Reproductions supplied by EDRS are the best that can … · Master of Library and Information...

71
DOCUMENT RESUME ED 459 861 IR 058 413 AUTHOR Monaco, Michael J. TITLE A Model Privacy Statement for Ohio Library Web Sites. PUB DATE 2001-05-00 NOTE 70p.; Master of Library and Information Science Research Paper, Kent State University. PUB TYPE Dissertations/Theses (040) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Electronic Libraries; Information Seeking; *Library Policy; *Library Services; Models; *Privacy; *Standards; Users (Information); *World Wide Web IDENTIFIERS American Library Association; Federal Trade Commission; HTML; Organisation for Economic Cooperation Development; Web Site Design; *Web Sites ABSTRACT The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines of the Organization for Economic Cooperation and Development, and the writings of particular information professionals. Then, these standards were used to identify the privacy issues raised by various information seeking processes, e.g., cookies, clickstream and log files, e-mail, interlibrary loans, and searches. With the issues identified, the standards of privacy protection were used to make recommendations for libraries to ensure that the privacy of library users is adequately protected. The recommendations were used to construct a model privacy statement for library Web sites. Appendices include the model policy, the HTML source of the model policy, and the HTML source of the policy annotation. (Contains 18 references.) (Author/MES) Reproductions supplied by EDRS are the best that can be made from the original document.

Transcript of Reproductions supplied by EDRS are the best that can … · Master of Library and Information...

DOCUMENT RESUME

ED 459 861 IR 058 413

AUTHOR Monaco, Michael J.TITLE A Model Privacy Statement for Ohio Library Web Sites.PUB DATE 2001-05-00NOTE 70p.; Master of Library and Information Science Research

Paper, Kent State University.PUB TYPE Dissertations/Theses (040)EDRS PRICE MF01/PC03 Plus Postage.DESCRIPTORS *Electronic Libraries; Information Seeking; *Library Policy;

*Library Services; Models; *Privacy; *Standards; Users(Information); *World Wide Web

IDENTIFIERS American Library Association; Federal Trade Commission;HTML; Organisation for Economic Cooperation Development; WebSite Design; *Web Sites

ABSTRACTThe purpose of this research was to develop a model privacy

policy statement for library World Wide Web sites. First, standards ofprivacy protection were identified. These standards were culled from theprivacy and confidentiality policies of the American Library Association, theFederal Trade Commission's online privacy reports, the guidelines of theOrganization for Economic Cooperation and Development, and the writings ofparticular information professionals. Then, these standards were used toidentify the privacy issues raised by various information seeking processes,e.g., cookies, clickstream and log files, e-mail, interlibrary loans, andsearches. With the issues identified, the standards of privacy protectionwere used to make recommendations for libraries to ensure that the privacy oflibrary users is adequately protected. The recommendations were used toconstruct a model privacy statement for library Web sites. Appendices includethe model policy, the HTML source of the model policy, and the HTML source ofthe policy annotation. (Contains 18 references.) (Author/MES)

Reproductions supplied by EDRS are the best that can be madefrom the original document.

U.S. DEPARTMENT OF EDUCATIONOftice of Educational Research and Improvernent

EDUCATIONAL RESOURCES INFORMATIONCENTER (ERIC)

This document has been reproduced asreceived from the person or organizationoriginating it.

0 Minor changes have been made toimprove reproduction quality.

Points.of view or opinions stated in thisdocument do not necessarily representofficial OERI position or policy.

PERMISSION TO REPRODUCE ANDDISSEMINATE THIS MATERIAL HAS

BEEN GRANTED BY

. P._Wck t ace,

TO THE EDUCATIONAL RESOURCESINFORMATION CENTER (ERIC)

A MODEL PRIVACY STATEMENTFOR OHIO LIBRARY WEB SITES

A Master's Research Paper submitted to theKent State University School of Library

and Information Sciencein partial fulfillment of the requirements

for the degree Master of Library and Information Science

by

Michael J. Monaco

May, 2001

BEST COPY AVAILABLE

Master's Research Paper by

Michael J. Monaco

B.A., University of Toledo, 1994

M.A., Kent State University, 1996

M.L.I.S, Kent State University, 2001

Approved by

Advisor 7-1K141444). r-A-65R1-(1 Date MC1 26°

ii

CONTENTS

PREFACE iv

Chapter

I. INTRODUCTION 1

II. GENERAL STATEMENTS OF POLICY AND THESCOPE OF CONFIDENTIALITY/PRIVACY 2

Privacy and Confidentiality Policies of the ALA

The FTC's Online Privacy Reports

Guidelines of the Organization for Economic Cooperation and Development

Personal Statements of Privacy Policies

III. SPECIFIC PRIVACY ISSUES OF THE ONLINE ENVIRONMENT 17

Cookies

Clickstream and Log Files

Email

Interlibrary Loans

Searches

IV. CONCLUSIONS 30

NOTES 32

WORKS CITED 34

APPENDIX ONE : THE MODEL POLICY 36

APPENDIX TWO : HTML SOURCE OF THE MODEL POLICY 41

APPENDIX THREE : HTML SOURCE OF THE POLICY ANNOTATION . . . 47

PREFACE

This paper, submitted as a physical object, does not reflect the entirety of the work that

this project includes. The three appendices give, as accurately as possible, a picture of the

computer files my work culminated in. The first appendix is a printout of the HTML model

policy. It is included to give an idea of what the policy looks like on a computer screen. This

policy has links to several internet sites and to passages in an HTML version of the present

paper. The second appendix presents the HTML source that comprises the model policy, thus

revealing the links and their targets. The third appendix is the HTML source for the paper,

presented in order to reveal the passages which are intended to be linked to the policy as

annotations explaining the rationale for specific policy provisions and to guide librarians who

may customize the model policy to create a policy statement for their library's web sites.

I would like to thank several people, without whose assistance and support I would not

have been able to complete my program of study or the present paper. I thank Thomas

Froehlich, my research advisor, for helping me focus and find a manageable topic, and also for

setting a fine model of how a philosopher can raise difficult but necessary questions in

information science. I thank Karen Coyle for generously offering her own work on this topic for

my edification. I thank all of my instructors in the School of Library and Information Science at

Kent State University for the knowledge and love of the discipline they have imparted to me.

But any professional work is possible only with the help of others who may have no

special interest or expertise in the profession, yet provide support and inspiration on a personal

iv

5

level. I thank Deborah for her patience, her love, and for believing in me. I thank my parents for

their enduring support and enthusiasm for my studies. I thank my brothers Tom and Joe, and my

sisters Lisa and Lynn, for their humor and sympathetic ears.

6

I. INTRODUCTION

"Privacy" is a complex concept which has taken many meanings over time. In the past,

privacy was understood to be a right to freedom from observation and scrutiny in the personal

life of an individual, so that privacy was felt to be violated when a person's behavior was

observed or otherwise made public in a way the person found invasive and revealing. Thus, an

individual's life within the home and among intimate acquaintances was understood to be

protected to some extent from public scrutiny. But nowadays privacy is also thought to extend to

information about a person, especially information which related to behaviors or status that is not

regarded as public. Thus financial records, health records, and the like are thought to be

"private" in the sense that such information is or should be under the control of the subject of this

information. It is also commonly held that intimate, personal exchanges between an individual

and various professionals who are given personal information about the individual should be

regarded as confidential. Because information seeking behaviors can potentially reveal private

information about the seeker, and because such information seeking often is assisted by

information professionals with an understanding of confidentiality, librarians and other

information professionals must recognize and protect the confidentiality of any records of

information seeking. This paper will explore guidelines outlining the protection of privacy and

specific kinds of information that are generated in information seeking, in order to develop a set

of recommendations for the protection of the confidentiality of library users in the online

environment.

2

II. GENERAL STATEMENTS OF POLICY AND THE SCOPE OF

CONFIDENTIALITY/PRIVACY

Confidentiality and privacy are values which have been linked to both freedom of

expression and the right to access information. Librarians and information professionals in

general recognize the importance of maintaining the trust of information seekers, and have

undertaken a variety of efforts to insure that the confidence and privacy of their clients are

protected. As the internet and online environments have become increasingly important sources

of information, they have also created a number of new contexts for privacy issues. This paper

will identify and explore the privacy issues which accompany online information seeking, and

what steps librarians should take to address these issues. To see that privacy is of importance to

librarians, this paper will exhibit the policies of the ALA and some statements made by

individual librarians and information professionals. Then, what privacy protection consists in

will be identified, and finally these principles will be applied to specific issues in the online

environment.

Privacy and Confidentiality Policies of the ALA

The American Library Association's policy manual, section 54.16 "On Professional Ethics,"

offers a series of statements to guide ethical conduct for librarians, one of which is "We protect

each library user's right to privacy and confidentiality with respect to information sought or

8

3

received and resources consulted, borrowed, acquired, or transmitted." This simple statement

establishes that a core value of librarianship is the protection of every user's privacy. The library

user may not think very much about confidentiality when seeking information, but even so there

is a duty to safeguard the user's privacy and confidentiality. It is not this paper's purpose to

explore the reasons and justifications supporting this duty on the part of libraries, although it is

clear that in part this duty arises from the potential "chilling effect" a lack of protection might

create among users. The important point is that the ALA recognizes confidentiality and privacy

as important rights of library users.

One area where the confidentiality of library users has been challenged is in circulation

records. Law enforcement agencies have requested this information, either to obtain the records

of specific persons or as part of "fishing expeditions" to identify potential suspects. The ALA

has repeatedly fought such efforts and section 52.4 specifically addresses the confidentiality of

library records. In fact, 52.4 identifies a variety of records, beyond just circulation records, for

protection:

Confidentiality extends to "information sought or received, and materials consulted,borrowed, or acquired," and includes database search records, reference interviews,circulation records, interlibrary loan records, and other personally identifiable uses oflibrary materials, facilities, or services.2

There are several important ideas in this sentence. First, it states that confidentiality extends to

any library record that could identify particular persons. Second, it states that confidentiality

extends to uses of library resources, suggesting that any use of resources which produces some

type of record is to be protected, not just the uses of resources that are mediated by library

personnel. Thus, if a library user were to use a library computer to seek information, any

9

4

electronic records of such use (and we shall see that there are several) should also be

protected. Finally, it should be noted that there is an emphasis on personally identifiable

information -- that is, information which can be linked with specific individuals. Where records

of information seeking are aggregated, abstracted, or otherwise collected into data that does not

identify specific individuals in a way that can be traced back to individuals, this information can

rightly be regarded as falling outside the concerns for and protections of privacy and

confidentiality.

Section 52.4 of the policy manual ("Confidentiality of Patron Records") addresses the

appropriate legal procedure for law enforcement to access such confidential records, but it also

stresses the need for libraries to adopt formal policies recognizing the above standard of

confidentiality. In order to adequately address the confidentiality of records, libraries must

address the specific kinds of records created in the online environment, which will be discussed

below.

The ALA's Intellectual Freedom Manual reiterates this policy under the headings "Policy

on the Confidentiality of Library Records" and "Policy concerning Confidentiality of Personally

Identifiable Information about Library Users."3 These two sections actually present portions of

52.4, and also provide some historical background on the events which led the ALA to issue the

policy. Apart from the historical accounts, the Intellectual Freedom Manual does not alter or

expand the scope or range of records identified in the ALA Policy Manual.

Apart from the general policies of the ALA, there is another document outlining the

impact of computer technology on the privacy and confidentiality of patron records. This

document is the Report of the Task Force on Privacy and Confidentiality in the Electronic

1 0

5

Environment, issued July 7, 2000.4 The report includes a number of important findings.

First, there is the issue of computer system security. The Task Force found that insofar as

some patron records exist as electronic records on library computers, the library must recognize a

duty to protect these records from hackers or other unauthorized access. Specific security

measures fall outside the scope of my work but some account of the library's commitment to

resist unauthorized access to computer records should be disclosed to users.

Second, the Task Force found that a variety of privacy issues are raised by in-library internet

access. Every internet transaction is potentially a source of information gathering by web sites

and servers outside the library. Because many patrons may use a computer over the course of a

day, there needs to be some awareness of the potential for subsequent users to see traces of the

web sites visited by previous users. There is also the potential for other patrons to see the screen

of a computer being used by a patron, thereby compromising the user's privacy.

Third, the Task Force recognizes potential problems raised by the use of electronic

resources provided by a remote vendor. These vendors may collect data about resource access

and even about the patrons accessing them without guaranteeing the same protections of a

library. Thus, it is important for libraries to establish privacy protection measures in their

licenses and contracts with vendors or else to give patrons notice that personal information may

be collected by the vendor.

Apart from these significant findings, the Task Force issued a number of

recommendations. Beyond revising ALA policies concerning confidentiality of records to

address the findings mentioned above, the Task Force calls on the ALA to "urge that all libraries

11

6

adopt a privacy statement on web pages and post privacy policies in the library which cover the

issues of privacy in internet use as accessed through the library's services."5

The FTC's Online Privacy Reports

The Federal Trade Commission's reports on developing a theoretical framework for fair

information practices online stand out as particularly explicit and well-informed documents. The

focus of the FTC's two reports to Congress has been on commercial use of the internet, but the

general discussion of fair information practices here is particularly useful. The FTC reviewed

some twenty-five years worth of government documents and studies concerning the collection of

personal information and identified five core principles of privacy whichwere common to al1.6

These principles were identified in 1998 as Notice/Awareness, Choice/Consent,

Access/Participation, Integrity/Security, and Enforcement/Redress. Before discussing the

particulars of each principle, it should be noted that the FTC's 2000 report to Congress pares

down the list Notice, Choice, Access, and Security -- Enforcement/Redress is dropped from the

core 7 -- presumably because the 2000 report is intended to guide enforceable legislation, and not

because the FTC no longer views the enforcement of privacy protection as important.

The principle of notice is regarded as the most fundamental of the principles.8 The idea

is that the individual must have an awareness of the practices of information collecting agencies

before he can decide to disclose personal information. In addition, the individual would needto

know that information is collected before he could attempt to access, evaluate, or correct the

information, and also before he could make any effort to redress illicit or unauthorized use of the

12

7

information. The FTC concludes that the principle of notice requires that personal information

collecting entities should be required to disclose at least some of the following in order to

provide meaningful notice: (1) the identity of the entity collecting data; (2) the uses to which data

is put; (3) the identity of any potential recipients of the data; (4) the nature of the data collected

and means of collection; (5) whether the individual user or consumer is required to furnish

personal information, and the consequences of refusal to do so; and (6) the measures taken by the

collecting entity to protect the data, ensure its accuracy, and uphold its confidentiality.9 The

FTC's requirements are not quite stringent enough for libraries, in so far as libraries have a

positive commitment to protecting confidentiality, and so all of these items should be disclosed

in a library privacy policy. The FTC does however raise an important point about the posting of

policies: they should be readily assessable both from the home page of a web site and from any

pages where personal information is collected.19

The principle of choice requires that the individual whose personal information is to be

collected be given the option to furnish information or not. It also requires that the individual be

given a choice about how the information will be used, and especially about how the information

may be put to use beyond the initial transaction that requires the disclosure of personal

information." Thus, if the owner of a web site intends to collect personal information, there

must be consent from the user or consumer both for the initial collection of information and for

any uses the information might be put to: web site management and development, sale to

advertisers or direct marketing firms, sharing with other companies for market research, or any

other use. This principle can be implemented in one of two ways -- either allowing the user to

opt-in or to opt-out. "Opt-in" means the individual must actively consent to the collection and

13

8

use of information. "Opt-out" means that the user must actively deny consent for information

collection and use. It is hardly surprising that most collectors of information prefer the latter, as

it allows them to assume consent from any individual, and requires special effort on the

individual's part, rather than on the information collecting entity's part, to protect privacy.

