Purging User Data to Protect Privacy: a small library's outsized impact

23
www.gc.cuny.edu Purging User Data to Protect Privacy: a small library’s outsized impact Polly Thistlethwaite Chief Librarian The Graduate Center, CUNY New York, NY USA @missreadings

Transcript of Purging User Data to Protect Privacy: a small library's outsized impact

Page 1: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Purging User Data to Protect Privacy:

a small library’s outsized impact

Polly ThistlethwaiteChief LibrarianThe Graduate Center, CUNYNew York, NY USA@missreadings

Page 2: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

The Graduate Center is the doctorate-granting institution of the City University of New York.

Page 3: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Small but Mighty …

Interlibrary loan = ¼ total circulation

Page 4: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Why Keep ILL Data?

Stats for collection development

Users like their request records

To target recommendations to users

Page 5: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Why let it go?

privacy expectations

minimize user tracking

retain data short-term

encourage private inquiry

Page 6: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

"In a library … the right to privacy is the right to open inquiry without having the subject of one's interest … scrutinized by others."

Page 7: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Privacy is so 20th century …

Scott McNealy, Sun Microsystems [on privacy]:

“Get over it.”

Wired, 1999

Mark Zuckerberg,Facebook:

“People have really gotten comfortable … sharing more information of different kinds … more openly and with more people … . That social norm … has evolved … .”

The Guardian, 2010

L. G. Crovitz, Wall Street Journal:

“The benefits of technology have changed people’s expectations about privacy and information.”

Wall Street Journal, 2011

Page 8: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Page 9: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Even if we purge, data persists

Page 10: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Context: FOIL Requests

Page 11: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Page 12: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Page 13: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

ILLiad Script Options

De-linkRecords

break transaction links

Delete old usernames

if without transactions

Delete old transactions

select date parameters

Page 14: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Project Timeline

SEPT OCT NOV DEC JAN

School begins

School break

Blog #1

Mass email

Blog #2

ILLiad alert message

OCLCpreps script

Script runs

IndividualQs

Page 15: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Communication = Key

Page 16: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Media Coverage!

Page 17: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Social Media Buzz

Page 18: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Synergy

Page 19: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Page 20: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Page 21: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

Purging User Data to Protect Privacy: a small library’s outsized impact

Polly ThistlethwaiteThe Graduate Center, CUNY@missreadings

With:Beth Posner, Head of Resource SharingSilvia Cho, Interlibrary Loan Supervisor

Page 22: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

ReferencesAmerican Library Association. (30 June 2004). ALA Policy concerning Confidentiality of Personally

Identifiable Information about Library Users. http://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/policyconcerning

Cain, S (4 August 2016). British Woman Held After Being Seen Reading a Book about Syria on Plane. The Guardian. https://www.theguardian.com/us-news/2016/jan/13/us-library-records-purged-data-privacy

Crovitz, L. G. (28 March 2011). The 0.00002% Privacy Solution. The Wall Street Journal. http://www.wsj.com/articles/SB10001424052748704474804576222732361366712

Crowley , K. (17 July 1990, 15) Zodiac Cops Quiz Broker about Library Book. New York Post.

CUNY Libraries’ Privacy Statement (February 2016) http://www2.cuny.edu/about/administration/offices/library-services/policies/patron-privacy/

Daniels, J. and P. Thistlethwaite. (2016) Being a Scholar in the Digital Era: Transforming scholarly practice for the public good. Bristol: Policy Press.

Esposito, J. (2016). Libraries May Have Gotten the Privacy Thing All Wrong. The Scholarly Kitchen.https://scholarlykitchen.sspnet.org/2016/06/23/libraries-may-have-gotten-the-privacy-thing-all-wrong/

Etzioni, A. (2015). Privacy in a cyber age: Policy and practice. New York: Palgrave McMillan.

Johnson, B. (10 January 2010). Privacy no longer a social norm, says Facebook founder. The Guardian. https://www.theguardian.com/technology/2010/jan/11/facebook-privacy

Koulessar, R. (23 May 2015). Michelle Fine Responds to Emails Posted by Montclair Kids First. NorthJersey.com http://www.northjersey.com/news/education/emails-fine-and-not-so-fine-1.1345178?page=all

Page 23: Purging User Data to Protect Privacy: a small library's outsized impact

www.gc.cuny.edu

References – cont’dMacrina, A. (14 July 2016). Protecting Patron Privacy. Library Journal. http://

lj.libraryjournal.com/2016/07/digital-resources/protecting-patron-privacy/

Night of the Zodiac. (11 July 1990, 1). New York Post.

OCLC (n.d.) Privacy policy. http://www.oclc.org/policies/privacy.en.html

OCLC. (2015). OCLC Information Security Whitepaper. OCLC. https://www.oclc.org/content/dam/oclc/policies/security/oclcinformationsecuritywhitepaper.pdf

Parisier, E. (22 May 2011). What the Internet knows about you. http://www.cnn.com/2011/OPINION/05/22/pariser.filter.bubble/

Posner, B. (6 October 2015). Interlibrary Loan News: Keep your ILL request history private. http://gclibrary.commons.gc.cuny.edu/2015/10/06/interlibrary-loan-news-keep-ill-request-history-private/

Shain, M. (20 July 1990, 1). Knock on Every Door: Search for Zodiac back to square one. New York Post.

Shain, M. (12 July 1990, 1, 5). Zodiac Trap: Cops set to shut down subways when killer strikes. New York Post.

Shain, M. and A. E. Murray. (11 July 1990, 8) New Zodiac Twist: Dies he use a computer? New York Post.

Sprenger, P. (26 January 1999). Sun on Privacy: “Get Over It.” Wired. http://archive.wired.com/politics/law/news/1999/01/17538

Theilman, S. (13 January 2016). You are Not What You Read: Librarians purge user data to protect privacy. The Guardian. https://www.theguardian.com/us-news/2016/jan/13/us-library-records-purged-data-privacy

Turow, J., et al. (2009). Americans Reject Tailored Advertising and Three Activities That Enable It. http://repository.upenn.edu/cgi/viewcontent.cgi?article=1138&context=asc_papers

Zimmer, M. (2013). Assessing the Treatment of Patron Privacy in Library 2.0 Literature. Information Technology & Libraries 32(2), 29-41.