SlideShare una empresa de Scribd logo
1 de 20
LIBRARIES
and
privacy
IN THE DIGITAL AGE
Photo Copyright © 2015 Pulp and Pixels
Why do libraries
so much about
“Choice requires both a
varied selection and the
assurance that one's
choice is not monitored.”
H A V E L A W S P R O T E C T I N G T H E
CONFIDENTIALITYOFLIBRARYRECORDS48 STATES Kentucky & Hawaii have attorney general's opinionsPlus the district of Columbia
Any library record, the primary
purpose of which is to maintain
control of library materials, or to gain
access to information, that discloses or
could be used to disclose the identity
of a library user is exempt from
disclosure under this chapter.
RCW 42.56.310
The Librarywillkeeppatron records confidentialand will
not disclosethis information except asnecessaryforthe
properoperationof theLibrary,upon consent of theuser,
pursuant to subpoena or court order, or as otherwise
required by law.
The Library retains the minimum
number of records necessary for
maintaining operations.
Public computer information is
automatically deleted at the end of
a session.
Information about check-outs and
returns is automatically deleted at
day-end (unless the patron has fines
or has been referred to a materials
recovery agency).
Mandatory library staff training in
library policy and intellectual
freedom principles
PROCEDURES
DISRUPTIONS
Third-party Digital Content and Services
D I G I T A L R I G H T S M A N A G E M E N T
T E N S I O N S B E T W E E N S E C U r i t y
a n d c i v i l l i b e r t i e s
Photo Copyright © 2015 The Weather Channel, LLC
USA PATRIOT Act
Section215 permits gov’tto secretly
request and obtain library records
forlarge numbers of individuals
without any reason to believe they
are involvedin illegal activity
Section505permits the FBI to obtain
electronic records fromlibraries with
a National Security Letter without
priorjudicial oversight
Photo by Jessamyn West / CC BY 2.0
LIBRARY• Controlled data
• Governed by local policy
CONTENT PROVIDERS• Shared data
• Governed by contract
DRM SERVICES• Shared data
• Governed by Terms of Use
CONTENT OWNERS• Shared data
• Governed by Terms of Use
Photo © Disabled Sports USA
patrons• Personal data
• Governed by self-interest, rights
Basic CONTRACTS
• Online catalog
• Databases
• Journals
• Periodicals
Photo Copyright ©2015 Designtechnica Corporation.
Seattle Public Library
expresses ‘concern and
alarm’ over Adobe’s
data tracking policies
Taylor Soper on GeekWire.com, October 8, 2014
1. Clarify what data is
being collected,
especially if that data
contains PII
2. Explain how long the
data is bring retained
3. Stop transmitting data
in plain text
Photo. Evil Mad Scientist
Labs. © 2009
“The Library has teamed up
with reputable third party
partners in order to provide
certain services to its users.
Information a patron submits
to the Library may be
provided to those third
parties so they can assist the
Library in providing certain
services. Users are
encouraged to read and
become familiar with the
privacy policies of these
third party partners.”
“Solving social
problems by restricting
technology and
preventing you from
access to those
restrictions reduces
privacy and security.”
Photo CCA3 Jonathan Worth, JonathanWorth.com
Cory Doctorow

Más contenido relacionado

Destacado

#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating OpportunitiesHaiku Deck
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our pathsCatherine Cronin
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumMr Cornish
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014Victor Imobsync
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Upside Learning Solutions
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerUpside Learning Solutions
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School LeadershipJudy O'Connell
 
Cybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationCybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationLinkedIn Learning Solutions
 
Colleges that get you the BEST internships!
Colleges that get you the BEST internships!Colleges that get you the BEST internships!
Colleges that get you the BEST internships!The Princeton Review
 
Ruang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranRuang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranUwes Chaeruman
 
What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?Vizwik
 
Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Martin Hamilton
 
3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearningUpside Learning Solutions
 
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionThe CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionSarah Maxell Crosby
 
Create a productive workplace
Create a productive workplaceCreate a productive workplace
Create a productive workplaceDaniel Goleman
 

Destacado (20)

Dynamics Of Gdp
Dynamics  Of GdpDynamics  Of Gdp
Dynamics Of Gdp
 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our paths
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National Curriculum
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional Designer
 
Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Venezuela Technology Integration 2015
Venezuela Technology Integration 2015
 
MOOCs: still a viable business model?
MOOCs: still a viable business model?MOOCs: still a viable business model?
MOOCs: still a viable business model?
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School Leadership
 
Cybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your OrganisationCybersecurity Health Checks: Safeguarding Your Organisation
Cybersecurity Health Checks: Safeguarding Your Organisation
 
Colleges that get you the BEST internships!
Colleges that get you the BEST internships!Colleges that get you the BEST internships!
Colleges that get you the BEST internships!
 