Libraries, however, would probably show greater fidelity to the user's confidentiality by using

"opt-in" protocols wherever possible, as this provides an additional opportunity to both disclose

policy and assure the user of the library's commitment to privacy.

The principle of access is comprised of two rights on the part of the individual about

whom information is collected: the right to review any information and the right to correct or

contest the information.I2 This principle can only be upheld effectively if there is a relatively

easy and inexpensive procedure for reviewing and correcting the data. The more this

information is limited in scope and content, the easier it will be to ensure that the information is

accurate.

The principle of security covers both the integrity or quality of information and the

protection of information from loss and the unauthorized disclosure, use, and access of the

information." The integrity of information is protected in part by allowing the individual to

access and correct information, but there is also a responsibility on the part of the collecting

entity to use prudence in selecting sources of information. Finally, the occasional destruction of

obsolete or old information is necessary to protect the quality and integrity of information.

Protecting the security of information calls for both technological and administrative measures."

The technological measures involved might include encryption, pass-word protection, firewalls,

and storage on secure servers. The administrative measures should focus on setting limits on

14

9

who can access the information and to what purposes the information can be used. Obviously,

it is imperative that the information never be used in manners or for purposes not authorized by

the individual. Libraries should have policies in place which limit access to patron records of

any kind, and also have technological protections sufficient to prevent unauthorized access to

records.

The last principle is the principle of enforcement. The FTC concludes that "the core

principles of privacy can only be effective if there is a mechanism in place to enforce them."15

The FTC outlines several mechanisms of enforcement: self-regulation, private remedies, and

government enforcement. Self-regulation, the FTC contends, can be carried out by requiring

members of professional or industrial organizations to accept and comply with a privacy policy.

There is a clear application of this principle for libraries: the adoption of privacy policies by

organizations such as the ACRL, the ALA, and the SLA. These policies should be fairly

explicit, and there would also be a need for developing a system to verify compliance. Because

it is unlikely that libraries would be motivated to violate privacy policies (unlike, say, private

firms which might realize a profit from selling customer information), it may be enough to

simply require libraries to adopt formal privacy policies and post them on their web sites. Tort

law provides for a certain amount of private remedies. But it is unclear, at this point, what steps

legislatures may take to pass laws concerning privacy protection.

Taken together, the five principles of privacy protection identified by the FTC provide a

strong foundation for specifying the principles libraries should uphold with respect to personal

information. But it is also helpful to notice to some specific statements of principles offered by

librarians and other information professionals concerning privacy and confidentiality. This is

15

10important to do because the FTC's principles constitute a minimal set of guidelines to restrict

the activities of commercial entities. But librarians are committed to doing more than merely

setting limits on their use of personal information -- they must take positive steps to ensure that

confidentiality is always protected.

Guidelines of the Organization for Economic Cooperation and Development

Although it is impossible and unnecessary to discuss all of the many statements of

principles of privacy protection created by organizations and individuals, it is enlightening to

review the guidelines issued in 1980 by the OECD. These guidelines consist of eight principles

which have influenced many later lists of principles.16 It is possible to "map" these eight

principles onto the five FTC principles to emphasize the wide area covered by the FTC's

principles and to show that those five principles are sufficient to cover many privacy concerns.

The principles of the OECD consist ofa collection limitation principle; a data quality principle; a

purpose specification principle; a use limitation principle; a security safeguards principle; an

openness principle; an individual participation principle; and an accountability principle.

The collection limitation principle calls for limits to the personal information collected. It

also requires that the subject be informed of the collection, and when possible that consent be

obtained from the subject. This principle thus falls under the FTC's notice/awareness principle.

The data quality principle requires that collected data be kept accurate and up-to-date, and so it

falls under the access/participation principle. The purpose specification principle requires that

information gathered must have the purpose for its collection and use specified at the time of

1 1

gathering, and the information must be put to no other use. This falls under the

security/integrity principle. The use limitation principle requires that consent be obtained from

the data subject should the data be used for other purposes than those agreed to, or should the

data be disclosed to others. This falls under the choice/consent principle and also the

security/integrity principle. The openness principle requires that information collectors be open

about their policies, practices, and developments with respect to personal information. It also

requires that the collector respond to inquiries from data subjects and identify themselves. This

falls under access/participation and notice/awareness. The security safeguards principle requires

that data be protected from loss and unauthorized access, use, or disclosure. This falls under the

security/integrity principle of the FTC. The individual participation principle provides the

subjects of data collection with the right to know whether or not data has been collected about

them; to access the data about them; and to challenge and correct data about them. This falls

under the access/participation principle. The accountability principle requires that data

controllers be held accountable to these requirements, through legal or other means, and falls

under the enforcement/redress principle.

It is clear, then, that the OECD principles, which were widely adopted before the

emergence of the internet as it is now known, are exhaustively covered by the FTC principles.

Personal Statements of Privacy Principles

Beyond the principles outlined by various organizations, several statements of privacy

principles made by individual librarians and information professionals are worth noting.

17

12

Although these statements do not attempt to cover every aspect of privacy and confidentiality,

they do focus attention on issues which are of particular importance to librarianship.

Featherman's Ten Commandments

John Featherman of ASIS publishes a newsletter on privacy for consumers, and at the

1997 ASIS mid-year meeting presented a set of rules for individuals to help ensure that their

privacy was protected. Although many of these focus on strategies for individuals, there are

several rules that are applicable to institutions as well. His rules -- he calls them the "Ten

Commandments of Privacy" -- are:

1. Thou shalt keep sensitive information private.2. Thou shalt pay in cash whenever possible.3. Thou shalt guard thy social security number and other identification numbers with

thy life.4. Thou shalt use a paper shredder in thy daily life.5. Thou shalt use a post office box or, better yet, a mail drop.6. Thou shalt inspect thy credit, medical, and other personal information files often.7. Thou shalt be circumspect in thy computer affairs.8. Thou shalt be extremely discreet when communicating.9. Thou shalt be diligent when choosing passwords and shalt change them often.

10. Thou shalt make a lifetime commitment to protecting you privacy."

Each of these commandments is clearly directed at individuals rather than institutions, but there

are several points raised here that are worth considering. The third commandment should remind

us that Social Security Numbers, driver license numbers, and other personally identifying

numbers must be guarded with special attention. Many libraries never request this kind of

information, but some may use them in patron records. For example, the Kent State University

1 8

13

library uses student ID cards as library cards, and the student number printed and encoded on

each card is usually the individual's Social Security Number. The third commandment should

call attention to the sensitivity of these student ID numbers.

The fourth commandment is important at an institutional level because paper records are

often produced in libraries, as in the ILL and book request process. Computer print-outs of web

pages produced inside a library may also be potentially identifiable, because the most popular

browsers include the time and date as headers or footers in print-outs, and those libraries that

require registration to use computer terminals make it possible for a persistent and industrious

snoop to identify the patron who printed a particular page. For this reason, abandoned print-outs

should be destroyed and not merely thrown out.

Commandment six calls on individuals to exercise their right to access information

collected about themselves, as outlined in the FTC's principle ofaccess. Commandment nine

calls attention to the need for librarians to periodically change the passwords that provide access

to personal information -- and the principle of security holds that we ought to restrict access to

personal information with passwords.

Finally, commandment seven focuses on computers as potential privacy hazards.

Featherman explains that encryption should be used whenever personal information is

transmitted, and we should add that libraries would do well to use encryption whenever they

transmit information that may identify patrons, such as ILL requests.

12

14

Gorman's "New Libraries, Old Values"

Michael Gorman lists privacy as one of eight values of that underpin librarianship. He

writes:

The confidentiality of library records is not the most sensational weapon in the fight forprivacy, but it is important, both on practical and moral grounds. In practical terms, a lotof the relationship between a library and its patrons is based on trust, and, in a freesociety, a library user should be secure in trusting us not to reveal what is being read andby whom. On moral grounds, we must start with the premise that everyone is entitled tofreedom of access, freedom to read texts and view images, and freedom of thought andexpression. None of these freedoms can survive in an atmosphere in which library use ismonitored and individual reading patters are made known to anyone withoutpermission."

Gorman quite rightly focuses attention on the role of trust in library patronage, and speaks in

technologically neutral language about the right to read text and view images with confidence

that one's information seeking will not be revealed to others. In the context of online information

seeking, this means that a user should never be identified with web pages or computer files

accessed.

Coyle's Elements of a Privacy Policy

Karen Coyle, a privacy advocate and member of the ALA's Task Force on Privacy and

Confidentiality in the Electronic Environment, has outlined essential elements for a library web

site privacy policy. 19 Her elements fall under four main categories: Background Information,

Your Library's System, Policy Elements, and Links.

20

15

Background information should include both legal and policy statements. Coyle

recommends providing information about state and local laws concerning public records and

library records. This seems reasonable, as users may find it reassuring to know what protections

exist. But they will also find it useful to know what limits there may be in the protection of

confidentiality where laws diverge from library values. The policy statements would include

both the ALA's policy on confidentiality and local policies -- that is, the policy of the institution

to which the library belongs and the specific policies of the library.

The section on your library's system would outline the specific issues raised by the

network, web page design, and connected but remote systems. These system elements would

include a variety of matters. The logging system the library uses on its web server, which tracks

http requests and browsing, should be explained. Likewise, any personalization features on the

system should be explained so that users would know what information about them is stored in

the system, such as their log-in history, e-mail features, and document delivery. Finally, the user

should be made aware that personally identifying information may be requested by remote

databases accessed through the library system or furnished to interlibrary loan partners.

The policy elements would contain details about the access, integrity, and security of data

stored on the library system. The protections in place, the length of retention, and who can

access the data should all be disclosed.

Lastly, the policy should include links to further clarify and explain privacy issues.

Coyle specifically recommends that the online ALA policy manual should be linked, as well as

the ALA task force report on online privacy. This list of links should not be considered

exhaustive, but note that protecting user privacy and providing privacy literacy training can be

21

16

distinguished. It is beyond the scope of my project to create a privacy literacy curriculum.

22

17

III. SPECIFIC PRIVACY ISSUES OF THE ONLINE ENVIRONMENT

Cookies

A "cookie" is small text file -- 4k or smaller -- that records information on the hard drive of a

computer requesting a web page. The content of a cookie generally consists of three main

elements: the address of the server or web site which sent the cookie, an identification code for

the specific computer, and a set of codes recording information about the user browsing habits

and/or preferences. The contents of the cookie are encoded so that the recipient is unlikely to be

able to interpret what they actually contain. Here is an example cookie from my own computer,

the filename of which is "anyuser@fedex[1].txt":

Fed Ex_accrue12000206511118www4744177fedex.com/0275814809631550824185088124829380962

The above contents are meaningless to me, although I can recognize the server domain

"fedex.com." Presumably the codes are used by FedEx to personalize their web pages when I

view them, or could be used to keep track of goods or services I requested. But in order to

protect the privacy of web surfers, there ought to be both notice that this information is collected,

and some way to insure that the information is accurate, if this information is in any way

23

1 8

identifiable with the surfer.

It should be noted that some cookies will use potentially identifying user names in the

filename. For example, many cookies on my computer have filenames like

"[email protected]." The cookie used my Windows logon name, which is "mike," as my

userid. Because many computer networks require that users log on with some name, this method

of naming cookie files presents a minor privacy threat. Many web servers will maintain

databases of users and their browsing habits, and these userids are sometimes based on the user's

actual name ("mmonaco" for example). Any such cookies certainly seem to constitute a

personally-identifying record, even if the identification is would require a bit of sleuth work to

connect it to the actual user.

There are two kinds of cookies: session and persistent. A session cookie is deleted by the

browser as soon as the cookie sending server is exited. A persistent cookie will remain on the

hard drive for a specified period of time. The only difference between session and persistent

cookies is that persistent cookies, when set by the server, have an additional variable in the

command which sends the cookie: "expires=date."2° Session cookies are somewhat less

threatening to privacy than persistent cookies because they are deleted after every session, thus

limiting the amount of information a particular web site collects about the user. However,

because many servers will keep their own databases ofuser information, there is still a need to

disclose the use session cookies to users in order to protect their privacy.

Most commercial web sites and many non-commercial web sites use cookies. This is

because there are many legitimate uses for cookies. Cookies which track the browsing habits of

users provide information useful for improving and designing web sites. Cookies can also add

24

19

several features to web sites, such as custom formatting of web sites (some users may request

specific colors, fonts, or font sizes for easier reading), alerts about new material on the site (a

persistent cookie would record the last visit of a user and allow the server to provide a list on

material since that last visit), and "shopping baskets" to keep a record of items requested, online

forms completed, and the like.21 Disabling cookies (an option provided by browsers which use

them) can therefore create a loss of functionality, and some web sites would be unusable without

cookies.22

Cookies present several privacy issues to users of online resources. At the most basic

level, cookies may be considered a privacy threat because they can operate as "spies," in the

sense that the senders of cookies may not reveal themselves while at the same time collecting

information about the user. An informal study by Karen Coyle of cookies collected on her hard

drive revealed that about one third of the cookies were untraceable, owing to the fact that the

web addresses in the cookies could not be reached.23 The cookie senders thus remain

anonymous, which in itself raises questions about the intentions of the cookie senders.

It has been noted that cookies, by themselves, do not actually identify the user who

receives them. Cookies simply collect clickstream data, indicating what a user views, how long

he or she is connected to the sites, and which advertisements were displayed by the site. By

itself, this data does constitute useful information for the web site designer and marketer. The

real privacy threat emerges when cookie technology is combined with another technology: online

forms. Users may be asked for identifying personal information including addresses, names,

phone numbers, and the like when they register to use various web sites, services, or files. If this

information should be matched with clickstream data collected from cookies, the user has

25

20

suddenly revealed much more than the information voluntarily released in the form. A profile

of the users' interests can be determined by studying the clickstream data from cookies which

reveal where, when, and for how long the user has surfed web sites. The appeal of such

information for marketers and advertisers is obvious. But the users' privacy has been

compromised if the information collected by cookies is collected covertly, without disclosure.

