what you want to read. • And then there’s what you search for, or look at, but don’t read. • What do we do about this? What should we do?
  • 23. Facebook has sold... • • • • Your phone number Information about your purchases Information about your social network Information about Facebook campaigns you’ve participated in • Information about what you’ve “liked.” • While refusing to let you opt out of the sale of this information. • Your likeness, for advertisers to use on your friends. • Google ain’t much better, and is getting worse.
  • 24. Others have tried to use Facebook to... • Screen employees • including by requiring applicants to hand over Facebook passwords! • (To Facebook’s credit, it actually fought this one.) • Perform background checks (for employment or other reasons) • Do social-science research, sans informed consent • At Harvard, some researchers made their RAs hand over their Facebook passwords so they could see friendslocked material. • How are you feeling about your Facebook?
  • 25. Guess what? • Facebook has sold MY information too, and I refuse to use Facebook! • Look up “shadow proles” sometime. • If you delete your account, Facebook keeps and continues to sell your information. • Facebook may or may not actually delete photos when you delete them. • Guess why I don’t use Facebook? • Should libraries? Conflict between privacy ethics and “go where the patrons are.”
  • 26. “Like” buttons • When you log into Facebook, Facebook knows you visited any page with a “Like” button on it, even if you do not click Like. • Facebook has also been caught tracking this on logged-out users. They claim they’ve stopped. • If your library puts Like buttons on catalog pages... (you do the math) • Not just a Facebook issue, by the way. • Social-media truism: • “If you are not paying for it, you’re not the customer; you’re the product being sold.” —blue_beetle on MetaFilter
  • 27. Amazon • OverDrive signs a deal with Amazon to lend Kindle ebooks through libraries. • To do this, patrons have to tell Amazon their Kindle identier, just as though they were buying the book. • Amazon sends “hi, your loan is ending, how about buying the book?” messages to patrons. • And is, as far as anybody knows, keeping information about who checked out what.
  • 28. Try it yourself: JSTOR • JSTOR “Register and Read” program • Give non-aliated scholars/interested public unpaid access to JSTOR, in return for a signup that ties reading to the signup’s email address. • Let’s look at their privacy policy. • http://www.jstor.org/page/info/about/policies/privacy.jsp • What info are they collecting? Reidentication risk? • What risks might there be to program participants with respect to what they read? • What do they say they can do with it? • How is this different from standard library policies, practices, and legal protections?
  • 29. Try it yourself: JSTOR • Real reason to worry: Swartz case. • Is loss of privacy an unintended side effect of library disintermediation/disruption? • If so, what do we do? Without sounding like a bunch of luddite worrywart Trithemiuses just out to protect our own jobs?
  • 30. Privacy in archives • Boston College IRA case • Oral histories collected from Northern Irish people who fought for IRA • Archivists promised informants not to release until after those informants died. • UK authorities: “Fork it over, archivists.” • Lawsuits flew! • What would you do? • You need to decide this. Before something similar happens to you.
  • 32. What people want • Control of which pieces of data they share. • Choice about how their data will be used. • Commitment that their personal data (i.e., email address, phone number) won't be passed on to third parties.   • Compensation: Consumers also want a reason to share data, and to understand how they will benet. • (via http://www.mediapost.com/publications/article/161410/consumerswilling-to-share-data-but-at-a-price.html) • Can we do this in libraries? How?
  • 33. More suggestions • Don’t collect data you don’t need. • And throw away data once it’s no longer of use. • This includes computer logs! (IM chat ref, anyone?) • Think outside your own demographic box. • As Google seems to have so much trouble doing... • Be transparent. • Be activist. We have a bully pulpit! • PAY ATTENTION to the security and privacy of library IT infrastructure. • This EMPHATICALLY includes the ramications of thirdparty IT such as “like” buttons. • It also includes contracts with content providers. A privacy review should be an intrinsic part of collection development.
  • 34. Rule of thumb? • In the absence of a warrant or subpoena, don’t keep or disclose information about the behavior of identiable patrons until the patron has not only consented, but ASKED YOU to retain or disclose the information. • AND MAYBE NOT EVEN THEN. • We know people make poor choices here!
  • 35. Protecting digital privacy • My suggestions: encryption, deletion, awareness. • Encryption is where it’s at, folks. It’s not perfect, but it’s the best we’ve got. • Delete digital records. As often as possible. Perhaps oftener. (Sorry, records managers and digital archivists! Privacy comes rst!) • Try to be aware of when your data are being collected. Websites like tosdr.org (and the associated browser plugins) help!
  • 36. Example: cloud storage • Cloud storage services almost all encrypt data at some point. • Google Drive, not so much. Just so you know. • Important questions: who holds the key, and when are the data locked up? • Dropbox, Box (for now): They hold the key. This means they can rat you out, snoop, etc. Also means that data travel in the clear, and are vulnerable to packet-sning! NOT SECURE. • SpiderOak: YOU hold the key, and encryption happens on YOUR machine, before data move over the network. SpiderOak doesn’t even see your data unencrypted, can’t decrypt it. Secure, but don’t lose passwords!
  • 37. Example: protecting your web surng from marketers • Remember the stuff I discussed last week with respect to browser security? It can help protect your privacy as well. • • • • • On an untrusted network, use a VPN to prevent packet-sning. Do not let your browser accept third-party cookies. Use adblocking, tracking-blocking browser add-ins liberally. Grab the “HTTPS Everywhere” browser add-in from the EFF. Turn on the “Do Not Track” setting in your browser; it doesn’t do much, but it does something at least. • Serious question: which of these should we install on patron computers? • Or is that too paternalistic, and patrons will be upset when Facebook likes don’t work? • Can we at least raise awareness, e.g. with tosdr.org plugin?
  • 38. Example: smartphones • I DON’T EVEN KNOW, folks. • Smartphone owners do not control their phone’s privacy/security. Either Apple or their carrier (Android phones) does. • Phones leak data all over the place! • Location data particularly, but all “metadata” is of concern. • I don’t see an answer except better law. • Carriers are constrained by current legal framework to keep metadata indenitely!
  • 39. Bottom line: • Libraries and archives generally do privacy right. We certainly care about it! • A lot of online businesses are doing privacy very, very wrong. • Not to mention the feds! • And a lot of regular people are in no position to navigate the hazards. • So we have a serious problem on our hands! • And we owe it to civil society to continue to set a good example.