Ruang lingkup desain pembelajaran
Ruang lingkup desain pembelajaranRuang lingkup desain pembelajaran
Ruang lingkup desain pembelajaran
 
What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?What Happens When Kids Learn To Code?
What Happens When Kids Learn To Code?
 
The Design Of Interaction For eLearning
The Design Of Interaction For eLearningThe Design Of Interaction For eLearning
The Design Of Interaction For eLearning
 
Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015Here Comes The iPad Generation - Future of Higher Education 2015
Here Comes The iPad Generation - Future of Higher Education 2015
 
3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning3 Things to Focus on for Creating Engaging Multi-device eLearning
3 Things to Focus on for Creating Engaging Multi-device eLearning
 
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the InstitutionThe CRUX of the Matter: Amplifying Authentic Voices Across the Institution
The CRUX of the Matter: Amplifying Authentic Voices Across the Institution
 
Converting eLearning to mLearning
Converting eLearning to mLearning Converting eLearning to mLearning
Converting eLearning to mLearning
 
Create a productive workplace
Create a productive workplaceCreate a productive workplace
Create a productive workplace
 

Similar a LIBRARIES AND PRIVACY IN THE DIGITAL AGE

Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...gallowayandcollens
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assetsgallowayandcollens
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessHostingCon
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
 
De-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceDe-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceBecky Yoose
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSAnnelore van der Lint
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeDuane Blackburn
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eedGideon Ale
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal InvestigationsIan Tausig
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf Mark Scrimshire
 
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored
 
Uniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateUniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateMary Jenkins
 

Similar a LIBRARIES AND PRIVACY IN THE DIGITAL AGE (20)

Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
 
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
How to Make Sure the Kids Will Still Be Listening to The Beatles on Google Pl...
 
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital AssetsCloser All The Time: Moving Toward Fiduciary Access to Digital Assets
Closer All The Time: Moving Toward Fiduciary Access to Digital Assets
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
 
De-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and IntelligenceDe-identifying Patron Data for Analytics and Intelligence
De-identifying Patron Data for Analytics and Intelligence
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics Cooperative
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
Naela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eedNaela webinar 2015   digital asset powerpoint  hhc 11.4.2015 5-eed
Naela webinar 2015 digital asset powerpoint hhc 11.4.2015 5-eed
 
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...
 
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...
 
Social Media in Legal Investigations
Social Media in Legal InvestigationsSocial Media in Legal Investigations
Social Media in Legal Investigations
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
After 9 11
After 9 11After 9 11
After 9 11
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
HxRefactored 2015: Mark Scrimshire "BlueButton on FHIR
"
 
Uniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act UpdateUniform Electronic Legal Material Act Update
Uniform Electronic Legal Material Act Update
 

Más de Jim Loter

SPL Technology and Access Service Priority
SPL Technology and Access Service PrioritySPL Technology and Access Service Priority
SPL Technology and Access Service PriorityJim Loter
 
Seattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitSeattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitJim Loter
 
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...Jim Loter
 
SPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportSPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportJim Loter
 
SPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationSPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationJim Loter
 
Mobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryMobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryJim Loter
 
Connecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryConnecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryJim Loter
 

Más de Jim Loter (7)

SPL Technology and Access Service Priority
SPL Technology and Access Service PrioritySPL Technology and Access Service Priority
SPL Technology and Access Service Priority
 
Seattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend SummitSeattle Public Library Foundation Trend Summit
Seattle Public Library Foundation Trend Summit
 
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
ReadersFirst - A Movement to Improve E-book Access and Services for Public Li...
 
SPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final ReportSPL Strategic Plan Preparing Team Final Report
SPL Strategic Plan Preparing Team Final Report
 
SPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - PresentationSPL Strategic Plan Preparing Team Report - Presentation
SPL Strategic Plan Preparing Team Report - Presentation
 
Mobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public LibraryMobilizing for Mobile: The Seattle Public Library
Mobilizing for Mobile: The Seattle Public Library
 
Connecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public LibraryConnecting with Your Community via Social Media: The Seattle Public Library
Connecting with Your Community via Social Media: The Seattle Public Library
 

Último

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Último (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

LIBRARIES AND PRIVACY IN THE DIGITAL AGE

  • 1. LIBRARIES and privacy IN THE DIGITAL AGE Photo Copyright © 2015 Pulp and Pixels
  • 2. Why do libraries so much about “Choice requires both a varied selection and the assurance that one's choice is not monitored.”
  • 3. H A V E L A W S P R O T E C T I N G T H E CONFIDENTIALITYOFLIBRARYRECORDS48 STATES Kentucky & Hawaii have attorney general's opinionsPlus the district of Columbia
  • 4. Any library record, the primary purpose of which is to maintain control of library materials, or to gain access to information, that discloses or could be used to disclose the identity of a library user is exempt from disclosure under this chapter. RCW 42.56.310
  • 5. The Librarywillkeeppatron records confidentialand will not disclosethis information except asnecessaryforthe properoperationof theLibrary,upon consent of theuser, pursuant to subpoena or court order, or as otherwise required by law.
  • 6. The Library retains the minimum number of records necessary for maintaining operations. Public computer information is automatically deleted at the end of a session. Information about check-outs and returns is automatically deleted at day-end (unless the patron has fines or has been referred to a materials recovery agency). Mandatory library staff training in library policy and intellectual freedom principles PROCEDURES
  • 7. DISRUPTIONS Third-party Digital Content and Services D I G I T A L R I G H T S M A N A G E M E N T T E N S I O N S B E T W E E N S E C U r i t y a n d c i v i l l i b e r t i e s Photo Copyright © 2015 The Weather Channel, LLC
  • 8. USA PATRIOT Act Section215 permits gov’tto secretly request and obtain library records forlarge numbers of individuals without any reason to believe they are involvedin illegal activity Section505permits the FBI to obtain electronic records fromlibraries with a National Security Letter without priorjudicial oversight Photo by Jessamyn West / CC BY 2.0
  • 9.
  • 10. LIBRARY• Controlled data • Governed by local policy CONTENT PROVIDERS• Shared data • Governed by contract DRM SERVICES• Shared data • Governed by Terms of Use CONTENT OWNERS• Shared data • Governed by Terms of Use Photo © Disabled Sports USA patrons• Personal data • Governed by self-interest, rights
  • 11. Basic CONTRACTS • Online catalog • Databases • Journals • Periodicals
  • 12.
  • 13.
  • 14. Photo Copyright ©2015 Designtechnica Corporation.
  • 15.
  • 16.
  • 17. Seattle Public Library expresses ‘concern and alarm’ over Adobe’s data tracking policies Taylor Soper on GeekWire.com, October 8, 2014 1. Clarify what data is being collected, especially if that data contains PII 2. Explain how long the data is bring retained 3. Stop transmitting data in plain text
  • 18. Photo. Evil Mad Scientist Labs. © 2009
  • 19. “The Library has teamed up with reputable third party partners in order to provide certain services to its users. Information a patron submits to the Library may be provided to those third parties so they can assist the Library in providing certain services. Users are encouraged to read and become familiar with the privacy policies of these third party partners.”
  • 20. “Solving social problems by restricting technology and preventing you from access to those restrictions reduces privacy and security.” Photo CCA3 Jonathan Worth, JonathanWorth.com Cory Doctorow