It is believed that most cookies can be accessed only by the site which created them.

However, a bug in Microsoft's Internet Explorer was discovered in May of 2000, called the

"Open Cookie Jar." This bug allowed any server to read any cookie, provided that the name of

the site which created the cookie was known.24 Microsoft has, since then, corrected the problem,

and even offers cookie management features in the newest version of Internet Explorer. Even so,

this episode calls attention to the potential danger that cookies be intetcepted or viewed illicitly.

A similar bug was found in one version of Netscape Navigator. Bugs such as these clearly

violate the principle of security, as they allow unauthorized disclosure and use of the information

in the cookie.

It is possible for the server which sends cookies to specify that cookies will be sent only

over secure communication channels; the set-cookie http response header would need to include

the command "secure." Presently, only HTTPS servers (http servers on SSL) are considered

"secure" by the Netscape browser.25

One further privacy threat posed by cookies lies in the fact that some banner advertisers

send cookies as well. Because the server providing banner ads sets the cookie rather than the

server providing the actual page visited, these banner ad companies are able to track a user's

browsing across many different sites and servers.26 The purpose of these cookies is to aid in

26

21

targeting specific ads at users. However, because these companies store information about the

recipients of the banner ads and their browsing habits, the user's privacy is seriously threatened,

especially if this information is combined with forms which ask for personal information. It is

one thing if Doubleclick.com tags my computer with a cookie that records my browsing habits as

"[email protected]" and quite another if they should be able to connect my userid withmy

name and address because I filled in a form to register to use the online New York Times site.

Libraries should consider cookies carefully. Computers provided for patron use will

accrue a large collection of cookies. The risk to patron privacy lies in the danger that when a

patron fills in an online form, their personal information may be erroneously linked to the

browsing habits of other users. But personally identifiable information must be accurate,

according to the principle of integrity discussed above. On the other hand, patrons may be

accurately profiled and their privacy compromised if they are unaware that the library's

computers accept and use cookies. There is also the issue of library web sites using cookies.

Better access may be provided to users by allowing them to specify larger fonts or other

formatting issues. And librarians would be able to improve their web sites by reviewing usage.

But these benefits must be balanced against the danger that cookies from library web sites could

be intercepted or accessed illicitly. The danger of interception may be reduced by always

specifying that cookies be sent only over secure communication lines. The danger that others

may view cookies, for example by exploiting the Open Cookie Jar bug, is probably best met by

using only session cookies.

27

22

Clickstream and Log Files

Apart from cookies, there are other traces of interne use recorded by web servers and

private firms. These other records are loosely grouped under the terms "clickstream," "mouse

droppings," and "data trail." This discussion will use the term "clickstream" as it is the most

widespread term.

One source of clickstream data is found in the headers sent by web browsers to servers

when a user accesses a web page. These headers reveal the internet protocol address ("IP

address") of the user, the time of day when the page is accessed, the pages and images

downloaded, the page from which the user is accessing the new page ("Referrer"), and data

entered by the user into forms. Cookies are sometimes considered to be part of this clickstream

data as well, but cookies will not be explored further here.

In order to give a picture of what one might look like, a sample log file from Karen Coyle's

web pages is reproduced here:

ppp156210.asahi-net.or.jp [29/Mar/1998:05:45:00 -0800] "GET /--kec/best.htmlHTTP/1.0" 200DIAL8-ASYNC38.DIAL.NET.NYU.EDU [29/Mar/1998:12:23:11 -0800] "GET /--lecHTTP/1.0" 302gwc-mel.afwgc.af.mil [29/Mar/1998:14:24:09 -0800] "GET /,--kec/ HTTP/1.0" 30427

As can be seen, an IP address is recorded, and then the date and time that pages are accessed, and

finally the path of the page accessed. Each of three entries follows the format "IP address --

date/time -- command/request."

All of this data is provided by the web browser used to access the pages. But the

28

23

individual using the browser is likely to be unaware that this information was provided to the

server visited. The consumer advocacy web site "Junkbusters.com" has a page which allows

users to see for themselves what their browser tells every server they visit. When visiting the

Junkbusters page with a computer in a KSU philosophy department, the following output is

produced:

The "HTTP Referrer" tells them what led you to the request. In this case it washttp://www.junkbusters.com/junkdata.html.Some advertisers choose which ad to show you based on two variables that tell themwhich computers you are coming through: the "Remote Address" (in your case131.123.68.123) and the Remote host:" (in your case 131.123.68.123). These variablesmay give indications of where you live or work.The "User Agent" variable, in your case Mozilla/4.73 [en] (Win95; U), indicates whatsoftware and hardware you are using. This interests companies that sell these goods.(Mozilla is Netscape's name for its browser.)Some browsers actually hand over your email address or other indications of youridentity. In your case it appears the "HTTP From" variable was not provided, and theREMOTE USER" variable was not provided.28

This URL basically displays the headers sent by the browser when a user visits the address --

they are displayed above in bold face. The text on the page also explains the specific variables

used by http to record this information. Junkbusters encourages people interested in privacy to

link to this page in order to promote privacy literacy (and to promote their privacy software).

Libraries would do well to make this page available to their users. But perhaps the most

interesting thing to notice here is that there are header variables not recorded in Karen Coyle's

sample log entries but which other servers might choose to log.

Another source of clickstream data is in the browser "add-ons" known as Java,

JavaScript, and VB Script. These are all technologies which enhance the web pages with

graphics, animation, and the like. These will generally provide information about the browser

29

24being used, screen resolution, and other data ofconcern mainly for formatting purposes.29

The information sent back and forth in headers is of little concern on its own, but a threat

to privacy emerges when this information is stored for later use and analysis in transaction log

files.

One thing to notice is that the clickstream data stored in log files would identify

computers but not individuals.30 However, an IP address can reveal a certain amount of

information about an individual. IP addresses are assigned by the internet service provider (ISP),

and often disclose the region of the country or even the city the computer is in. A quick review

of the IP addresses in Karen Coyle's log file suggests that the three transactions logged were

requested by users in Japan, New York University, and a military base. IP addresses that consist

entirely of numbers are in principle traceable as well. The IPs also reveal the identity of the ISP,

which in itself reveals little about the individual. The real dangeremerges when clickstream data

is merged with personally identifying information. If your identity can be connected with your

clickstream, others can know what web sites you visit, which links you follow, what files you

download or view, and so on.

Perhaps the most egregious and high profile case of compromising privacy in this manner

is the recent controversy surrounding DoubleClick.com. DoubleClick.com acquired Abacus

Direct, a company which maintains databases of consumer information compiled by direct

marketers. The kind of information Abacus Direct maintains involves consumer habits and

demographics. DoubleClick.com provides banner ads to thousands of web sites, and as

described above, these banner ads send cookies to web surfers who see their ads. These cookies

identify the user to DoubleClick.com, and the browser headers transmitted when surfers click on

30

25

the banners are compiled in Double Click's log files. When the Abacus Direct databases are

combined with DoubleClick.com's log files, the resulting database identifies individuals with

demographic information, names and addresses, web surfing habits, and consumer information.

All of this information has obvious use for advertisers who want to target ads effectively. But

this information also constitutes a severe compromise of the surfer's privacy, not least because

the individual is unlikely to be aware of the clickstream information collected.

A persistent problem with online privacy is the fact that so many users are unaware of the

information they are providing to web sites and servers. Online forms represent the only

conscious, voluntary release of information for most web users. The average web user simply

can't know what cookies to accept or reject, and almost certainly does not realize a trail is created

whenever he or she clicks on a link.3 I Again, the principle of notice requires that the surfer be

notified that header information is logged.

DoubleClick.com, in the face of criticism from consumer advocates and privacy

advocates, has promised to await the development of internet privacy rules before merging the

log files and databases. But it is evidently just a matter of time before they or other companies

will begin to create detailed profiles of web users.

Email

Because some library patrons use email to ask reference questions, and because some

libraries offer internet access which is used by patrons to access email accounts, email policies

31

26

are often adopted by libraries or their parent institutions. These policies should include a

privacy element for several reasons.

First, the Electronic Communications Privacy Act, passed by Congress in 1986,

guarantees certain protections from the interception and disclosure of email messages. Just as

the confidentiality polices of the ALA call on libraries to protect patron records and disclose

them to law enforcement or other government agencies only in cases were good reason and

proper legal documentation are provided, the email messages of library patrons must be

protected.32

But many institutions place limits on the appropriate use of email accounts, and libraries

may do the same. The crucial point is that any policies must be disclosed to users. So if the

library monitors email messages created on library computers or sent to reference personnel,

these practices must be disclosed in the privacy policy statement.

Lastly, because emailed reference questions are created by patrons in the information

seeking process, they constitute records that ALA policies require libraries to protect as

confidential.

In order to adequately protect user confidentiality, then, the online privacy polices of

libraries must disclose any monitoring of email. Presumably, any such monitoring would be

undertaken only in order to assure that library resources are not abused or as part of quality

assurance in the case of reference questions. The library should not keep unnecessary records of

messages sent and received, and protect those it records as confidential.

32

27

Interlibrary Loans

Requesting and providing materials for interlibrary loans (ILL) is another library activity

which generates records. These records are likely to identify the patron requesting materials.

Christopher Nolan, writing in the Journal of Academic Librarianship, notes that the paper ALA-

sanctioned ILL request form and the online work forms used by OCLC, RLN, and WLN all use

information about the requesting patron, and supply this information to the institution making the

loan. 33 This creates a privacy issue for patrons because both the institution making the request

on their behalf, and the lending institution, have records of the patron's information seeking.

There is obviously good reason to keep track of circulation, but Nolan points out that

several things may happen to the ILL request. Because the patron is identified in ILL requests,

traces of the loan will remain even if the library conscientiously destroys old circulation records.

First, the CONTU guidelines attached to copyright laws require that records of all photocopies of

materials obtained through ILL be maintained for three years. Commonly, these records are

maintained by keeping a copy of the ILL form which generated the photocopy. 34 Because the

patron is identified on this form, there is now a record of materials borrowed which is

identifiable with the patron.

Second, the ILL request forms are supplied to the lending institution. Again because the

forms contain the patron's name and possibly other information, the lending institution now has a

record of the patron's inforMation seeking.

Privacy policies must address these records. An ideal policy would require that CONTU

guidelines be met by keeping a non-identifying record of photocopies made and would require

33

28

that patron information not be sent to the lending institution. Because some ILL forms are

online, it would be a good idea to disclose the library's policies about ILL requests in the online

privacy policy.

Searches

Another privacy issue of the online environment is interne searching. There are two

ways that searching the interne can threaten a library patron's privacy. First, many search

engines and directory sites will record the actual search terms entered by the user in the URL of

search results. For example, doing a simple search of the term "clickstream" at Yahoo and

Excite lead my browser to the following addresses:

http://search.yahoo.com/bin/search?p=clickstreamhttp://search.excite.com/search.gw?search=clickstream

If I were to follow the links provided on this page, my browser's header would disclose this URL

as the "HTTP Referrer" variable. Thus, my search strategy is potentially recorded in a log file,

and it is connected with my IP address. If a library web site provides links to search engines

which encode search terms in the results URL, this should be mentioned in the privacy policy.

Second, many search engines use cookies to keep track of users and their queries. This is

not a privacy problem when the search engine keeps only "aggregate" information -- that is,

statistics about user trends and surfing habits. But persistent cookies used by search engines to

track a particular user's queries and searches do threaten privacy. As discussed above under the

34

29topic of cookies, there is always a risk that cookie information will be linked with the subject's

identity when the subject completes a form or otherwise releases information online. And as in

most online privacy issues, users may be unaware that information is being disclosed.

Apart from internet searches, libraries need to consider the possibility that OPACs can

retain digital traces of the searches conducted by users. Users occasionally leave a terminal with

their search results and strategy visible on the monitor. In so far as the patron has chosen to

leave the terminal without returning to the menu screen or otherwise concealing his or her

search, there is little the library can do to protect the confidentiality of searches from this kind of

disclosure. But libraries will also have to consider the possibility that the OPAC retains records

of previous searches in its memory, disk cache, or log files. Whenever this is the case, the policy

of the library must be to ensure that these records are secure from unauthorized access and

destroyed as soon as they serve no role in the library's functioning. At the very least, records of

searches maintained for statistical analysis should have no personally identifying information.

In most cases, OPACs do not require logging in or identifying the user. But there are

exceptions, most notably in systems which allow users to view their own circulation records.

Because this confidential information is accessible, it is the library's responsibility and duty to

take adequate measures for protecting the information. Circulation records should beprotected

by passwords. They should also be transmitted to authorized accessers in an encrypted format to

protect against interception.

35

30

IV. CONCLUSIONS

The protection of privacy can be assured by meeting the five main principles outline by

the FTC: notice/awareness, choice/consent, access/participation, integrity/security, and

redress/enforcement. Librarians must strive to uphold each of these principles in their handling

of confidential information.

The information generated by online library use includes cookies, clickstream data

(including the header data created by browsers and log files maintained by servers), ILL request

forms, and email reference questions. All of this information is potentially personally

identifiable and thus should be protected by strict standards of privacy as outlined in the five

principles. When data is abstracted from log files into statistical data or otherwise severed from

personally identifying marks, the data can be considered outside the umbrella of privacy

protection.

Insofar as library web sites and online systems collect personally identifying information

or provide it to outside agencies such as online search engines or databases, there must be a clear

disclosure of this practice and adequate measures taken to protect patron confidentiality.

Because libraries also provide access to databases, search engines, and web pages which

belong to other agencies, it is also important that libraries give notice to the patron that the

privacy policies of the library are not shared by these outside agencies. The patrons should be

reminded that they cannot assume resources accessed through the library are covered by the

31

same guarantees of privacy that library makes about use of resources belonging to it.

All disclosures of policies should be made in a privacy policy statement that can be

accessed easily by online patrons, and an ideal policy will consider all of the issues outlined in

this paper.

37

NOTES

1 Available at URL: http://www.ala.org/alaorg/policymanual/libperson.html

2 Available at URL: http://www.ala.org/alaorg/policymanual/libserve.html

3 American Library Association Office for Intellectual Freedom, pp. 150-158.

4 Available at URL: http://staffweb.library.vanderbilt.edu/ala_tf/report.htm

5 American Library Association Task Force on Privacy and Confidentiality in the ElectronicEnvironment. Available at URL: http://staffweb.library.vanderbilt.edulala_tf/report.htm

6 Federal Trade Commission,1998, p. 7.

7 Federal Trade Commission, 2000, P. iii.

8 FTC, 1998, p. 7.

9 FTC, 1998, p. 7-8.

1° FTC, 1998, p. 8.

"Ibid.

