SlideShare ist ein Scribd-Unternehmen logo
1 von 20
LIBRARIES
and
privacy
IN THE DIGITAL AGE
Photo Copyright © 2015 Pulp and Pixels
Why do libraries
so much about
“Choice requires both a
varied selection and the
assurance that one's
choice is not monitored.”
H A V E L A W S P R O T E C T I N G T H E
CONFIDENTIALITYOFLIBRARYRECORDS48 STATES Kentucky & Hawaii have attorney general's opinionsPlus the district of Columbia
Any library record, the primary
purpose of which is to maintain
control of library materials, or to gain
access to information, that discloses or
could be used to disclose the identity
of a library user is exempt from
disclosure under this chapter.
RCW 42.56.310
The Librarywillkeeppatron records confidentialand will
not disclosethis information except asnecessaryforthe
properoperationof theLibrary,upon consent of theuser,
pursuant to subpoena or court order, or as otherwise
required by law.
The Library retains the minimum
number of records necessary for
maintaining operations.
Public computer information is
automatically deleted at the end of
a session.
Information about check-outs and
returns is automatically deleted at
day-end (unless the patron has fines
or has been referred to a materials
recovery agency).
Mandatory library staff training in
library policy and intellectual
freedom principles
PROCEDURES
DISRUPTIONS
Third-party Digital Content and Services
D I G I T A L R I G H T S M A N A G E M E N T
T E N S I O N S B E T W E E N S E C U r i t y
a n d c i v i l l i b e r t i e s
Photo Copyright © 2015 The Weather Channel, LLC
USA PATRIOT Act
Section215 permits gov’tto secretly
request and obtain library records
forlarge numbers of individuals
without any reason to believe they
are involvedin illegal activity
Section505permits the FBI to obtain
electronic records fromlibraries with
a National Security Letter without
priorjudicial oversight
Photo by Jessamyn West / CC BY 2.0
LIBRARY• Controlled data
• Governed by local policy
CONTENT PROVIDERS• Shared data
• Governed by contract
DRM SERVICES• Shared data
• Governed by Terms of Use
CONTENT OWNERS• Shared data
• Governed by Terms of Use
Photo © Disabled Sports USA
patrons• Personal data
• Governed by self-interest, rights
Basic CONTRACTS
• Online catalog
• Databases
• Journals
• Periodicals
Photo Copyright ©2015 Designtechnica Corporation.
Seattle Public Library
expresses ‘concern and
alarm’ over Adobe’s
data tracking policies
Taylor Soper on GeekWire.com, October 8, 2014
1. Clarify what data is
being collected,
especially if that data
contains PII
2. Explain how long the
data is bring retained
3. Stop transmitting data
in plain text
Photo. Evil Mad Scientist
Labs. © 2009
“The Library has teamed up
with reputable third party
partners in order to provide
certain services to its users.
Information a patron submits
to the Library may be
provided to those third
parties so they can assist the
Library in providing certain
services. Users are
encouraged to read and
become familiar with the
privacy policies of these
third party partners.”
“Solving social
problems by restricting
technology and
preventing you from
access to those
restrictions reduces
privacy and security.”
Photo CCA3 Jonathan Worth, JonathanWorth.com
Cory Doctorow

Weitere ähnliche Inhalte

Andere mochten auch

#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating OpportunitiesHaiku Deck
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our pathsCatherine Cronin
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumMr Cornish
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014Victor Imobsync
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Upside Learning Solutions
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerUpside Learning Solutions
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School LeadershipJudy O'Connell
 
Cybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationCybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationLinkedIn Learning Solutions
 
Colleges that get you the BEST internships!
Colleges that get you the BEST internships!Colleges that get you the BEST internships!
Colleges that get you the BEST internships!The Princeton Review
 
Ruang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranRuang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranUwes Chaeruman
 
What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?Vizwik
 
Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Martin Hamilton
 
3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearningUpside Learning Solutions
 
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionThe CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionSarah Maxell Crosby
 
Create a productive workplace
Create a productive workplaceCreate a productive workplace
Create a productive workplaceDaniel Goleman
 

Andere mochten auch (20)

Dynamics Of Gdp
Dynamics  Of GdpDynamics  Of Gdp
Dynamics Of Gdp
 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our paths
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National Curriculum
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional Designer
 
Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Venezuela Technology Integration 2015
Venezuela Technology Integration 2015
 
MOOCs: still a viable business model?
MOOCs: still a viable business model?MOOCs: still a viable business model?
MOOCs: still a viable business model?
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School Leadership
 
Cybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationCybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your Organisation
 
Colleges that get you the BEST internships!
Colleges that get you the BEST internships!Colleges that get you the BEST internships!
Colleges that get you the BEST internships!
 
Ruang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranRuang lingkup desain pembelajaran
Ruang lingkup desain pembelajaran
 
What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?
 
