SlideShare une entreprise Scribd logo
1  sur  44
Privacy and Libraries  in the Digital Age Bradley Shipps IST 618 Survey of Telecommunications and Information Policy November 5, 2007
Privacy laws in the  United States A brief overview
Right to privacy ,[object Object],(Rubin, 2001 also Neuhaus, 2003) The United States Consititution (AP)
Source of right to privacy ,[object Object],[object Object],[object Object],(Image: http://www.schorsch.com/kbase/glossary/penumbra.html)
Supreme Court on privacy ,[object Object],[object Object],[object Object],The United States Supreme Court   (AP)
Privacy in libraries Why is privacy important in libraries?
ALA on Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],(AP)
Legal protection of privacy in libraries
State laws on privacy in libraries ,[object Object]
Types of state laws ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NY Statute, cont. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Librarians’ professional commitment to privacy
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of best practices ,[object Object],[object Object],[object Object],[object Object]
[object Object],Charleston County Public Library Staff Day (Image: mstephens7, http://flickr.com/photos/michaelsphotos/475515141/)
Legal challenges to privacy in libraries
[object Object],[object Object],(Image: sunside,  http://flickr.com/photos/10832246@N06/1433052868/)
Challenge: ,[object Object],[object Object],(AP)
Response: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenge: ,[object Object],[object Object],[object Object],[object Object]
Response: ,[object Object],[object Object],[object Object],(AP)
Response: ,[object Object],[object Object],[object Object],[object Object]
Best Practices: ,[object Object],[object Object],[object Object],[object Object]
[object Object],Four Connecticut librarians sought help from the ACLU after the FBI demanded patron records through a National Security Letter. (AP)
Technological Challenges to Privacy
March 21, 2006 - FBI agents followed terror suspect Syed Ahmed into the Chestatee Regional Library in Dawsonville, Georgia. After Ahmed left the library, the agents accessed the browser history of the computer.  The FBI agents did not have a search warrant.  Syed Ahmed (AP)
“ The actions of the government agent,  contrary to the policies and procedures of the library … violated the defendant’s reasonable expectations of privacy.”  - Jack Martin, attorney for Syed Ahmed (Terror suspect, 2007) Technology allowed federal agents to bypass library policy….
Digital library transactions involve outside parties, such as software developers, database vendors, or Internet service providers. Existing laws and policies may not protect privacy of digital transactions.  None of the existing state laws specifically discuss privacy of digital reference records.  (Neuhaus, 2003)
Technology challenge: ,[object Object],[object Object],(AP)
Privacy issue: ,[object Object],[object Object],[object Object]
Technology challenge: ,[object Object],[object Object],(AP)
Privacy issue: ,[object Object],[object Object],(AP)
Technology challenge: ,[object Object],[object Object],[object Object],[object Object]
Privacy issue: ,[object Object],[object Object],[object Object],(Image: M.J.S., http://flickr.com/photos/booksnake/171233840/)
Conclusion ,[object Object],(Image: NJLA,  http://flickr.com/photos/njla/473873371/)
Policy Recommendations
Librarians should… ,[object Object],[object Object],[object Object],[object Object]
Librarians should… ,[object Object],[object Object],[object Object],[object Object]
Librarians should… ,[object Object],[object Object],[object Object]
Works Cited American Library Association. (1988, July 13).  Resolution in opposition to FBI Library Awareness Program (88.07.13 #77.4) . Retrieved October 21, 2007, from  http://www.ala.org/ala/godort/godortresolutions/19880713153.htm   _____. (1995, June 28).  Code of ethics of the American Library Association.  Retrieved October 19, 2007, from   http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm   _____. (2002, January 23) .  Resolution reaffirming the principles of intellectual freedom in the aftermath of terrorist attacks.  Retrieved October 13, 2007, from  http://www.ala.org/Template.cfm?Section=ifresolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=78173   _____. (2002, June 19).  Privacy: an interpretation of the Library Bill of Rights.  Retrieved October 19, 2007, from   http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=132904   American Society for Information Science and Technology. (1992, May 30).  ASIS&T Professional Guidelines . Retrieved October 19, 2007, from   http://www.asis.org/AboutASIS/professional-guidelines.html Fourie, D. K. & Dowell, D. R. (2002).  Libraries in the information age: An introduction and career exploration . Greenwood Village, CO: Libraries Unlimited.
Works Cited, cont. International Federation of Library Associations and Institutions. (2002, August 19).  The Glasgow Declaration on Libraries, Information Services and Intellectual Freedom . Retrieved October 20, 2007 from  http://www.ifla.org/faife/policy/iflastat/gldeclar-e.html   Merriam-Webster Online . (n.d.). Retrieved October 20, 2007, from  http://www.merriam-webster.com/dictionary/penumbra   Neuhaus, P. (2003). Privacy and confidentiality in digital reference [Electronic version].  Reference and User Services Quarterly, 43 (1), 26-36. Rubin, R. E. (2001). Ethical aspects of reference service. In R. E. Bopp & L. C. Smith (Eds.),  Reference and information services: An introduction  (3 rd  ed., pp. 28-46). Englewood, CO: Libraries Unlimited. _____. (2004).  Foundations of library and information science  (2 nd  ed.). New York: Neal-Schuman. Terror suspect says FBI spied on his library computer use. (2007, October 11).  The International Herald Tribune.  Retrieved October 12, 2007, from  http://www.iht.com/articles/ap/2007/10/11/america/NA-GEN-US-Terrorism-Arrests.php