12 FTC, 1998, p. 9.

13 FTC, 1998, p. 10.

14 Ibid.

15 Ibid.

16 Center for Democracy and Technology, "The OECD guidelines." Available at URL:http://www.cdt.org/privacy/guide/oecdguidelines.html

17 John Featherman, "Moses meets Big Brother: the ten commandments of privacy." Availableat URL: http://www.asis.orgibulletin/Feb-97/featherman.html

18 Michael Gorman, p. 49.

38

32

33

19 Karen Coyle, "Elements of a library web site privacy policy." Unpublished document.

20 The syntax of cookie specification for the Netscape browser is described in some detail atURL: http://home.netscape.com/newsref/std/cookie_spec.html . The specifications forMicrosoft's Internet Explorer are similar.

21 Inter log Internet Services. "Cookies: what are they, and why do you want to give me one?"Available at URL: http://www.interlog.com/cookies.html

22 Ibid.

23 Karen Coyle, "A Cookie Study." Available at URL: http://www.kcoyle.net/cookie_study.html

24 Kevin Townsend, "Briefing Paper: Why cookies cause upsets." Available at URL:http://www.zdnet.co.uk/itweek/brief/2000/32/internet/

25 Netscape Support Documentation. "Persistent Client State HTTP Cookies." Available at URL:http://home.netscape.comlnewref/std/cookie_spec.html

26 Inter log Internet Services.

27 Karen Coyle, "A Primer on Internet Privacy." Available at URL:http://www.kcolye.net/privacyprimer.html

28 This page is available at URL: http://junkbusters.com/cgi-bin/privacy, and providespersonalized outputs for each computer which accesses it.

29 Center for Democracy and Technology. "Online tracking FAQ." Available at URL:http://www.cdt.org/privacy/guide/start/track.html

30 Coyle, "A Primer."

31 Ibid.

32 Pat Gannon-Leary, pp. 221 - 225.

33 Christopher Nolan, p. 82.

34 Nolan, p. 83-84.

39

34

WORKS CITED

American Library Association. ALA Policy Manual. Online Document. Available atURL: http://www.ala.org/alaorg/policymanual/index.html; accessed 11/8/00

American Library Association Office for Intellectual Freedom. Intellectual FreedomManual. Chicago: The Association, 1996.

American Library Association Task Force on Privacy and Confidentiality in theElectronic Environment. Report of the Task Force on Privacy and Confidentialityin the Electronic Environment: Final Report, July 7, 2000. Online Document.Available at URL: http://staffweb.library.vanderbilt.edu/alatf/report.htm;accessed 11/8/00.

Center for Democracy and Technology. "The OECD guidelines." Online Document.Available at URL: http://www.cdt.org/privacy/guide/oecdguidelines.html;accessed 11/12/00.

Center for Democracy and Technology. "Online tracking FAQ." Online Document.Available at URL: http://www.cdt.org/privacy/guide/start/track.html; accessed11/12/00.

Coyle, Karen. "A Cookie Study." Online Document. Available at URL:http://www.kcoyle.net/cookiestudy.html; accessed 11/3/00.

Coyle, Karen. "Elements of a library web site privacy policy." Unpublished document.

Coyle, Karen. "A Primer on Internet Privacy." Online Document. Available at URL:http://www.kcolye.net/privacyprimer.html; accessed 11/3/00.

Featherman, John. "Moses meets Big Brother: the ten commandments of privacy."Online Document. Available at URL: http://www.asis.org/bulletin/Feb-97/featherman.html; accessed 1/18/01.

Federal Trade Commission. Privacy Online: A Report to Congress, 1998. OnlineDocument. Available at URL: http://www.ftc.gov/reports/privacy3/priv-23a.pdf;accessed 1/11/01.

Federal Trade Commission. Fair Information Practices in the Electronic Marketplace,2000. Online Document. Available at URL:

40

35

http://www.ftc.gov/reports/privacy2000/privacy2000.pdf; accessed 1/11/01.

Gannon-Leary, Pat. "E' for Exposed? E-mail and Privacy Issues." The ElectronicLibrary, 15(3), pp. 221 - 225.

Gorman, Michael. "New Libraries, Old Values." The Australian Library Journal, Feb.1999, pp. 43-52.

Inter log Internet Services. "Cookies: what are they, and why do you want to give meone?" Online Document. Available at URL:http://www.interlog.com/cookies.html; accessed 1/9/01.

Junkbusters. "Junkbusters Alert on Internet Privacy." Online Document. Available atURL: http://junkbusters.com/cgi-bin/privacy; accessed 11/12/00.

Netscape Support Documentation. "Persistent Client State HTTP Cookies." OnlineDocument. Available at URL:http://home.netscape.comlnewsref/stcl/cookie_spec.html; accessed 1/18/01.

Nolan, Christopher. "The confidentiality of interlibrary loans." The Journal of AcademicLibrarianship, 19(2), pp. 81-86.

Townsend, Kevin. "Briefing Paper: Why cookies cause upsets." Online Document.Available at URL: http://www.zdnet.co.uk/itweek/brief/2000/32/internet/ ;accessed 1/26/01.

41

35

APPENDIX ONE: THE MODEL POLICY

A Model Privacy Policy for Library Web Sites

Because libraries may vary considerably in their policies and practices, someprovisions of this policy are bracketed, indicating that the content will vary according tolocal practices. Bracketed text marked "comment" provide suggestions for personalizingthe policy rather than suggested provisions. Sentences marked with an asterisk (*) areappropriate for many libraries but may also vary according to local practices.

Privacy Policy

Contents

General principlesThe scope and limits of this policyWhat information is collectedYour choices about information collectionHow to access the information we collect about youThe accuracy and security of this informationWhat you can do if you want to know moreLinks to privacy information and library policy pages

General principles

1. The policy of the American Library Association (ALA)As information professionals, we uphold the ALA's ethical code regarding privacy..

We strive to protect each user's privacy and confidentiality, and toward this end, weadopt the this policy.

"We extend confidentiality to all information sought or received, materials consulted,borrowed, acquired, or transmitted, including database search records, referenceinterviews, interlibrary loan records, and other personally identifiable uses of libraryresources, services, and materials. Any record identifying a library user with specificmaterials will be regarded as confidential and protected. Such records will not be madeavailable to any outside agency, institution, or private firm, or any government agencyexcept pursuant to such process, order, orsubpoena as may be authorized under the authority of, and pursuant to, federal, state, orlocal law relating to civil, criminal, or administrative discovery procedures or legislative

42

36

investigatory power. We will resist the issuance or enforcement of any such process,order, or subpoena until such time as as a proper showing of good cause has been made ina court of competent jurisdiction." (ALA Policy Manual)

2. The policy of affiliated institutions and/or schools, and the policy of this library[each library, as part of some larger institution or school, will need to consult the

policies of the institution or school. Also, if the library has any specific privacy policiesof its own, apart from those of umbrella organizations and the like, will need to articulatethem here.]

The scope and limits of this policy

1. This policy is intended to extend to physical records generated in the informationseeking behaviors of all library patrons. Such physical records include papers such aswritten Interlibrary Loan requests (whether written by the patron or library staff), writtenrequests for items held on reserve or in special collections, and any notifications ofoverdue items or concerning the availability of requested items.

2. This policy is also intended to extend to electronic or digital records generated bythe use of library resources and resources provided by but not belonging to the library.Such digital records include search strategies on library OPACs, databases, and searchengines; digitalrequests for materials; electronic requests for information such as emails requestingreference help; and data collected by library web sites either explicitly (as when formsrequest information) or implicitly (as when our server requests information from yourweb browser).

Specific polices regarding electronic library resources and online library use. The rightof privacy includes five subsidiary rights: notice/awareness , choice/consent ,

access/participation , security/integrity , and redress/enforcement . That is, you have aright to know what information is collected, a right to choose if you want information tobe collected, a right to review any such information to ensure its accuracy, and a right tohave any such information protected from unwarranted or illegitimate use. You also havea right to enforce the preceding rights and seek redress through the appropriate channels.

Notice/Awareness

The library collects information about patrons in several ways.

In order to obtain a library card for checking out books and other materials,patrons must supply the library with their name, address, and phone number.*

Interlibrary loan requests -- requests for materials not owned by the library -- mayrequire the same information which is furnished to the loaning library.

[Patrons using the library's computer terminals are asked to supply their namesand the time of day of usage.]

37

All of this information is considered confidential by the library and will not bedisclosed to any outside agencies or persons, except in case where a justified and bonafide subpoena is submitted. The library maintains permanent records of patrons butdestroys all records of information seeking (including circulation records and ILLrequests) upon return of the materials.

The library's web site also collects information about patrons in a variety of ways.

All visitors ot this web site have information collected about them automatically. Thisinformation includes:

the internet domain from which this site is accessed

the internet address ( IP address ) from which this site is accessed

the type of browser and operating system you are using on your computer

the date and time you visit

the pages you view while here

if you followed a link from some other site to get to this site, the address of thatweb site

any searches conducted on this site, including both the search terms you use andthe links you follow

Most of this information is supplied automatically by your web browser. This iscalled header information. You can see exactly what information your browser suppliesto this and every other web site you visit by following this link:www.junkbusters.com/cgi-bin/privacy. This information is used by the library's web sitemaintainer to make the site easier to use and more efficient. The library uses thisinformation to learn about the habits of visitors and what areas of the web site they usethe most. This information is never stored in a record which can identify particular usersand what they access -- instead, only aggregate, statistical records are kept.

Information about your browsing on this site, such as which pages you view andhow long you view them, are stored in digital files called log files. These logfiles will never identify particular users and is not shared with any outsideagencies.

This web site does not use cookies .* [If cookies are used , this provision shouldidentify the kind of information stored in them, the type of cookies used --persistent or session , and why they are used.]

This web site has links to databases, search engines, and other web sites which maycollect personal information about visitors. We advise all patrons to refrain fromdisclosing any personal information on the internet unless the patron is reasonably certainthat this information will kept secure and confidential. Patrons should also be aware thatthese sites may keep records of any searches performed, web sites visited, and files

38

downloaded. Patrons should be aware that such information may be stored in recordsthat can identify the patron to these outside agencies, and that these agencies may in turnshare or sell this private information. For more information about privacy online, followthese links:ALA Task Force Report on Privacy in the Online EnvironmentA Primer on Internet PrivacyThe Electronic Privacy Information CenterSurfer Beware: Personal Privacy and the Internet

[comment: these links are provided to patrons as useful starting points for privacyliteracy.]For more information on the American Library Association's policies, see The ALA'sPolicy Manual

Choice/Consent

The library must collect certain information in order to provide services. Patrons maychoose to opt-out of this information collection, but this may affect the services thelibrary provides. Specifically, the library materials can be checked out of the library onlyby patrons who have released their names, addresses, and phone numbers,* as the libraryneeds some way to contact patrons should the materials become overdue. Any otherinformation collection, not connected to services provided by the library, will always beon an "opt-in" basis that is, the patron initiates the collection of information on avoluntary basis.

Information collected by the library web site is, in general, never connected to theuser. The information collected is automatically furnished by the user's web browser.The library will always ask the patron for permission to collect any information that canbe identified with the patron. [ for libraries with web sites that use cookies: The patroncan control whether or not cookies will be stored on his or her computer, by adjusting thesettings of their browser. For Microsoft Internet Explorer users, this option can be foundunder the "Tools : Internet Preferences" pull-down menu; for Netscape, this option isfound under the "Edit : Preferences" menu.]

Access/Participation

All library patrons who have had personally identifying information about themcollected have right to be sure the information is accurate and up to date. All informationcollected in connection with the issue of library cards may be reviewed and updated bycontacting [comment: insert the appropriate administrator and contact details; this willpresumably be the same administrator mentioned below ]. Patrons may view theircurrent circulation records and should see a librarian if they find any inaccuracies.[comment: If circulation records are available for online viewing, instructions foraccessing them should be placed here.]

Security/Integrity

The library takes the integrity and security of all records seriously. All records whichcan be identified with a patron are stored on computer systems which are not accessibleby agencies or individuals outside the library, and only authorized personnel have access

45

39

to such records inside the library. All of the library's records which are kept oncomputers which can be accessed from outside via the internet are protected by securitysoftware.* [comment: the details here will vary and should be disclosed in a manner thanthat does not itself pose a security risk]

The library will update patron records as needed to ensure that all data is accurate. Thelibrary does not share any patron information with other governmentor private agencies.

Redress/Enforcement

The library recognizes that privacy polices must be enforced and will take appropriatemeasures to redress any violation of a patron's privacy. Please contact [the administratorin charge of policy and security] if you have any questions about what personallyidentifing records about you are maintained or if you feel that your confidentiality hasbeen compromised.

[comment: There should be every effort to make this administrator accessible to thepublic for questions and assurances, through email, phone, and personal contact. Thisadministrator should oversee the enforcement of library policies and keep the staffinformed about these policies.]

[comment: There should also a brief disclosure of any state or local laws whichoversee the confidentiality of library records or potentially overrule these polices, such as"sunshine laws."]