The Design Of Interaction For eLearning
The Design Of Interaction For eLearningThe Design Of Interaction For eLearning
The Design Of Interaction For eLearning
 
Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015
 
3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning
 
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionThe CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
 
Converting eLearning to mLearning
Converting eLearning to mLearning Converting eLearning to mLearning
Converting eLearning to mLearning
 
Create a productive workplace
Create a productive workplaceCreate a productive workplace
Create a productive workplace
 

Ähnlich wie LIBRARIES AND PRIVACY IN THE DIGITAL AGE

Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
 
De-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceDe-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceBecky Yoose
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSAnnelore van der Lint
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeDuane Blackburn
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eedGideon Ale
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal InvestigationsIan Tausig
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf Mark Scrimshire
 
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored
 
Uniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateUniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateMary Jenkins
 

Ähnlich wie LIBRARIES AND PRIVACY IN THE DIGITAL AGE (20)

Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
 
De-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceDe-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and Intelligence
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics Cooperative
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal Investigations
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
After 9 11
After 9 11After 9 11
After 9 11
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
 
Uniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateUniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act Update
 

Mehr von Jim Loter

SPL Technology and Access Service Priority
SPL Technology and Access Service PrioritySPL Technology and Access Service Priority
SPL Technology and Access Service PriorityJim Loter
 
Seattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitSeattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitJim Loter
 
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...Jim Loter
 
SPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportSPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportJim Loter
 
SPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationSPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationJim Loter
 
Mobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryMobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryJim Loter
 
Connecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryConnecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryJim Loter
 

Mehr von Jim Loter (7)

SPL Technology and Access Service Priority
SPL Technology and Access Service PrioritySPL Technology and Access Service Priority
SPL Technology and Access Service Priority
 
Seattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitSeattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend Summit
 
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
 
SPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportSPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final Report
 
SPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationSPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - Presentation
 
Mobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryMobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public Library
 
Connecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryConnecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public Library
 

Kürzlich hochgeladen

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Kürzlich hochgeladen (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

LIBRARIES AND PRIVACY IN THE DIGITAL AGE

  • 1. LIBRARIES and privacy IN THE DIGITAL AGE Photo Copyright © 2015 Pulp and Pixels
  • 2. Why do libraries so much about “Choice requires both a varied selection and the assurance that one's choice is not monitored.”
  • 3. H A V E L A W S P R O T E C T I N G T H E CONFIDENTIALITYOFLIBRARYRECORDS48 STATES Kentucky & Hawaii have attorney general's opinionsPlus the district of Columbia
  • 4. Any library record, the primary purpose of which is to maintain control of library materials, or to gain access to information, that discloses or could be used to disclose the identity of a library user is exempt from disclosure under this chapter. RCW 42.56.310
  • 5. The Librarywillkeeppatron records confidentialand will not disclosethis information except asnecessaryforthe properoperationof theLibrary,upon consent of theuser, pursuant to subpoena or court order, or as otherwise required by law.
  • 6. The Library retains the minimum number of records necessary for maintaining operations. Public computer information is automatically deleted at the end of a session. Information about check-outs and returns is automatically deleted at day-end (unless the patron has fines or has been referred to a materials recovery agency). Mandatory library staff training in library policy and intellectual freedom principles PROCEDURES
  • 7. DISRUPTIONS Third-party Digital Content and Services D I G I T A L R I G H T S M A N A G E M E N T T E N S I O N S B E T W E E N S E C U r i t y a n d c i v i l l i b e r t i e s Photo Copyright © 2015 The Weather Channel, LLC
  • 8. USA PATRIOT Act Section215 permits gov’tto secretly request and obtain library records forlarge numbers of individuals without any reason to believe they are involvedin illegal activity Section505permits the FBI to obtain electronic records fromlibraries with a National Security Letter without priorjudicial oversight Photo by Jessamyn West / CC BY 2.0
  • 9.
  • 10. LIBRARY• Controlled data • Governed by local policy CONTENT PROVIDERS• Shared data • Governed by contract DRM SERVICES• Shared data • Governed by Terms of Use CONTENT OWNERS• Shared data • Governed by Terms of Use Photo © Disabled Sports USA patrons• Personal data • Governed by self-interest, rights
  • 11. Basic CONTRACTS • Online catalog • Databases • Journals • Periodicals
  • 12.
  • 13.
  • 14. Photo Copyright ©2015 Designtechnica Corporation.
  • 15.
  • 16.
  • 17. Seattle Public Library expresses ‘concern and alarm’ over Adobe’s data tracking policies Taylor Soper on GeekWire.com, October 8, 2014 1. Clarify what data is being collected, especially if that data contains PII 2. Explain how long the data is bring retained 3. Stop transmitting data in plain text
  • 18. Photo. Evil Mad Scientist Labs. © 2009
  • 19. “The Library has teamed up with reputable third party partners in order to provide certain services to its users. Information a patron submits to the Library may be provided to those third parties so they can assist the Library in providing certain services. Users are encouraged to read and become familiar with the privacy policies of these third party partners.”
  • 20. “Solving social problems by restricting technology and preventing you from access to those restrictions reduces privacy and security.” Photo CCA3 Jonathan Worth, JonathanWorth.com Cory Doctorow