Contenu connexe

Tendances

Library and information science: an evolving profession
Library and information science: an evolving professionLibrary and information science: an evolving profession
Library and information science: an evolving professionJolo Van Clyde Abatayo
 
INFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICESINFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICESJehn Marie A. Simon
 
Preservation and conservation of library materials
Preservation and conservation of library materialsPreservation and conservation of library materials
Preservation and conservation of library materialsJohny Prudencio
 
Marketing Library Services
Marketing Library ServicesMarketing Library Services
Marketing Library ServicesLori Reed
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxRbalasubramani
 
The Library Then and Now: Its Importance and Relevance to the Present Genera...
The Library Then and Now:  Its Importance and Relevance to the Present Genera...The Library Then and Now:  Its Importance and Relevance to the Present Genera...
The Library Then and Now: Its Importance and Relevance to the Present Genera...Fe Angela Verzosa
 
User education in Libraries
User education in Libraries User education in Libraries
User education in Libraries Humayun Khan
 
Collection development
Collection developmentCollection development
Collection developmentShwethanaik31
 
Design and development of subject gateways with special reference to lisgateway
Design and development of subject  gateways with special reference to lisgatewayDesign and development of subject  gateways with special reference to lisgateway
Design and development of subject gateways with special reference to lisgatewaykmusthu
 
Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends Kaustav Saha
 
Evaluating your reference service
Evaluating your reference service Evaluating your reference service
Evaluating your reference service AnnaTatherine
 
Special libraries Presentation
Special libraries PresentationSpecial libraries Presentation
Special libraries PresentationMuhammad Kashif
 
Current Trends in Libraries
Current Trends in LibrariesCurrent Trends in Libraries
Current Trends in LibrariesVSNegi
 
Electronic Resource Management in the library
Electronic Resource Management in the libraryElectronic Resource Management in the library
Electronic Resource Management in the libraryDr. Nihar K. Patra
 
Selection and acquisitions
Selection and acquisitionsSelection and acquisitions
Selection and acquisitionsJohan Koren
 
Library Automation
Library AutomationLibrary Automation
Library AutomationRa Alvi
 
Types of Libraries: Public, Special, School, and Academic
Types of Libraries: Public, Special, School, and AcademicTypes of Libraries: Public, Special, School, and Academic
Types of Libraries: Public, Special, School, and AcademicAllana Delgado
 

Tendances (20)

Library and information science: an evolving profession
Library and information science: an evolving professionLibrary and information science: an evolving profession
Library and information science: an evolving profession
 
Academic library services for the digital age
Academic library services for the digital ageAcademic library services for the digital age
Academic library services for the digital age
 
INFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICESINFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICES
 
Preservation and conservation of library materials
Preservation and conservation of library materialsPreservation and conservation of library materials
Preservation and conservation of library materials
 
Library Classification ppt Arun Joseph MPhil
Library Classification ppt Arun Joseph MPhilLibrary Classification ppt Arun Joseph MPhil
Library Classification ppt Arun Joseph MPhil
 
Marketing Library Services
Marketing Library ServicesMarketing Library Services
Marketing Library Services
 
LIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptxLIBRARY AUTOMATION.pptx
LIBRARY AUTOMATION.pptx
 
The Library Then and Now: Its Importance and Relevance to the Present Genera...
The Library Then and Now:  Its Importance and Relevance to the Present Genera...The Library Then and Now:  Its Importance and Relevance to the Present Genera...
The Library Then and Now: Its Importance and Relevance to the Present Genera...
 
User education in Libraries
User education in Libraries User education in Libraries
User education in Libraries
 
Collection development
Collection developmentCollection development
Collection development
 
Design and development of subject gateways with special reference to lisgateway
Design and development of subject  gateways with special reference to lisgatewayDesign and development of subject  gateways with special reference to lisgateway
Design and development of subject gateways with special reference to lisgateway
 
Library 2.0
Library 2.0Library 2.0
Library 2.0
 
Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends
 
Evaluating your reference service
Evaluating your reference service Evaluating your reference service
Evaluating your reference service
 
Special libraries Presentation
Special libraries PresentationSpecial libraries Presentation
Special libraries Presentation
 
Current Trends in Libraries
Current Trends in LibrariesCurrent Trends in Libraries
Current Trends in Libraries
 
Electronic Resource Management in the library
Electronic Resource Management in the libraryElectronic Resource Management in the library
Electronic Resource Management in the library
 
Selection and acquisitions
Selection and acquisitionsSelection and acquisitions
Selection and acquisitions
 
Library Automation
Library AutomationLibrary Automation
Library Automation
 
Types of Libraries: Public, Special, School, and Academic
Types of Libraries: Public, Special, School, and AcademicTypes of Libraries: Public, Special, School, and Academic
Types of Libraries: Public, Special, School, and Academic
 

En vedette

Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014Hugo Kerschot
 
SXTXState Final Presentation
SXTXState Final PresentationSXTXState Final Presentation
SXTXState Final PresentationCindy Royal
 
Housewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by RathipriyaHousewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by RathipriyaSivashanmugam Palaniappan
 
4150415
41504154150415
4150415kombi9
 
Paintings by Jeroen Molenaar
Paintings by Jeroen MolenaarPaintings by Jeroen Molenaar
Paintings by Jeroen MolenaarJeroen Molenaar
 
求人掲載マニュアル
求人掲載マニュアル求人掲載マニュアル
求人掲載マニュアルtomokiyo-n
 
Mi proyecto de vida vanessa
Mi proyecto de vida  vanessaMi proyecto de vida  vanessa
Mi proyecto de vida vanessaIE Simona Duque
 
Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011Cindy Royal
 
ամառ
ամառամառ
ամառganyan
 
日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレスtomokiyo-n
 
Diplom Sverigehälsan
Diplom SverigehälsanDiplom Sverigehälsan
Diplom SverigehälsanTilde Westrup
 

En vedette (20)

Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014
 
Cultivating Mid-Level Donors
Cultivating Mid-Level DonorsCultivating Mid-Level Donors
Cultivating Mid-Level Donors
 
SIO_110_syllabus
SIO_110_syllabusSIO_110_syllabus
SIO_110_syllabus
 
SXTXState Final Presentation
SXTXState Final PresentationSXTXState Final Presentation
SXTXState Final Presentation
 
Housewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by RathipriyaHousewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by Rathipriya
 
Happy buyer
Happy buyerHappy buyer
Happy buyer
 
liceo de pakil Alumni reg. form 2011
liceo de pakil Alumni reg. form 2011liceo de pakil Alumni reg. form 2011
liceo de pakil Alumni reg. form 2011
 