Links

The ALA's Policy ManualALA Task Force Report on Privacy in the Online EnvironmentA Primer on Internet PrivacyThe Electronic Privacy Information CenterSurfer Beware: Personal Privacy and the InternetJunkbusters' Privacy Alert Page

46

41

APPENDIX 2: HTML SOURCE FOR THE MODEL POLICY

<!doctype html public "-//w3c//dtd html 4.0 transitional//en"><html><head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><meta name="Author" content="Michael Monaco"><meta name="GENERATOR" content="Mozilla/4.73 [en] (Win95; U) [Netscape]"><title>MODELPOLICY</title>

</head><body><br><center><p><b><font size=+1>A Model Privacy Policy for Library Web Sites</font></b></center>

<p>&nbsp;&nbsp;&nbsp;&nbsp; Because libraries may vary considerably in their policies andpractices, some provisions of this policy are bracketed, indicating that the content will varyaccording to local practices.&nbsp; Bracketed text marked "comment" provide suggestions forpersonalizing the policy rather than suggested provisions.&nbsp; Sentences marked with anasterisk (*) are appropriate for many libraries but may also vary according to local practices.<p><b><font size=+1>Privacy Policy</font></b><p><b>Contents</b><br><br>&nbsp;<a href="#Principles">General principles</a><br>&nbsp;<a href="#Scope">The scope and limits of this policy</a><br>&nbsp;<a href="#Notice">What information is collected</a><br>&nbsp;<a href="#Choice">Your choices about information collection</a><br>&nbsp;<a href="#Access">How to access the information we collect about you</a><br>&nbsp;<a href="#Security">The accuracy and security of this information</a><br>&nbsp;<a href="#Redress">What you can do if you want to know more</a><br>&nbsp;<a href="#Links">Links to privacy information and library policy pages</a><br>&nbsp;<p><a NAME="Principles"></a><b>General principles<b><p>&nbsp;&nbsp;&nbsp; 1.&nbsp; The policy of the American Library Association(ALA)<br>&nbsp;&nbsp;&nbsp; As information professionals, we uphold the <ahref="OnlinePrivacy.htm#alapolicies">ALA's ethical code regarding privacy</a> .&nbsp; We

47

42strive to protect each user's privacy and confidentiality, and toward this end, we adopt the thispolicy.<p>&nbsp;&nbsp;&nbsp; "We extend confidentiality to all information sought or received,materials consulted, borrowed, acquired, or transmitted, including database search records,reference interviews, interlibrary loan records, and other personally identifiable uses of libraryresources, services, and materials.&nbsp; Any record identifying a library user with specificmaterials will be regarded as confidential and protected.&nbsp; Such records will not be madeavailable to any outside agency, institution, or private firm, or any government agency exceptpursuant to such process, order, or<br>subpoena as may be authorized under the authority of, and pursuant to, federal, state, orlocal law relating to civil, criminal, or administrative discovery procedures or legislativeinvestigatory power.&nbsp; We will resist the issuance or enforcement of any such process,order, or subpoena until such time as as a proper showing of good cause has been made in acourt of competent jurisdiction."&nbsp; (ALA Policy Manual)<p>&nbsp;&nbsp;&nbsp; 2. The policy of affiliated institutions and/or schools,and the policy of this library<br>&nbsp;&nbsp;&nbsp; [each library, as part of some larger institution or school, will need toconsult the policies of the institution or school.&nbsp; Also, if the library has any specificprivacy policies of its own, apart from those of umbrella organizations and the like, will need toarticulate them here.]<p><a NAME="Scope"></a><b>The scope and limits of this policy</b><p>&nbsp;&nbsp;&nbsp; 1.&nbsp; This policy is intended to extend to physical recordsgenerated in the information seeking behaviors of all library patrons.&nbsp; Such physicalrecords include papers such as written Interlibrary Loan requests (whether written by the patronor library staff), written requests for items held on reserve or in special collections, and anynotifications of overdue items or concerning the availability of&nbsp; requested items.<p>&nbsp;&nbsp;&nbsp; 2.&nbsp; This policy is also intended to extend to electronic or digitalrecords generated by the use of library resources and resources provided by but not belonging tothe library.&nbsp; Such digital records include search strategies on library OPACs, databases,and search engines; digital<br>requests for materials; electronic requests for information such as emails requesting'reference help; and data collected by library web sites either explicitly (as when forms requestinformation) or implicitly (as when our server requests information from your web browser).<p>&nbsp;&nbsp;&nbsp; Specific polices regarding electronic library resourcesand online library use.&nbsp; The right of privacy includes five subsidiary rights:&nbsp; <ahref="OnlinePrivacy.htm#NOTICE">notice/awareness</a> , <ahref="OnlinePrivacy.htm#CHOICE">choice/consent</a> , <ahref="OnlinePrivacy.htm#ACCESS">access/participation<a> ,

<a href="OnlinePrivacy.htm#SECURITY">security/integrity</a>, and <a href="OnlinePrivacy.htm#REDRESS">redress/enforcement</a> .&nbsp;That is, you have a right to know what information is collected, a right to choose if you wantinformation to be collected, a right to review any such information to ensure its accuracy, and aright to have any such information protected from unwarranted or illegitimate use.&nbsp; Youalso have a right to enforce the preceding rights and seek redress through the appropriatechannels.<p><a NAME="Notice"></a><b>Notice/Awareness</b>

48

43<p>&nbsp;&nbsp;&nbsp;&nbsp; The <b>library</b> collects information about patrons inseveral ways.<br><ul><li>In order to obtain a library card for checking out books and other materials, patrons must supplythe library with their name, address, and phone number.*</li>

<li>Interlibrary loan requests -- requests for materials not owned by the library -- may require thesame information which is furnished to the loaning library.</li>

<li>[Patrons using the library's computer terminals are asked to supply their names and the time ofday of usage.]</li></ul>&nbsp;&nbsp;&nbsp;&nbsp; All of this information is considered confidential by the library andwill not be disclosed to any outside agencies or persons, except in case where a justified andbona fide subpoena is submitted.&nbsp; The library maintains permanent records of patrons butdestroys all records of information seeking (including circulation records and ILL requests)upon return of the materials.<p>&nbsp;&nbsp;&nbsp;&nbsp; The<b> library's web site</b> also collects information aboutpatrons in a variety of ways.<p>&nbsp;&nbsp;&nbsp;&nbsp; All visitors to this web site have informationcollected about them automatically.&nbsp; This information includes:<ul><li>the internet domain from which this site is accessed</li>

<li>the internet address ( <a href="OnlinePrivacy.htm#IPADDRESS">IP address</a> ) from whichthis site is accessed</li>

<li>the type of browser and operating system you are using on your computer</li>

<li>the date and time you visit</li>

<li>the pages you view while here</li>

<li>if you followed a link from some other site to get to this site, the address of that web site</li>

<li>

4 9

44any searches conducted on this site, including both the search terms you use and the links youfollow</li></ul>&nbsp;&nbsp;&nbsp;&nbsp; Most of this information is supplied automatically by your webbrowser.&nbsp; This is called&nbsp; <a href="OnlinePrivacy.htm#HEADERS">headerinformation<a>.&nbsp; You can see exactly what information your browser supplies to this andevery other web site you visit by following this link:<a href="www.junkbusters.com/cgi-bin/privacy">www.junkbusters.com/cgi-bin/privacy.</a>&nbsp;&nbsp;This information is used by the library's web site maintainer to make the site easier to use andmore efficient.&nbsp; The library uses this information to learn about the habits of visitors andwhat areas of the web site they use the most.&nbsp; This information is never stored in a recordwhich can identify particular users and what they access -- instead, only <ahref="OnlinePrivacy.htm#aggregatenotpersonal">aggregate, statistical records</a> are kept.<br>&nbsp;<ul><li>Information about your browsing on this site, such as which pages you view and how long youview them, are stored in digital files called&nbsp; <ahref="OnlinePrivacy.htm#LOGFILES">log files</a>.&nbsp; These log files will never identifyparticular users and is not shared with any outside agencies.</li>

<li>This web site does not use&nbsp; <a href="OnlinePrivacy.htm#COOKIEdr>cookies</a>.* [If cookies are&nbsp; <a href="OnlinePrivacy.htm#COOKIESuse">used</a>, this provision should identify the kind of information stored in them, the type of cookies used --&nbsp; <a href="OnlinePrivacy.htm#COOKIEtypes">persistent or session</a> , and why theyare used.]</li></ul>&nbsp;&nbsp;&nbsp;&nbsp; This web site has links to databases, search engines, and other websites which may collect personal information about visitors.&nbsp; We advise all patrons torefrain from disclosing any personal informationon the internet unless the patron is reasonablycertain that this information will kept secure and confidential.&nbsp; Patrons should also beaware that these sites may keep records of any searches performed, web sites visited, and filesdownloaded.&nbsp; Patrons should be aware that such information may be stored in records thatcan identify the patron to these outside agencies, and that these agencies may in turn share or sellthis private information.&nbsp; For more information about privacy online, follow these links:<br>&nbsp;<a href="http://staffweb.library.vanderbilt.edu/ala_tf/report.htm">ALATask ForceReport on Privacy in the Online Environrnent</a><br>&nbsp;<a href="http://www.kcoyle.net/privacyprimer.html">A Primeron InternetPrivacy</a><br>&nbsp;<a href="http://www.epic.org">The Electronic Privacy Information Center</a><br>&nbsp;<a href="http://www.epic.org/reports/surfer-beware.html">Surfer Beware: PersonalPrivacy and the Internet</a><br>[comment: these links are provided to patrons as useful starting pointsfor privacy literacy.]

50

45<br>For more information on the American Library Association's policies, see&nbsp; <ahref="http://www.ala.org/alaorg/policymanual/index.htm">TheALA's Policy Manual</a><p><a NAME="Choice"></a><b>Choice/Consent</b><p>&nbsp;&nbsp;&nbsp;&nbsp; The library must collect certain information in order to provideservices.&nbsp; Patrons may choose to&nbsp; <a href="OnlinePrivacy.htm#OPTIN/OUT">opt-out</a>&nbsp; of this information collection, but this may affect the services the libraryprovides.&nbsp; Specifically, the library materials can be checked out of the library only bypatrons who have released their names, addresses, and phone numbers,* as the library needssome way to contact patrons should the materials become overdue.&nbsp; Any other informationcollection, not connected to services provided by the library, will always be on an "opt-in" basis -- that is, the patron initiates the collection of information on a voluntary basis.<p>&nbsp;&nbsp;&nbsp;&nbsp; Information collected by the library web site is, in general,never connected to the user.&nbsp; The information collected is&nbsp; <ahref----"OnlinePrivacy.htm#HEADERS">automatically furnished</a>&nbsp; by the user's webbrowser.&nbsp; The library will always ask the patron for permission to collect any informationthat can be identified with the patron. [for libraries with web sites that use cookies: The patroncan control whether or not cookies will be stored on his or her computer, by adjusting thesettings of their browser.&nbsp; For Microsoft Internet Explorer users, this option can be foundunder the "Tools : Internet Preferences" pull-down menu; for Netscape, this option is foundunder the "Edit : Preferences" menu.]<p><a NAME="Access"></a><b>Access/Participation</b><p>&nbsp;&nbsp;&nbsp;&nbsp; All library patrons who have had personally identifyinginformation about them collected have right to be sure the information is accurate and up todate.&nbsp; All information collected in connection with the issue of library cards may bereviewed and updated by contacting [comment: insert the appropriate administrator and contactdetails; this will presumably be the same administrator mentioned <a href="#admin">below</a>].&nbsp; Patrons may view their current circulation records and should see a librarian if they findany inaccuracies. [comment: If circulation records are available for online viewing, instructionsfor accessing them should be placed here.]<p><a NAME="Security"></a><b>Security/Integrity</b><p>&nbsp;&nbsp;&nbsp;&nbsp; The library takes the integrity and security of all recordsseriously.&nbsp; All records which can be identified with a patron are stored on computersystems which are not accessible by agencies or individuals outside the library, and onlyauthorized personnel have access to such records inside the library.&nbsp; All of the library'srecords which are kept on computers which can be accessed from outside via the internet areprotected by security software.* [comment: the details here will vary and should be disclosed ina manner than that does not itself pose a security risk]<p>&nbsp;&nbsp;&nbsp; The library will update patron records as needed to ensure that all datais accurate.&nbsp; The library does not share any patron information with other government orprivate agencies.<p><a NAME="Redress"></a><b>Redress/Enforcement</b><p>&nbsp;&nbsp;&nbsp;&nbsp; The library recognizes that privacy polices must be enforcedand will take appropriate measures to redress any violation of a patron's privacy.&nbsp; Pleasecontact&nbsp;<a NAME="admin"></a>[the administrator in charge of policy and security] ifyou have any questions about what personally identifing records about you are maintained or if

51

46

you feel that your confidentiality has been compromised.

<br>&nbsp;&nbsp;&nbsp;&nbsp;[comment: There should be every effort to make this

administrator accessible to the public for questions and assurances, through email, phone, and

personal contact.&nbsp; This administrator should oversee the enforcement of library policies

and keep the staff informed about these policies.]

<br>&nbsp;&nbsp;&nbsp;&nbsp;[comment: There should also a brief disclosure of any state or

local laws which oversee the confidentiality of library records or potentially overrule these

polices, such as "sunshine laws."]

<p><a NAME="Links"></a><b>Links</b><p><a href="http://www.ala.org/alaorg/policymanual/index.htm">The

ALA's Policy

Manual</a><br><a href="http://staffweblibrary.vanderbilt.edu/ala_tf/report.htm">ALA

Task Force Report

on Privacy in the Online Environment</a>

<br><a href="http://www.kcoyle.net/privacyprimer.html">APrimer on Internet Privacy</a>

<br><a href="http://www.epic.org">TheElectronic Privacy Information Center</a>

<br><a href=-"http://www.epic.org/reports/surfer-beware.html">SurferBeware: Personal Privacy

and the Internet</a><br><a href="http://www.junkbusters.comkgi-bin/privacy">Junkbusters'

Privacy Alert

Page</a><br></body></html>

52

47

APPENDIX 3: HTML SOURCE OF THE POLICY ANNOTATION

<!doctype html public "-//w3c//dtd html 4.0 transitional//en"><html><head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"><meta name="Generator" content="Microsoft Word 97"><meta name="Template" content="CAPROGRAM FILES\MICROSOFT

OFFICE\OFFICE\html.dot"><meta name="GENERATOR" content="Mozilla/4.73 [en] (Win95; U) [Netscape]"><title>Online Privacy</title>

</head><body link="#000OFF" vlink="#800080">&nbsp;<br><center><p><b>&nbsp;I. INTRODUCTION</b></center>

<p>&nbsp;&nbsp;&nbsp;&nbsp; "Privacy" is a complex concept which has taken manymeanings over time.&nbsp; In the past, privacy was understood to be a right to freedom fromobservation and scrutiny in the personal life of an individual, so that privacy was felt to beviolated when a person's behavior was observed or otherwise made public in a way the personfound invasive and revealing.&nbsp; Thus, an individual's life within the home and amongintimate acquaintances was understood to be protected to some extent from publicscrutiny.&nbsp; But nowadays privacy is also thought to extend to information about a person,especially information which related to behaviors or status that is not regarded as public.&nbsp;Thus financial records, health records, and the like are thought to be "private" in the sense thatsuch information is or should be under the control of the subject of this information.&nbsp; It isalso commonly held that intimate, personal exchanges between an individual and variousprofessionals who are given personal information about the individual should be regarded asconfidential.&nbsp; Because information seeking behaviors can potentially reveal privateinformation about the seeker, and because such information seeking often is assisted byinformation professionals with an understanding of confidentiality, librarians and otherinformation professionals must recognize and protect the confidentiality of any records ofinformation seeking.&nbsp; This paper will explore guidelines outlining the protection ofprivacy and specific kinds of information that are generated in information seeking, in orderto develop a set of recommendations for the protection of the confidentiality of library users inthe online environment.<br>

53

48<br><br><center><p><b>II. GENERAL STATEMENTS OF POLICY AND THE SCOPE OFCONFIDENTIALITY/PRIVACY</b></center>

<p>&nbsp; Confidentiality and privacy are values which have been linked to both freedom ofexpression and the right to access information.&nbsp; Librarians and information professionalsin general recognize the importance of maintaining the trust of information seekers, and haveundertaken a variety of efforts to insure that the confidence and privacy of their clientsare protected.&nbsp; As the internet and online environments have become increasinglyimportant sources of information, they have also created a number of new contexts for privacyissues.&nbsp; This paper will identify and explore the privacy issues which accompany onlineinformation seeking, and what steps librarians should take to address these issues.&nbsp; Tosee that privacy is of importance to librarians, this paper will exhibit the policies of the ALA andsome statements made by individual librarians and information professionals. Then, whatprivacy protection consists in will be identified, and finally these principles will be applied tospecific issues in the online environment.<br><br><br><center><p><a NAME="alapolicies"></a><b>Privacy and Confidentiality Policies of theALA</b></center>