Hinweis der Redaktion

  1. My name is Jim Loter, I’m the Director of IT for The Seattle Public Library and one of my primary responsibilities is to manage data collected by the library related to circulation of library materials and use of library technology. It’s a responsibility that we take very seriously and operate under principles that strive to protect the intellectual freedom and freedom of inquiry of our patrons.
  2. 2
  3. As you may know the individual right to privacy is not explicitly addressed in the US Constitution but it has been recognized in many court cases. The state laws related to library privacy vary widely in their approach and details. Some are independent statutes that expressly address library records; others are integrated statutes that address library records in open records laws.
  4. In our state, the Revised Code of Washington addresses library records in the context of open records laws – specifically, it exempts library records from public disclosure. The law does not say anything about privacy but it does direct how records retention schedules are developed. This exemption has allowed us to manage patrons’ records in a way that helps us protect patron privacy.
  5. The Seattle Public Library’s policies are consistent with the library bill of rights, the ALA’s professional guidelines, and applicable state laws. Note, however, that our guarantees are not absolute. For example, we need to keep records to manage and enforce lending books. During the time that we have those records, there are situations, largely related to law enforcement, in which records may be subject to disclosure.
  6. In practice, we treat library data management as a special case of records management. Once you return a book, the data related to your possession of that item is deleted. Importantly all Library staff receive extensive training regarding what information they can disclose. So our practices are not just a function of IT systems but critically rely on effectively trained and committed staff as well.
  7. I’m going to talk about 3 factors that are disrupting the traditional approaches to patron privacy in libraries. I call these “disruptions” rather than challenges because, to me, a challenge implies an obstacle or roadblock that needs to be overcome before you can continue on your path. A disruption changes the very landscape under your feet.
  8. One of the biggest disruptions related to security and civil liberties is the PATRIOT Act. Two sections of the Act address overrides to library privacy protections and restrict libraries’ rights to notify patrons if information has been requested. The ALA urges librarians and advocates to educate the public on the impacts of PATRIOT Act. The Seattle Public Library has information on our web site about the Act.
  9. But Libraries have always been required to comply to subpoenas and search warrants. What has changed are the conditions under which warrants could be obtained by law enforcement and the fact that libraries are effectively under a gag-order if such warrants are served and fulfilled. But borrower records are still exempt from records retention laws and the library still discards those records as soon as we can.
  10. In many cases, libraries contract with third-parties who make digital content available to eligible users. This situation often involves a chain of parties and a process that takes control of patron data further away from patrons and libraries. Some content providers have complex arrangements with content owners that require that data be further shared for Digital Rights Management purposes.
  11. In simple cases, libraries have contracts directly with content providers who agree to manage patron data according to the library’s local policies and practices. These agreements are largely in place with providers of services such as online databases, journals, and periodicals.
  12. We also try to minimize the amount of data that is passed to third-parties. A middleware technology known as “EZProxy” is in widespread use throughout libraries and the content providers we routinely deal with. EZProxy can not only broker logins to digital services but it also proxies a patron’s traffic through the library’s network, thus providing an additional layer of privacy and anonymity.
  13. But the library community lacks a true federated identity and authentication service that can enable practices of secure identity assertion and verification rather than the direct submission of credentials. Current practice opens up a risk that third-parties may intentionally or unintentionally mis-manage data or create records that can be vulnerable to disclosure.
  14. For digital content such as eBooks, most content owners require the use of technology to restrict sharing and copying and to impose time limits on lending. The technology to manage so-called Digital Rights is beyond the scope of most libraries to implement and manage. Libraries generally rely on eContent providers such as OverDrive, to host content and manage the DRM required by publishers.
  15. Even OverDrive relies on yet other parties – such as Adobe – for the DRM technology they use. This practice has required library patrons to establish accounts with Adobe to complete the DRM process. The interplay between the library, OverDrive, and Adobe is not well understood by patrons, or, indeed, by a lot of libraries. The risks inherent in this situation were made manifest last year.
  16. In fall 2014, security researchers noted that the Adobe Digital Editions software transmitted detailed information about a reader’s eBook reading experience to Adobe. Adobe stated that this information is only used to enhance the reading experience but libraries are concerned about unintentional uses.
  17. The library urged Adobe to be more transparent with our patrons about the data it collects. Adobe has since encrypted the data it transmits but otherwise does not seem to altered its other practices. OverDrive, however, has taken steps to minimize Adobe’s access to individual patron data and no longer requires an Adobe ID.
  18. Another area of concern is OverDrive’s relationship with Amazon for fulfillment of eBooks in Amazon Kindle format. OverDrive cannot produce Kindle eBooks directly, so those requests are passed on to Amazon where patrons complete their borrowing transaction. What happens to data that is generated by that process and how long that data is retained is not disclosed, but a safe guess is “anything, and forever.”
  19. The Seattle Public Library acknowledges our relationships with third-parties in our policy and encourage patrons to make educated choices about the services they engage with online.
  20. DRM is the primary reason we need third-party services like OverDrive to exist, and why OverDrive needs to rely on Adobe and Amazon. Libraries have solved the problem of how to store, lend, and distribute millions of physical books; without DRM we can figure out how to do that for digital content and retain better control of your data. Until then, we will continue to protect the data we do have and to advocate for and educate you about how data may be used by others.