Notas del editor

  1. My name is Jim Loter, I’m the Director of IT for The Seattle Public Library and one of my primary responsibilities is to manage data collected by the library related to circulation of library materials and use of library technology. It’s a responsibility that we take very seriously and operate under principles that strive to protect the intellectual freedom and freedom of inquiry of our patrons.
  2. 2
  3. As you may know the individual right to privacy is not explicitly addressed in the US Constitution but it has been recognized in many court cases. The state laws related to library privacy vary widely in their approach and details. Some are independent statutes that expressly address library records; others are integrated statutes that address library records in open records laws.
  4. In our state, the Revised Code of Washington addresses library records in the context of open records laws – specifically, it exempts library records from public disclosure. The law does not say anything about privacy but it does direct how records retention schedules are developed. This exemption has allowed us to manage patrons’ records in a way that helps us protect patron privacy.
  5. The Seattle Public Library’s policies are consistent with the library bill of rights, the ALA’s professional guidelines, and applicable state laws. Note, however, that our guarantees are not absolute. For example, we need to keep records to manage and enforce lending books. During the time that we have those records, there are situations, largely related to law enforcement, in which records may be subject to disclosure.
  6. In practice, we treat library data management as a special case of records management. Once you return a book, the data related to your possession of that item is deleted. Importantly all Library staff receive extensive training regarding what information they can disclose. So our practices are not just a function of IT systems but critically rely on effectively trained and committed staff as well.
  7. I’m going to talk about 3 factors that are disrupting the traditional approaches to patron privacy in libraries. I call these “disruptions” rather than challenges because, to me, a challenge implies an obstacle or roadblock that needs to be overcome before you can continue on your path. A disruption changes the very landscape under your feet.
  8. One of the biggest disruptions related to security and civil liberties is the PATRIOT Act. Two sections of the Act address overrides to library privacy protections and restrict libraries’ rights to notify patrons if information has been requested. The ALA urges librarians and advocates to educate the public on the impacts of PATRIOT Act. The Seattle Public Library has information on our web site about the Act.
  9. But Libraries have always been required to comply to subpoenas and search warrants. What has changed are the conditions under which warrants could be obtained by law enforcement and the fact that libraries are effectively under a gag-order if such warrants are served and fulfilled. But borrower records are still exempt from records retention laws and the library still discards those records as soon as we can.
  10. In many cases, libraries contract with third-parties who make digital content available to eligible users. This situation often involves a chain of parties and a process that takes control of patron data further away from patrons and libraries. Some content providers have complex arrangements with content owners that require that data be further shared for Digital Rights Management purposes.
  11. In simple cases, libraries have contracts directly with content providers who agree to manage patron data according to the library’s local policies and practices. These agreements are largely in place with providers of services such as online databases, journals, and periodicals.
  12. We also try to minimize the amount of data that is passed to third-parties. A middleware technology known as “EZProxy” is in widespread use throughout libraries and the content providers we routinely deal with. EZProxy can not only broker logins to digital services but it also proxies a patron’s traffic through the library’s network, thus providing an additional layer of privacy and anonymity.
  13. But the library community lacks a true federated identity and authentication service that can enable practices of secure identity assertion and verification rather than the direct submission of credentials. Current practice opens up a risk that third-parties may intentionally or unintentionally mis-manage data or create records that can be vulnerable to disclosure.
  14. For digital content such as eBooks, most content owners require the use of technology to restrict sharing and copying and to impose time limits on lending. The technology to manage so-called Digital Rights is beyond the scope of most libraries to implement and manage. Libraries generally rely on eContent providers such as OverDrive, to host content and manage the DRM required by publishers.
  15. Even OverDrive relies on yet other parties – such as Adobe – for the DRM technology they use. This practice has required library patrons to establish accounts with Adobe to complete the DRM process. The interplay between the library, OverDrive, and Adobe is not well understood by patrons, or, indeed, by a lot of libraries. The risks inherent in this situation were made manifest last year.
  16. In fall 2014, security researchers noted that the Adobe Digital Editions software transmitted detailed information about a reader’s eBook reading experience to Adobe. Adobe stated that this information is only used to enhance the reading experience but libraries are concerned about unintentional uses.
  17. The library urged Adobe to be more transparent with our patrons about the data it collects. Adobe has since encrypted the data it transmits but otherwise does not seem to altered its other practices. OverDrive, however, has taken steps to minimize Adobe’s access to individual patron data and no longer requires an Adobe ID.
  18. Another area of concern is OverDrive’s relationship with Amazon for fulfillment of eBooks in Amazon Kindle format. OverDrive cannot produce Kindle eBooks directly, so those requests are passed on to Amazon where patrons complete their borrowing transaction. What happens to data that is generated by that process and how long that data is retained is not disclosed, but a safe guess is “anything, and forever.”
  19. The Seattle Public Library acknowledges our relationships with third-parties in our policy and encourage patrons to make educated choices about the services they engage with online.
  20. DRM is the primary reason we need third-party services like OverDrive to exist, and why OverDrive needs to rely on Adobe and Amazon. Libraries have solved the problem of how to store, lend, and distribute millions of physical books; without DRM we can figure out how to do that for digital content and retain better control of your data. Until then, we will continue to protect the data we do have and to advocate for and educate you about how data may be used by others.