4150415
41504154150415
4150415
 
Paintings by Jeroen Molenaar
Paintings by Jeroen MolenaarPaintings by Jeroen Molenaar
Paintings by Jeroen Molenaar
 
求人掲載マニュアル
求人掲載マニュアル求人掲載マニュアル
求人掲載マニュアル
 
Test Dependencies and the Future of Build Acceleration
Test Dependencies and the Future of Build AccelerationTest Dependencies and the Future of Build Acceleration
Test Dependencies and the Future of Build Acceleration
 
Awkward Originals
Awkward OriginalsAwkward Originals
Awkward Originals
 
carolina!
carolina!carolina!
carolina!
 
Mi proyecto de vida vanessa
Mi proyecto de vida  vanessaMi proyecto de vida  vanessa
Mi proyecto de vida vanessa
 
Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011
 
Tecnologia salud
Tecnologia saludTecnologia salud
Tecnologia salud
 
ամառ
ամառամառ
ամառ
 
日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス
 
How to Study New Ones
How to Study New OnesHow to Study New Ones
How to Study New Ones
 
Diplom Sverigehälsan
Diplom SverigehälsanDiplom Sverigehälsan
Diplom Sverigehälsan
 

Similaire à Privacy and Libraries

Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815Rachel
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Papereward511
 
Privacy Audits in Law Libraries
Privacy Audits in Law LibrariesPrivacy Audits in Law Libraries
Privacy Audits in Law LibrariesRachel Gordon
 
Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...Rebekah Cummings
 
Data, librarians, and services
Data, librarians, and servicesData, librarians, and services
Data, librarians, and servicesAndrew Treloar
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeDalal Rahme
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mark Conrad
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxelinoraudley582231
 
Legal Ethics And Professional Conduct
Legal Ethics And Professional ConductLegal Ethics And Professional Conduct
Legal Ethics And Professional Conductlegalinfo
 
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNINGBLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNINGJohn1Lorcan
 
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...dri_ireland
 
LIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project postersLIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project postersPrattSILS
 
IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK Tom Moritz
 

Similaire à Privacy and Libraries (20)

Niso library law
Niso library lawNiso library law
Niso library law
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Paper
 
Patron Privacy in Libraries
Patron Privacy in LibrariesPatron Privacy in Libraries
Patron Privacy in Libraries
 
Privacy Audits in Law Libraries
Privacy Audits in Law LibrariesPrivacy Audits in Law Libraries
Privacy Audits in Law Libraries
 
Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...
 
Data, librarians, and services
Data, librarians, and servicesData, librarians, and services
Data, librarians, and services
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008
 
Rl1.1 dm defined
Rl1.1 dm definedRl1.1 dm defined
Rl1.1 dm defined
 
ILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all TogetherILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all Together
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
 
Legal Ethics And Professional Conduct
Legal Ethics And Professional ConductLegal Ethics And Professional Conduct
Legal Ethics And Professional Conduct
 
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
 
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNINGBLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
 
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...
 
Mam assign
Mam assignMam assign
Mam assign
 
LIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project postersLIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project posters
 
IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK
 

Plus de Bradley Shipps

Reference Interview 101
Reference Interview 101Reference Interview 101
Reference Interview 101Bradley Shipps
 
Rules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the LibraryRules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the LibraryBradley Shipps
 
Adventures in Digitization
Adventures in DigitizationAdventures in Digitization
Adventures in DigitizationBradley Shipps
 
Web 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteersWeb 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteersBradley Shipps
 
Intro to CNY Heritage - updated
Intro to CNY Heritage - updatedIntro to CNY Heritage - updated
Intro to CNY Heritage - updatedBradley Shipps
 

Plus de Bradley Shipps (10)

Reference Interview 101
Reference Interview 101Reference Interview 101
Reference Interview 101
 
Rules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the LibraryRules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the Library
 
Adventures in Digitization
Adventures in DigitizationAdventures in Digitization
Adventures in Digitization
 
Web 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteersWeb 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteers
 