<p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; The American Library Association's policy manual, section54.16 "On Professional Ethics," offers a series of statements to guide ethical conduct forlibrarians, one of which is "We protect each library user's right to privacy and confidentialitywith respect to information sought or received and resources consulted, borrowed, acquired, ortransmitted."&nbsp;&nbsp; This simple statement establishes that a core value of librarianship isthe protection of every user's privacy.&nbsp; The library user may not think very much aboutconfidentiality when seeking information, but even so there is a duty to safeguard the user'sprivacy and confidentiality.&nbsp; It is not this paper's purpose to explore the reasons andjustifications supporting this duty on the part of libraries, although it is clear that in part this dutyarises from the potential "chilling effect" a lack of protection might create among users.&nbsp;The important point is that the ALA recognizes confidentiality and privacy as important rights oflibrary users.<p>&nbsp;&nbsp;&nbsp;&nbsp; One area where the confidentiality of library users has beenchallenged is in circulation records.&nbsp; Law enforcement agencies have requested thisinformation, either to obtain the records of specific persons or as part of "fishing expeditions" toidentify potential suspects.&nbsp; The ALA has repeatedly fought such efforts and section 52.4specifically addresses the confidentiality of library records.&nbsp; In fact, 52.4 identifies avariety of records, beyond just circulation records, for protection:

5 4

49<blockquote>Confidentiality extends to "information sought or received, and materialsconsulted, borrowed, or acquired," and includes database search records, reference interviews,circulation records, interlibrary loan records, and other personally identifiable uses of librarymaterials, facilities, or services.</blockquote>There are several important ideas in this sentence.&nbsp; First, it states that confidentialityextends to any library record that could identify particular persons.&nbsp; Second, it states thatconfidentiality extends to uses of library resources, suggesting that any use of resources whichproduces some type of record is to be protected, not just the uses of resources that are mediatedby library personnel.&nbsp; Thus, if a library user were to use a library computer to seekinformation, any electronic records of such use (and we shall see that there are several) shouldalso be protected.&nbsp;<a NAME="aggregatenotpersonal"></a>Finally, it should be noted thatthere is an emphasis on personally identifiable information -- that is, information which can belinked with specific individuals.&nbsp; Where records of information seeking are aggregated,abstracted, or, otherwise collected into data that does not identify specific individuals in a waythat can be traced back to individuals, this information can rightly be regarded as falling outsidethe concerns for and protections of privacy and confidentiality.<p>&nbsp;&nbsp;&nbsp;&nbsp; Section 52.4 of the policy manual ("Confidentiality of PatronRecords") addresses the appropriate legal procedure for law enforcement to access suchconfidential records, but it also stresses the need for libraries to adopt formal policiesrecognizing the above standard of confidentiality.&nbsp; In order to adequately address theconfidentiality of records, libraries must address the specific kinds of records created in theonline environment, which will be discussed below.<p>&nbsp;&nbsp;&nbsp;&nbsp; The ALA's <u>Intellectual Freedom Manual<u>reiterates this policy under the headings "Policy on the Confidentiality of Library Records" and"Policy concerning Confidentiality of Personally Identifiable Information about LibraryUsers."&nbsp; These two sections actually present portions of 52.4, and also provide somehistorical background on the events which led the ALA to issue the policy.&nbsp; Apart fromthe historical accounts, the Intellectual Freedom Manual does not alter or expand the scope orrange of records identified in the ALA Policy Manual.<p>&nbsp;&nbsp;&nbsp;&nbsp; Apart from the general policies of the ALA, there is anotherdocument outlining the impact of computer technology on the privacy and confidentiality ofpatron records.&nbsp; This document is the <u>Report of the Task Force on Privacy andConfidentiality in the Electronic Environment<u>, issued July 7, 2000.&nbsp; The reportincludes a number of important findings.<p>&nbsp;&nbsp;&nbsp;&nbsp; First, there is the issue of computer system security.&nbsp;The Task Force found that insofar as some patron records exist as electronic records on librarycomputers, the library must recognize a duty to protect these records from hackers or otherunauthorized access.&nbsp; Specific security measures fall outside the scope of my work butsome account of the library's commitment to resist unauthorized access to computer recordsshould be disclosed to users.<p>&nbsp;&nbsp;&nbsp;&nbsp; Second, the Task Force found that a variety of privacy issuesare raised by in-library internet access.&nbsp; Every internet transaction is potentially a sourceof information gathering by web sites and servers outside the library.&nbsp; Because manypatrons may use a computer over the course of a day, there needs to be some awareness of thepotential for subsequent users to see traces of the web sites visited by previous users.&nbsp;

55

50There is also the potential for other patrons to see the screen of a computer being used by apatron, thereby compromising the user's privacy.<p>&nbsp;&nbsp;&nbsp;&nbsp; Third, the Task Force recognizes potential problems raised bythe use of electronic resources provided by a remote vendon&nbsp; These vendors may collectdata about resource access and even about the patrons accessing them without guaranteeing thesame protections of a library.&nbsp; Thus, it is important for libraries to establish privacyprotection measures in their licenses and contracts with vendors or else to give patrons noticethat personal information may be collected by the vendor.<p>&nbsp;&nbsp;&nbsp;&nbsp; Apart from these significant findings, the Task Force issued anumber of recommendations.&nbsp; Beyond revising ALA policies concerning confidentialityof records to address the findings mentioned above, the Task Force calls on the ALA to "urgethat all libraries adopt a privacy statement on web pages and post privacy policies in thelibrary which cover the issues of privacy in internet use as accessed through the library'sservices.11<br><br><br><center><p><b>The FTC's Online Privacy Reports</b></center><p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; The Federal Trade Commission's reports on developing atheoretical framework for fair information practices online stand out as particularly explicit andwell-informed documents.&nbsp; The focus of the FTC's two reports to Congress has been oncommercial use of the internet, but the general discussion of fair information practices here isparticularly useful.&nbsp; The FTC reviewed some twenty-five years worth of governmentdocuments and studies concerning the collection of personal information and identified five coreprinciples of privacy which were common to all.&nbsp; These principleswere identified in 1998as Notice/Awareness, Choice/Consent, Access/Participation, Integrity/Security, andEnforcement/Redress.&nbsp; Before discussing the particulars of each principle, it should benoted that the FTC's 2000 report to Congress pares down the list Notice, Choice, Access, andSecurity -- Enforcement/Redress is dropped from the core -- presumably because the 2000 reportis intended to guide enforceable legislation, and not because the FTCno longer views theenforcement of privacy protection as important.<p><a NAME="NOTICE"></a>&nbsp;&nbsp;&nbsp;&nbsp; The principle of notice isregarded as the most ftmdamental of the principles.&nbsp; The idea is that the individual musthave an awareness of the practices of information collecting agencies beforehe can decide todisclose personal information.&nbsp; In addition, the individual would need to know thatinformation is collected before he could attempt to access, evaluate, or correct the information,and also before he could make any effort to redress illicit or unauthorized use of theinformation.&nbsp; The FTC concludes that the principle of notice requires that personalinformation collecting entities should be required to disclose at least some of the following inorder to provide meaningful notice: (1) the identity of the entity collecting data; (2) the uses towhich data is put; (3) the identity of any potential recipients of the data; (4) the nature of the datacollected and means of collection; (5) whether the individual user or consumer is required tofurnish personal information, and the consequences of refusal to do so; and (6) the measures

56

51taken by the collecting entity to protect the data, ensure its accuracy, and uphold itsconfidentiality. The FTC's requirements are not quite stringent enough for libraries, in so far aslibraries have a positive commitment to protecting confidentiality, and so all of these itemsshould be disclosed in a library privacy policy.&nbsp; The FTC does however raise an importantpoint about the posting of policies: they should be readily assessable both from the home page ofa web site and from any pages where personal information is collected.<p><a NAME="CHOICE"></a>&nbspAnbspAnbspAnbsp; The principle of choice requiresthat the individual whose personal information is to be collected be given the option to furnishinformation or not.&nbsp; It also requires that the individual be given a choice about how theinformation will be used, and especially about how the information may be put to use beyondthe initial transaction that requires the disclosure of personal information. Thus, if the owner of aweb site intends to collect personal information, there must be consent from the user of consumerboth for the initial collection of information and for any uses the information might be put to:web site management and development, sale to advertisers or direct marketing firms, sharingwith other companies for market research, or any other use.&nbsp; This principle can beimplemented in one of two ways -- either allowing the user to opt-in or to opt-out.&nbsp;<aNAME="OPTIN OUT"><a>"Opt-in" means the individual must actively consent to the_collection and use of mformation.&nbsp; "Opt-out" means that the user must actively denyconsent for information collection and use.&nbsp; It is hardly surprising that most collectors ofinformation prefer the latter, as it allows them to assume consent from any individual, andrequires special effort on the individual's part, rather than on the information collecting entity'spart, to protect privacy.&nbsp; Libraries, however, would probably show greater fidelity to theuser's confidentiality by using "opt-in" protocols wherever possible, as this provides anadditional opportunity to both disclose policy and assure the user of the library's commitment toprivacy.<p><a NAME="ACCESS"></a>&nbsp;&nbsp;&nbsp;&nbsp; The principle of access iscomprised of two rights on the part of the individual about whom information is collected: theright to review any information and the right to correct or contest the information. This principlecan only be upheld effectively if there is a relatively easy and inexpensive procedure forreviewing and correcting the data.&nbsp; The more this information is limited in scope andcontent, the easier it will be to ensure that the information is accurate.<p><a NAME="SECURITY"></a>&nbsp;&nbsp;&nbsp;&nbsp; The principle of securitycovers both the integrity or quality of information and the protection of information from lossand the unauthorized disclosure, use, and access of the information.&nbsp;&nbsp;&nbsp; Theintegrity of information is protected in part by allowing the individual to access and correctinformation, but there is also a responsibility on the part of the collecting entity to use prudencein selecting sources of information.&nbsp; Finally, the occasional destruction of obsolete or oldinformation is necessary to protect the quality and integrity of information.&nbsp; Protecting thesecurity of information calls for both technological and administrative measures. Thetechnological measures involved might include encryption, pass-word protection, firewalls, andstorage on secure servers.&nbsp; The administrative measures should focus on setting limits onwho can access the information and to what purposes the information can be used.&nbsp;Obviously, it is imperative that the information never be used in manners or for purposes notauthorized by the individual.&nbsp; Libraries should have policies in place which limit access topatron records of any kind, and also have technological protections sufficient to preventunauthorized access to records.

57

52<p><a NAME="REDRESS"></a>&nbsp;&nbsp;&nbsp;&nbsp; The last principle is theprinciple of enforcement.&nbsp; The FTC concludes that "the core principles of privacy canonly be effective if there is a mechanism in place to enforce them." The FTC outlines severalmechanisms of enforcement: self-regulation, private remedies, and governmentenforcement.&nbsp; Self-regulation, the FTC contends, can be carried out by requiring membersof professional or industrial organizations to accept and comply with a privacy policy.&nbsp;There is a clear application of this principle for libraries: the adoption of privacy policies byorganizations such as the ACRL, the ALA, and the SLA.&nbsp; These policies should be fairlyexplicit, and there would also be a need for developing a system to verify compliance.&nbsp;Because it is unlikely that libraries would be motivated to violate privacy policies (unlike, say,private firms which might realize a profit from selling customer information), it may be enoughto simply require libraries to adopt formal privacy policies and post them on their websites.&nbsp; Tort law provides for a certain amount of private remedies.&nbsp; But it is unclear,at this point, what steps legislatures may take to pass laws concerning privacy protection.<p>&nbsp;&nbsp;&nbsp;&nbsp; Taken together, the five principles of privacy protectionidentified by the FTC provide a strong foundation for specifying the principles libraries shoulduphold with respect to personal information.&nbsp; But it is also helpful to notice to somespecific statements of principles offered by librarians and other information professionalsconcerning privacy and confidentiality.&nbsp; This is important to do because the FTC'sprinciples constitute a minimal set of guidelines to restrict the activities of commercialentities.&nbsp; But librarians are committed to doing more than merely setting limits on theiruse of personal information -- they must take positive steps to ensure that confidentiality isalways protected.<br><br><br><center><p><b>Guidelines of the Organization for Economic Cooperation andDevelopment</b></center><p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Although it is impossible and unnecessary to discuss all of themany statements of principles of privacy protection created by organizations and individuals, it isenlightening to review the guidelines issued in 1980 by the OECD.&nbsp; These guidelinesconsist of eight principles which have influenced many later lists of principles. It is possible to"map" these eight principles onto the five FTC principles to emphasize the wide area covered bythe FTC's principles and to show that those five principles are sufficient to cover many privacyconcerns.&nbsp; The principles of the OECD consist of a collection limitation principle;a data quality principle; a purpose specification principle; a use limitation principle; a securitysafeguards principle; an openness principle; an individual participation principle; and anaccountability principle.<p>&nbsp;&nbsp;&nbsp;&nbsp; The collection limitation principle calls for limits to thepersonal information collected. It also requires that the subject be informed of the collection, andwhen possible that consent be obtained from the subject.&nbsp; This principle thus falls underthe FTC's notice/awareness principle.&nbsp; The data quality principle requires that

58

53

collected data be kept accurate and up-to-date, and so it falls under the access/participationprinciple.&nbsp; The purpose specification principle requires that information gathered musthave the purpose for its collection and use specified at the time of gathering, and the informationmust be put to no other use.&nbsp; This falls under the security/integrity principle.&nbsp;The use limitation principle requires that consent be obtained from the data subject should thedata be used for other purposes than those agreed to, or should the data be disclosed toothers.&nbsp; This falls under the choice/consent principle and also the security/integrityprinciple.&nbsp; The openness principle requires that information collectors be open about theirpolicies, practices, and developments with respect to personal information.&nbsp; It alsorequires that the collector respond to inquiries from data subjects and identify themselves.&nbsp;This falls under access/participation and notice/awareness. The security safeguards principlerequires that data be protected from loss and unauthorized access, use, or disclosure.&nbsp;This falls under the security/integrity principle of the FTC.&nbsp; The individual participationprinciple provides the subjects of data collection with the right to know whether or not data hasbeen collected about them; to access the data about them; and to challenge and correct data aboutthem.&nbsp; This falls under the access/participation principle.&nbsp; The accountabilityprinciple requires that data controllers be held accountable to these requirements, through legalor other means, and falls under the enforcement/redress principle.<p>&nbsp;&nbsp;&nbsp;&nbsp; It is clear, then, that the OECD principles, which were widelyadopted before the emergence of the internet as it is now known, are exhaustively covered bythe FTC principles.<br><br><br><center><p><b>Personal Statements of Privacy Principles</b></center><p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Beyond the principles outlined by various organizations,several statements of privacy principles made by individual librarians and informationprofessionals are worth noting.&nbsp; Although these statements do not attempt to cover everyaspect of privacy and confidentiality, they do focus attention on issues which are of particularimportance to librarianship.<br><br><br><center><p>Featherman's Ten Commandments</center><p><br><br><br><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; John Featherman of ASIS publishes a newsletter on privacyfor consumers, and at the 1997 ASIS mid-year meeting presented a set of rules for individuals tohelp ensure that their privacy was protected.&nbsp; Although many of these focus on strategies

