Download - NYLA 2014 - Patron Privacy Presentation 20141106

Transcript

 Patron Privacy in a Library 2.0 World: Investigating Our Options

Stephanie HessBinghamton University

NYLA 2014 Annual Conference

Where you at?

“Occasionally, usually related to Web”

Library 2.0

Current Awareness

Events: Data Privacy Day

Events: Choose Privacy Week

Means of Protecting Patron Privacy

Adequacy & Compliance Audits

Creating a Privacy Policy

Policy Benchmarks

Boston Public Library• www.bpl.prg/general/policies/privacy.htm

San Francisco Public Library• http://sfpl.org/index.php?pg=2000001301 

Cornell University Library• www.library.cornell.edu/privacy 

University of Wisconsin• www.uwm.edu/libraries/about/privacy.cfm  

Library of Congress• www.loc.gov/homepage/legal.html 

Negotiating with 3rd Parties

ALA’s Office for Information Technology Policy– Ebook Business Models Scorecard for Public Libraries

• www.districtdispatch.org/wp-content/uploads/2013/01/Ebook_Scorecard.pdf

ALA’s Intellectual Freedom Office• www.ala.org/offices/oif/ifissues/issuesrelatedlinks/privacyresources • www.ala.org/offices/oif/iftoolkitsprivacy/libraryprivacy 

NYLA Intellectual Freedom Manual– http://www.nyla.org/images/nyla/IF-Manual/2013-09-IF-Manual.pdf 

** Always be sure to check your state’s laws! **

New Jersey StatutesSection 18A:73-43.1. "Library," library record" defined.

For the purposes of this act:

a. "Library" means a library maintained by any State or local governmental agency, school, college, or industrial, commercial or other special group, association or agency, whether public or private.b. "Library record" means any document or record, however maintained, the primary purpose of which is to provide for control of the circulation or other public use of library materials.

Section 18A:73-43.2. Confidentiality; exceptions.

Library records which contain the names or other personally identifying details regarding the users of libraries are confidential and shall not be disclosed except in the following circumstances:

a. The records are necessary for the proper operation of the library;b. Disclosure is requested by the user; orc. Disclosure is required pursuant to a subpena issued by a court or court order.

L. 1985, c. 172, s. 1-2, eff. May 31, 1985.

Advocacy Resources: Federal

Advocacy Resources: State

Disrupting Data Flow & Forensic Analysis

Defensive Technologies

• Anonymous Search Engines and E-mail providers– ixQuick HushMail

• Encryption software– AppRiver, Eraser, TrueCrypt, etc. 

• Metadata removal tools and scrubbers– ExifTool, iScrub, etc.

• Platform for Privacy Peferences (P3P)– Protocol enables websites to express their privacy practices in a 

standard format that is computer readable; policies automatically retrieved and ranked then posted on websites as privacy meters

– http://www.w3.org/P3P/

Act locally…

Think nationally…

Think globally…

Completing the Privacy Puzzle

Questions? Comments?

Stephanie HessElectronic Resources [email protected]