Twitter @Fayfree
Twitter @FayfreeTwitter @Fayfree
Twitter @Fayfree
 
Intro to CNY Heritage - updated
Intro to CNY Heritage - updatedIntro to CNY Heritage - updated
Intro to CNY Heritage - updated
 
Indexing Photographs
Indexing PhotographsIndexing Photographs
Indexing Photographs
 
Cataloging Games
Cataloging GamesCataloging Games
Cataloging Games
 
e-Gyptian Expedition
e-Gyptian Expeditione-Gyptian Expedition
e-Gyptian Expedition
 
Intro to CNY Heritage
Intro to CNY HeritageIntro to CNY Heritage
Intro to CNY Heritage
 

Dernier

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Privacy and Libraries

  • 1. Privacy and Libraries in the Digital Age Bradley Shipps IST 618 Survey of Telecommunications and Information Policy November 5, 2007
  • 2. Privacy laws in the United States A brief overview
  • 3.
  • 4.
  • 5.
  • 6. Privacy in libraries Why is privacy important in libraries?
  • 7.
  • 8. Legal protection of privacy in libraries
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Legal challenges to privacy in libraries
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29. March 21, 2006 - FBI agents followed terror suspect Syed Ahmed into the Chestatee Regional Library in Dawsonville, Georgia. After Ahmed left the library, the agents accessed the browser history of the computer. The FBI agents did not have a search warrant. Syed Ahmed (AP)
  • 30. “ The actions of the government agent, contrary to the policies and procedures of the library … violated the defendant’s reasonable expectations of privacy.” - Jack Martin, attorney for Syed Ahmed (Terror suspect, 2007) Technology allowed federal agents to bypass library policy….
  • 31. Digital library transactions involve outside parties, such as software developers, database vendors, or Internet service providers. Existing laws and policies may not protect privacy of digital transactions. None of the existing state laws specifically discuss privacy of digital reference records. (Neuhaus, 2003)
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 40.
  • 41.
  • 42.
  • 43. Works Cited American Library Association. (1988, July 13). Resolution in opposition to FBI Library Awareness Program (88.07.13 #77.4) . Retrieved October 21, 2007, from http://www.ala.org/ala/godort/godortresolutions/19880713153.htm _____. (1995, June 28). Code of ethics of the American Library Association. Retrieved October 19, 2007, from http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm _____. (2002, January 23) . Resolution reaffirming the principles of intellectual freedom in the aftermath of terrorist attacks. Retrieved October 13, 2007, from http://www.ala.org/Template.cfm?Section=ifresolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=78173 _____. (2002, June 19). Privacy: an interpretation of the Library Bill of Rights. Retrieved October 19, 2007, from http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=132904 American Society for Information Science and Technology. (1992, May 30). ASIS&T Professional Guidelines . Retrieved October 19, 2007, from http://www.asis.org/AboutASIS/professional-guidelines.html Fourie, D. K. & Dowell, D. R. (2002). Libraries in the information age: An introduction and career exploration . Greenwood Village, CO: Libraries Unlimited.
  • 44. Works Cited, cont. International Federation of Library Associations and Institutions. (2002, August 19). The Glasgow Declaration on Libraries, Information Services and Intellectual Freedom . Retrieved October 20, 2007 from http://www.ifla.org/faife/policy/iflastat/gldeclar-e.html Merriam-Webster Online . (n.d.). Retrieved October 20, 2007, from http://www.merriam-webster.com/dictionary/penumbra Neuhaus, P. (2003). Privacy and confidentiality in digital reference [Electronic version]. Reference and User Services Quarterly, 43 (1), 26-36. Rubin, R. E. (2001). Ethical aspects of reference service. In R. E. Bopp & L. C. Smith (Eds.), Reference and information services: An introduction (3 rd ed., pp. 28-46). Englewood, CO: Libraries Unlimited. _____. (2004). Foundations of library and information science (2 nd ed.). New York: Neal-Schuman. Terror suspect says FBI spied on his library computer use. (2007, October 11). The International Herald Tribune. Retrieved October 12, 2007, from http://www.iht.com/articles/ap/2007/10/11/america/NA-GEN-US-Terrorism-Arrests.php