59

54for individuals, there are several rules that are applicable to institutions as well.&nbsp; Hisrules he calls them the "Ten Commandments of Privacy" -- are:<ol>1. Thou shalt keep sensitive information private.<br>2. Thou shalt pay in cash whenever possible.<br>3. Thou shalt guard thy social security number and other identification numbers with thylife.<br>4. Thou shalt use a paper shredder in thy daily life.<br>5. Thou shalt use a post office box or, better yet, a mail drop.<br>6. Thou shalt inspect thy credit, medical, and other personal information files often.<br>7. Thou shalt be circumspect in thy computer affairs.<br>8. Thou shalt be extremely discreet when communicating.<br>9. Thou shalt be diligent when choosing passwords and shalt change them often.<br>10. Thou shalt make a lifetime commitment to protecting you privacy.</ol>

Each of these commandments is clearly directed at individuals rather than institutions, but thereare several points raised here that are worth considering.&nbsp; The third commandment shouldremind us that Social Security Numbers, driver license numbers, and other personally identifyingnumbers must be guarded with special attention.&nbsp; Many libraries never request this kind ofinformation, but some may use them in patron records.&nbsp; For example, the Kent StateUniversity library uses student ID cards as library cards, and the student number printed andencoded on each card is usually the individual's Social Security Number.&nbsp; The thirdcommandment should call attention to the sensitivity of these student ID numbers.<p>&nbsp;&nbsp;&nbsp;&nbsp; The fourth commandment is important at an institutionallevel because paper records are often produced in libraries, as in the ILL and book requestprocess.&nbsp; Computer print-outs of web pages produced inside a library may also bepotentially identifiable, because the most popular browsers include the time and date as headersor footers in print-outs, and those libraries that require registration to use computer terminalsmake it possible for a persistent and industrious snoop to identify the patron who printed aparticular page.&nbsp; For this reason, abandoned print-outs should be destroyed and not merelythrown out.<p>&nbsp;&nbsp;&nbsp;&nbsp; Commandment six calls on individuals to exercise their rightto access information collected about themselves, as outlined in the FTC's principle ofaccess.&nbsp; Commandment nine calls attention to the need for librarians to periodicallychange the passwords that provide access to personal information -- and the principle of securityholds that we ought to restrict access to personal information with passwords.<p>&nbsp;&nbsp;&nbsp;&nbsp; Finally, commandment seven focuses on computers aspotential privacy hazards.&nbsp; Featherman explains that encryption should be used wheneverpersonal information is transmitted, and we should add that libraries would do well to useencryption whenever they transmit information that may identify patrons, such as ILL requests.<br>&nbsp;<br>&nbsp;<br><center><p>Gorman's "New Libraries, Old Values"</center>

<p><br>

60

55<br><p>&nbsp;&nbsp;&nbsp;&nbsp; Michael Gorman lists privacy as one of eight values of thatunderpin librarianship.&nbsp; He writes:<blockquote>The confidentiality of library records is not the most sensational weapon in thefight for privacy, but it is important, both on practical and moral grounds.&nbsp; In practicalterms, a lot of the relationship between a library and its patrons is based on trust, and, in a freesociety, a library user should be secure in trusting us not to reveal what is being read and bywhom.&nbsp; On moral grounds, we must start with the premise that everyone is entitled tofreedom of access, freedom to read texts and view images, and freedom of thought andexpression.&nbsp; None of these freedoms can survive in an atmosphere in which library use ismonitored and individual reading patters are made known to anyone withoutpermission.</blockquote>Gorman quite rightly focuses attention on the role of trust in library patronage, and speaks intechnologically neutral language about the right to read text and view images with confidencethat one's information seeking will not be revealed to others.&nbsp; In the context of onlineinformation seeking, this means that a user should never be identified with web pagesor computer files accessed.<br><br><br><center><p>Coyle's Elements of a Privacy Policy</center><p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Karen Coyle, a privacy advocate and member of the ALA'sTask Force on Privacy and Confidentiality in the Electronic Environment,&nbsp; has outlinedessential elements for a library web site privacy policy. Her elements fall under four maincategories: Background Information, Your Library's System, Policy Elements, and Links.<p>&nbsp;&nbsp;&nbsp;&nbsp; Background information should include both legal and policystatements.&nbsp; Coyle recommends providing information about state and local lawsconcerning public records and library records.&nbsp; This seems reasonable, as users may find itreassuring to know what protections existAnbsp; But they will also find it useful to know whatlimits there may be in the protection of confidentiality where laws diverge from libraryvalues.&nbsp; The policy statements would include both the ALA's policy on confidentiality andlocal policies -- that is, the policy of the institution to which the library belongs and the specificpolicies of the library.<p>&nbsp;&nbsp; The section on your library's system would outline the specific issues raisedby the network, web page design, and connected but remote systems.&nbsp; These systemelements would include a variety of matters.&nbsp; The logging system the library uses on itsweb server, which tracks http requests and browsing, should be explained.&nbsp; Likewise,any personalization features on the system should be explained so that users would know whatinformation about them is stored in the system, such as their log-in history, e-mail features, anddocument delivery.&nbsp; Finally, the user should be made aware that personally identifyinginformation may be requested by remote databases accessed through the library system orfurnished to interlibrary loan partners.<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The policy elements would contain details

61

56about the access, integrity, and security of data stored on the library system.&nbsp; Theprotections in place, the length of retention, and who can access the data should all be disclosed.<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Lastly, the policy should include links to further clarifyand explain privacy issues.&nbsp; Coyle specifically recommends that the online ALA policymanual should be linked, as well as the ALA task force report on online privacy.&nbsp; This listof links should not be considered exhaustive, but note that protecting user privacy and providingprivacy literacy training can be distinguished.&nbsp; It is beyond the scope of my project tocreate a privacy literacy curriculum.<br><br><br><br><br><center><p><b>III. SPECIFIC PRIVACY ISSUES OF THE ONLINE ENVIRONMENT</b><br><br><p><b>Cookies</b></center><p><br><p><a NAME="COOKIEdf'></a>&nbsp;&nbsp;&nbsp;&nbsp; A "cookie" is small text file --4k or smaller -- which records information on the hard drive of a computer requesting a webpage.&nbsp; The content of a cookie generally consists of three main elements: the address ofthe server or web site which sent the cookie, an identification code for the specific computer,and a set of codes recording information about the user browsing habits and/orpreferences.&nbsp; The contents of the cookie are encoded so that the recipient is unlikely to beable to interpret what they actually contain.&nbsp; Here is an example cookie from my owncomputer, the filename of which is "anyuser@fedex[1].txt":<blockquote>FedEx_accrue<br>12000206511118www4744177<br>fedex.com/<br>0<br>2758148096<br>31550824<br>1850881248<br>29380962<br>*</blockquote>&nbsp;&nbsp;&nbsp;&nbsp; The above contents are meaningless to me, although I canrecognize the server domain "fedex.com."&nbsp; Presumably the codes are used by FedEx topersonalize their web pages when I view them, or could be used to keep track of goods orservices I requested.&nbsp; But in order to protect the privacy of web surfers, there ought to beboth notice that this information is collected, and some way to insure that the informationis accurate, if this information is in any way identifiable with the surfer.<p>&nbsp;&nbsp;&nbsp;&nbsp; It should be noted that some cookies will use potentiallyidentifying user names in the filename.&nbsp; For example, many cookies on my computer havefilenames like "[email protected]."&nbsp; The cookie used my Windows logon name, which

62

57is "mike," as my userid.&nbsp; Because many computer networks require thatusers log onwith some name, this method of naming cookie files presents a minor privacy threat.&nbsp;Many web servers will maintain databases of users and their browsing habits, and these useridsare sometimes based on the user's actual name ("mmonaco" for example).&nbsp; Any suchcookies certainly seem to constitute a personally-identifying record, even if the identification iswould require a bit of sleuth work to connect it to the actual user.<p><a NAME="COOKIEtypes"><a>&nbsp;&nbsp;&nbsp;&nbsp; There are two kindsof cookies: session and persistent.&nbsp; A session cookie is deleted by the browser as soon asthe cookie sending server is exited.&nbsp; A persistent cookie will remain on the hard drive for aspecified period of time.&nbsp; The only difference between session and persistent cookies isthat persistent cookies, when set by the server, have an additional variable in the commandwhich sends the cookie: "expires=date." Session cookies are somewhat less threatening toprivacy than persistent cookies because they are deleted after every session, thus limiting theamount of information a particular web site collects about the user. However, because manyservers will keep their own databases of user information, there is still a need to disclosethe use session cookies to users in order to protect their privacy.<p>&nbsp;&nbsp;&nbsp;&nbsp; Most commercial web sites and many non-commercialweb sites use cookies.&nbsp; This is because there are many legitimate uses for cookies.&nbsp;Cookies which track the browsing habits of users provide information useful for improving anddesigning web sites.&nbsp; Cookies can also add several features to web sites, such as customformatting of web sites (some users may request specific colors, fonts, or font sizes for easierreading), alerts about new material on the site (a persistent cookie would record the last visit of auser and allow the server to provide a list on material since that last visit), and "shoppingbaskets" to keep a record of items requested, online forms completed, and the like.&nbsp;Disabling cookies (an option provided by browsers which use them) can therefore create a lossof functionality, and some web sites would be unusable without cookies.<p>&nbsp;&nbsp;&nbsp;&nbsp; Cookies present several privacy issues to users of onlineresources.&nbsp; At the most basic level, cookies may be considered a privacy threat becausethey can operate as "spies,"&nbsp; in the sense that the senders of cookies may not revealthemselves while at the same time collecting information about the user.&nbsp; An informalstudy by Karen Coyle of cookies collected on her hard drive revealed that about one third of thecookies were untraceable, owing to the fact that the web addresses in the cookies could not bereached. The cookie senders thus remain anonymous, which in itself raises questions about theintentions of the cookie senders.<p>&nbsp;&nbsp;&nbsp;&nbsp; It has been noted that cookies, by themselves, do not actuallyidentify the user who receives them.&nbsp; Cookies simply collect clickstream data, indicatingwhat a user views, how long he or she is connected to the sites, and which advertisements weredisplayed by the site.&nbsp; By itself, this data does constitute useful information for the website designer and marketer.&nbsp; The real privacy threat emerges when cookie technology iscombined with another technology: online forms.&nbsp; Users may be asked for identifyingpersonal information including addresses, names, phone numbers, and the like when they registerto use various web sites, services, or files.&nbsp; If this information should be matchedwith clickstream data collected from cookies, the user has suddenly revealed much more than theinformation voluntarily released in the form.&nbsp; A profile of the users' interests can bedetermined by studying the clickstream data from cookies which reveal where, when, and forhow long the user has surfed web sites.&nbsp; The appeal of such information for marketers and

63

58advertisers is obvious.&nbsp; But the users' privacy has been compromised if the informationcollected by cookies is collected covertly, without disclosure.<p>&nbsp;&nbsp;&nbsp;&nbsp; It is believed that most cookies can be accessed only by thesite which created them.&nbsp; However, a bug in Microsoft's Internet Explorer was discoveredin May of 2000, called the "Open Cookie Jar."&nbsp; This bug allowed any server to read anycookie, provided that the name of the site which created the cookie was known. Microsoft has,since then, corrected the problem, and even offers cookie management features in the newestversion of Internet Explorer.&nbsp; Even so, this episode calls attention to the potential dangerthat cookies be intercepted or viewed illicitly.&nbsp; A similar bug was found in one version ofNetscape Navigator.&nbsp; Bugs such as these clearly violate the principle of security, as theyallow unauthorized disclosure and use of the information in the cookie.<p>&nbsp;&nbsp;&nbsp;&nbsp; It is possible for the server which sends cookies to specify thatcookies will be sent only over secure communication channels; the set-cookie http responseheader would need to include the command "secure."&nbsp; Presently, only HTTPS servers(http servers on SSL) are considered "secure" by the Netscape browser.<p>&nbsp;&nbsp;&nbsp;&nbsp; One further privacy threat posed by cookies lies in the fact thatsome banner advertisers send cookies as well.&nbsp; Because the server providing banner adssets the cookie rather than the server providing the actual page visited, these banner adcompanies are able to track a user's browsing across many different sites and servers.&nbsp;The purpose of these cookies is to aid in targeting specific ads at users.&nbsp; However, becausethese companies store information about the recipients of the banner ads and their browsinghabits, the user's privacy is seriously threatened, especially if this information is combined withforms which ask for personal information.&nbsp; It is one thing if Doubleclick.com tags mycomputer with a cookie that records my browsing habits as "[email protected]"and quite another if they should be able to connect my userid with my name and address becauseI filled in a form to register to use the online New York Times site.<p><a NAME="COOKIESuse"></a>&nbsp;&nbsp;&nbsp;&nbsp; Libraries should considercookies carefully.&nbsp; Computers provided for patron use will accrue a large collection ofcookies.&nbsp; The risk to patron privacy lies in the danger that when a patron fills in an onlineform, their personal information may be erroneously linked to the browsing habits of otherusers.&nbsp; But personally identifiable information must be accurate, according to the principleof integrity discussed above.&nbsp; On the other hand, patrons may be accurately profiled andtheir privacy compromised if they are unaware that the library's computers accept and usecookies.&nbsp; There is also the issue of library web sites using cookies.&nbsp; Better accessmay be provided to users by allowing them to specify larger fonts or other formattingissues.&nbsp; And librarians would be able to improve their web sites by reviewingusage.&nbsp; But these benefits must be balanced against the danger that cookies from libraryweb sites could be intercepted or accessed illicitly.&nbsp; The danger of interception may bereduced by always specifying that cookies be sent only over secure communication lines.&nbsp;The danger that others may view cookies, for example by exploiting the Open Cookie Jar bug, isprobably best met by using only session cookies.<br><br><br><center><p><b>Clickstream and Log Files</b></center>

6 4

59

<p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Apart from cookies, there are other traces of internet userecorded by web servers and private firms.&nbsp; These other records are loosely grouped underthe terms "clickstream," "mouse droppings," and "data trail."&nbsp; This discussion will use theterm "clickstream" as it is the most widespread term.<p><a NAME="HEADERS"></a>One source of clickstream data is found in the headers sentby web browsers to servers when a user accesses a web page.&nbsp; These headers reveal theinternet protocol address ("IP address") of the user, the time of day when the page is accessed,the pages and images downloaded, the page from which the user is accessing the new page("Referrer"), and data entered by the user into forms.&nbsp; Cookies are sometimes consideredto be part of this clickstream data as well, but cookies will not be explored further here.<p><a NAME="LOGFILES"></a>In order to give a picture of what one might look like, asample log file from Karen Coyle's web pages is reproduced here:<blockquote>ppp156210.asahi-net.or.jp [29/Mar/1998:05:45:00 -0800] "GET/-kec/best.html HTTP/1.0" 200<br>DIAL8-ASYNC38.DIAL.NET.NYU.EDU [29/Mar/1998:12 : 23 :11 -0800] "GET /-kecHTTP/1.0" 302<br>gwc-mel.afwgc.af.mil [29/Mar/1998:14:24:09 -0800] "GET /---kec/ HTTP/1.0"304</blockquote>As can be seen, an IP address is recorded, and then the date and time that pages are accessed, andfinally the path of the page accessed.&nbsp; Each of three entries follows the format "IP address-- date/time -- command/request."<p>&nbsp;&nbsp;&nbsp;&nbsp; All of this data is provided by the web browser used to accessthe pages.&nbsp; But the individual using the browser is likely to be unaware that thisinformation was provided to the server visited.&nbsp; The consumer advocacy web site"Junkbusters.com" has a page which allows users to see for themselves what their browser tellsevery server they visit.&nbsp; When visiting the Junkbusters page with a computer in a KSUphilosophy department, the following output is produced:<blockquote>The "HTTP Referrer" tells them what led you to the request. In this case it was<b>http://www.junkbusters.com/junkdata.html</b>.<br>Some advertisers choose which ad to show you based on two variables that tell them whichcomputers you are coming through: the "Remote Address" (in your case<b>131.123.68.123)</b> and the "Remote host:" (in your case <b>131.123.68.123</b>).These variables may give indications of where you live or work.<br>The "User Agent" variable, in your case <b>Mozilla/4.73 [en] (Win95; U)</b>, indicateswhat software and hardware you are using. This interests companies that sell these goods.(Mozilla is Netscape's name for its browser.)<br>Some browsers actually hand over your email address or other indications of your identity.In your case it appears the "HTTP From" variable was <b>not provided<b>, and the"REMOTE USER" variable was <b>not provided<b>.</blockquote>

This URL basically displays the headers sent by the browser when a user visits the address --they are displayed above in bold face.&nbsp; The text on the page also explains the specific

65

60variables used by http to record this information.&nbsp; Junkbusters encourages peopleinterested in privacy to link to this page in order to promote privacy literacy (and to promotetheir privacy software).&nbsp; Libraries would do well to make this page available to theirusers.&nbsp; But perhaps the most interesting thing to notice here is that there are headervariables not recorded in Karen Coyle's sample log entries but which other servers might chooseto log.<p>&nbsp;&nbsp;&nbsp;&nbsp; Another source of clickstream data is in the browser "add-ons"known as Java, Java Script, and VB Script.&nbsp; These are all technologies which enhance theweb pages with graphics, animation, and the like.&nbsp; These will generally provideinformation about the browser being used, screen resolution, and other data of concern mainlyfor formatting purposes.<p>&nbsp;&nbsp;&nbsp;&nbsp; The information sent back and forth in headers is of littleconcern on its own, but a threat to privacy emerges when this information is stored for later useand analysis in transaction log files.<p><a NAME="IPADDRESS"><a>One thing to notice is that the clickstream data stored in logfiles would identify computers but not individuals.&nbsp; However, an IP address can reveal acertain amount of information about an individual.&nbsp; IP addresses are assigned by theinternet service provider (ISP), and often disclose the region of the country or even thecity the computer is in. A quick review of the IP addresses in Karen Coyle's log file suggests thatthe three transactions logged were requested by users in Japan,&nbsp; New York University, anda military base. IP addresses that consist entirely of numbers are in principle traceable as well.The IPs also reveal the identity of the ISP, which in itself reveals little about theindividual.&nbsp; The real danger emerges when clickstream data is merged with personallyidentifying information.&nbsp; If your identity can be connected with your clickstream, otherscan know what web sites you visit, which links you follow, what files you download or view,and so on.<p>&nbsp;&nbsp;&nbsp;&nbsp; Perhaps the most egregious and high profile case ofcompromising privacy in this manner is the recent controversy surroundingDoubleClick.com.&nbsp; DoubleClick.com acquired Abacus Direct, a company which maintainsdatabases of consumer information compiled by direct marketers.&nbsp; The kind ofinformation Abacus Direct maintains involves consumer habits and demographics.&nbsp;DoubleClick.com provides banner ads to thousands of web sites, and as described above, thesebanner ads send cookies to web surfers who see their ads.&nbsp; These cookies identify the userto DoubleClick.com, and the browser headers transmitted when surfers click on the banners arecompiled in DoubleClick's log files.&nbsp; When the Abacus Direct databases are combinedwith DoubleClick.com's log files, the resulting database identifies individuals with demographicinformation, names and addresses, web surfing habits, and consumer information.&nbsp;All of this information has obvious use for advertisers who want to target ads effectively.&nbsp;But this information also constitutes a severe compromise of the surfer's privacy, not leastbecause the individual is unlikely to be aware of the clickstream information collected.<p>&nbsp;&nbsp;&nbsp;&nbsp; A persistent problem with online privacy is the fact that somany users are unaware of the information they are providing to web sites and servers.&nbsp;Online forms represent the only conscious, voluntary release of information for most webusers.&nbsp; The average web user simply can't know what cookies to accept or reject, andalmost certainly does not realize a trail is created whenever he or she clicks on a link.&nbsp;

66

61

Again, the principle of notice requires that the surfer be notified that header information islogged.<p>&nbsp;&nbsp;&nbsp;&nbsp; DoubleClick.com, in the face of criticism from consumeradvocates and privacy advocates, has promised to await the development of internet privacyrules before merging the log files and databases.&nbsp; But it is evidently just a matter of timebefore they or other companies will begin to create detailed profiles of web users.<br><br><br><center><p><b>Email</b></center><p><br><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Because some library patrons use email to ask referencequestions, and because some libraries offer internet access which is used by patrons to accessemail accounts, email policies are often adopted by libraries or their parent institutions.&nbsp;These policies should include a privacy element for several reasons.<p>&nbsp;&nbsp;&nbsp;&nbsp; First, the Electronic Communications Privacy Act, passed byCongress in 1986, guarantees certain protections from the interception and disclosure of emailmessages.&nbsp; Just as the confidentiality polices of the ALA call on libraries to protect patronrecords and disclose them to law enforcement or other government agencies only in cases weregood reason and proper legal documentation are provided, the email messages of library patronsmust be protected.<p>&nbsp;&nbsp;&nbsp;&nbsp; But many institutions place limits on the appropriate use ofemail accounts, and libraries may do the same.&nbsp; The crucial point is that any policies mustbe disclosed to users.&nbsp; So if the library monitors email messages created on librarycomputers or sent to reference personnel, these practices must be disclosed in the privacy policystatement.<p>&nbsp;&nbsp;&nbsp;&nbsp; Lastly, because emailed reference questions are created bypatrons in the information seeking process, they constitute records that ALA policies requirelibraries to protect as confidential.<p>&nbsp;&nbsp;&nbsp;&nbsp; In order to adequately protect user confidentiality, then, theonline privacy polices of libraries must disclose any monitoring of email.&nbsp; Presumably,any such monitoring would be undertaken only in order to assure that library resources are notabused or as part of quality assurance in the case of reference questions.&nbsp; The libraryshould not keep unnecessary records of messages sent and received, and protect those it recordsas confidential.<br><br><br><center><p><b>Interlibrary Loans</b></center><p><br><br>

67

62<p>&nbsp;&nbsp;&nbsp;&nbsp; Requesting and providing materials for interlibrary loans(ILL) is another library activity which generates records.&nbsp; These records are likely toidentify the patron requesting materials.&nbsp; Christopher Nolan, writing in the Journal ofAcademic Librarianship, notes that the paper ALA-sanctioned ILL request form and the onlinework forms used by OCLC, RLN, and WLN all use information about the requesting patron,and supply this information to the institution making the loan.<sup> </sup>This creates aprivacy issue for patrons because both the institution making the request on their behalf, and thelending institution, have records of the patron's information seeking.<p>&nbsp;&nbsp;&nbsp;&nbsp; There is obviously good reason to keep track of circulation,but Nolan points out that several things may happen to the ILL request.&nbsp; Because thepatron is identified in ILL requests, traces of the loan will remain even if the libraryconscientiously destroys old circulation records.&nbsp; First, the CONTU guidelines attached tocopyright laws require that records of all photocopies of materials obtained through ILL bemaintained for three years.&nbsp; Commonly, these records are maintained by keeping a copy ofthe ILL form which generated the photocopy. Because the patron is identified on this form, thereis now a record of materials borrowed which is identifiable with the patron.<p>&nbsp;&nbsp;&nbsp;&nbsp; Second, the ILL request forms are supplied to the lendinginstitution.&nbsp; Again because the forms contain the patron's name and possibly otherinformation, the lending institution now has a record of the patron's information seeking.<p>&nbsp;&nbsp;&nbsp;&nbsp; Privacy policies must address these records.&nbsp; An idealpolicy would require that CONTU guidelines be met by keeping a non-identifying record ofphotocopies made and would require that patron information not be sent to the lendinginstitution.&nbsp; Because some ILL forms are online, it would be a good idea to disclose thelibrary's policies about ILL requests in the online privacy policy.<br><br><br><center><p><b>Searches</b></center><p><br><br><p>&nbsp;&nbsp;&nbsp;&nbsp; Another privacy issue of the online environment is internetsearching.&nbsp; There are two ways that searching the interne can threaten a library patron'sprivacy.&nbsp; First, many search engines and directory sites will record the actual search termsentered by the user in the URL of search results.&nbsp; For example, doing a simple searchof the term "clickstream" at Yahoo and Excite lead my browser to the following addresses:<blockquote>http://search.yahoo.com/bin/search?p=clickstream<br>http://search.excite.com/search.gw?search=clickstream<Iblockquote>If I were to follow the links provided on this page, my browser's header would disclose this URLas the "HTTP Referrer" variable.&nbsp; Thus, my search strategy is potentially recorded in a logfile, and it is connected with my IP address.&nbsp; If a library web site provides links to searchengines which encode search terms in the results URL, this should be mentioned in the privacypolicy.<p>&nbsp;&nbsp;&nbsp;&nbsp; Second, many search engines use cookies to keep track ofusers and their queries.&nbsp; This is not a privacy problem when the search engine keeps only

6 3

63"aggregate" information -- that is, statistics about user trends and surfing habits.&nbsp; Butpersistent cookies used by search engines to track a particular user's queries and searches dothreaten privacy.&nbsp; As discussed above under the topic of cookies, there is always a riskthat cookie information will be linked with the subject's identity when the subject completes aform or otherwise releases information online.&nbsp; And as in most online privacy issues, usersmay be unaware that information is being disclosed.<p>&nbsp;&nbsp;&nbsp;&nbsp; Apart from internet searches, libraries need to consider thepossibility that OPACs can retain digital traces of the searches conducted by users.&nbsp; Usersoccasionally leave a terminal with their search results and strategy visible on the monitor.&nbsp;In so far as the patron has chosen to leave the terminal without returning to the menu screen orotherwise concealing his or her search, there is little the library can do to protect theconfidentiality of searches from this kind of disclosure.&nbsp; But libraries will also have toconsider the possibility that the OPAC retains records of previous searches in its memory, diskcache, or log files.&nbsp; Whenever this is the case, the policy of the library must be to ensurethat these records are secure from unauthorized access and destroyed as soon as they serve norole in the library's functioning.&nbsp; At the very least, records of searches maintained forstatistical analysis should have no personally identifying information.<p>&nbsp;&nbsp;&nbsp;&nbsp; In most cases, OPACs do not require logging in or identifyingthe user.&nbsp; But there are exceptions, most notably in systems which allow users to viewtheir own circulation records.&nbsp; Because this confidential information is accessible, it is thelibrary's responsibility and duty to take adequate measures for protecting the information.&nbsp;Circulation records should be protected by passwords.&nbsp; They should also be transmitted toauthorized accessers in an encrypted format to protect against interception.<br><br><br><br><br><br><br><br><center><p><b>IV. CONCLUSIONS</b></center>

<p>&nbsp;&nbsp;&nbsp;&nbsp; The protection of privacy can be assured by meeting the fivemain principles outline by the FTC: notice/awareness, choice/consent, access/participation,integrity/security, and redress/enforcement.&nbsp; Librarians must strive to uphold each of theseprinciples in their handling of confidential information.<p>&nbsp;&nbsp;&nbsp;&nbsp; The information generated by online library use includescookies, clickstream data (including the header data created by browsers and log files maintainedby servers), ILL request forms, and email reference questions.&nbsp; All of this information ispotentially personally identifiable and thus should be protected by strict standards of privacy asoutlined in the five principles.&nbsp; When data is abstracted from log files into statistical dataor otherwise severed from personally identifying marks, the data can be considered outside theumbrella of privacy protection.

6f3

64<p>&nbsp;&nbsp;&nbsp;&nbsp; Insofar as library web sites and online systems collectpersonally identifying information or provide it to outside agencies such as online search enginesor databases, there must be a clear disclosure of this practice and adequate measures taken toprotect patron confidentiality.<p>&nbsp;&nbsp;&nbsp; Because libraries also provide access to databases, search engines, andweb pages which belong to other agencies, it is also important that libraries give notice to thepatron that the privacy policies of the library are not shared by these outside agencies. Thepatrons should be reminded that they cannot assume resources accessed through the libraryare covered by the same guarantees of privacy that library makes about use of resourcesbelonging to it.<p>&nbsp;&nbsp;&nbsp; All disclosures of policies should be made in a privacy policystatement that can be accessed easily by online patrons, and an ideal policy will consider all ofthe issues outlined in this paper.<br><br><br></body></html>

70

t.

U.S. Department of EducationOffice of Educatonal Research and Improvement (OERI)

National Library of Education (NLE)Educational Resources Information Center (ERIC)

REPRODUCTION RELEASE(Specific Document)

NOTICE

REPRODUCTION BASIS

EX

ilIuirn Intornoba cnT

This document is. covered by a signed "Reproduction Release(Blanket) form (on file within the ERIC system), encompassing allor classes of documents from its source organization and, therefore,does not require a "Specific Document" Release form.

This document is Federally-funded, or carries its own permission toreproduce, or is otherwise in the public domain and, therefore, maybe reproduced by ERIC without a signed Reproduction Release form(either "Specific Document" or. "Blanket").

EFF-089 (9/97)