SlideShare une entreprise Scribd logo
1  sur  40
 ©2016 ProQuest LLC. All rights reserved.
Security & Privacy:
What’s Ahead for 2017
Library Edition
Daniel Ayala (@buddhake)
Director, Global Information Security, ProQuest
ALA Midwinter 2017
Atlanta, Georgia
 ©2016 ProQuest LLC. All rights reserved.2
First, a story…
 ©2016 ProQuest LLC. All rights reserved.
Modern technology is
amazing. 3
The sky is the
limit…
…but there is
reason for
caution
 ©2016 ProQuest LLC. All rights reserved.
Security & privacy
go beyond the
library
4
 ©2016 ProQuest LLC. All rights reserved.5
Library as Hub of Privacy & Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
6
Device Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
7
Malware
Ransomware
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
8
Phishing
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
9
Browser
Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
10
Mobile Devices
 ©2016 ProQuest LLC. All rights reserved.
A few words on
11
P R I V A C
Y
 ©2016 ProQuest LLC. All rights reserved.12
USA Patriot
Act
 ©2016 ProQuest LLC. All rights reserved.13
USA Freedom
Act
 ©2016 ProQuest LLC. All rights reserved.14
Consumer
Services
Devour Data
 ©2016 ProQuest LLC. All rights reserved.15
Anonymisation
& Tor
 ©2016 ProQuest LLC. All rights reserved.16
Personalisatio
n
 ©2016 ProQuest LLC. All rights reserved.17
Opt-in vs Opt-
Out
 ©2016 ProQuest LLC. All rights reserved.18
Net Neutrality
Rollback*
*In discussion, not yet submitted for public
 ©2016 ProQuest LLC. All rights reserved.19
ISP Browsing
Data Privacy
Rollback*
*In discussion, not yet submitted for public
 ©2016 ProQuest LLC. All rights reserved.
Tools
20
Ghostery (Chrome) –
https://www.ghostery.com
1Blocker (Mac/iOS) -
http://1blocker.com
BuiltWith (Chrome) -
https://builtwith.com
Malwarebytes -
https://www.malwarebytes.com
Deep Freeze - http://www.faronics.com/products/deep-
freeze/
Tor - https://www.torproject.org
Let’s Encrypt (SSL) - https://letsencrypt.org
 ©2016 ProQuest LLC. All rights reserved.21
Shared responsibility for
privacy
 ©2016 ProQuest LLC. All rights reserved.22
Transparency
 ©2016 ProQuest LLC. All rights reserved.23
Anonymisation
 ©2016 ProQuest LLC. All rights reserved.24
Options & Informed Consent
 ©2016 ProQuest LLC. All rights reserved.25
Sharing Data w/ Others
 ©2016 ProQuest LLC. All rights reserved.26
Support Anonymous Use
 ©2016 ProQuest LLC. All rights reserved.27
Access to One’s own User
Data
 ©2016 ProQuest LLC. All rights reserved.28
Accountability
 ©2016 ProQuest LLC. All rights reserved.29
RA21
RA21’s mission is to align and simplify
pathways to subscribed content across
participating scientific platforms. RA21 will
address the common problems users face
when interacting with multiple and varied
information protocols. 
http://www.stm-assoc.org/standards-technology/ra21-resource-access-
21st-century/
 ©2016 ProQuest LLC. All rights reserved.
Balance
30
Security &
Privacy Utility
 ©2016 ProQuest LLC. All rights reserved.
Foundational thinking31
Data will always be
collected
Collection !=
Privacy Violation
Serve the
user/patron!
Set principles for use
& sharing
If you collect it, use it wisely
and get rid of it when you’re
done!
TRUST!(but verify)
 ©2016 ProQuest LLC. All rights reserved.
Give patrons/users the information, options
to make smart, well-informed privacy
decisions32
 ©2016 ProQuest LLC. All rights reserved.
Security & privacy
go beyond the
library
33
Give patrons/users the information, options
to make smart, well-informed privacy
decisions
 ©2016 ProQuest LLC. All rights reserved.34
HTTP
S
11 Available Now, +5 More
Soon
All new ProQuest products, HTTPS
only
HTTPS only - later this
summer
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
 ©2016 ProQuest LLC. All rights reserved.35
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
ProQuest platform (search.proquest.com)
ProQuest Dialog (search.proquest.com/professional) 
ProQuest Administrator Module (PAM) 
Legacy RefWorks
The New RefWorks
Ebook Central
ProQuest Research Companion
Pi2 Drug Safety Triager
Alexander Street Platform (search.alexanderstreet.com)
Alexander Street Academic Video Store
(search.alexanderstreet.com/store) 
Alexander Street Admin Portal
NOW!
 ©2016 ProQuest LLC. All rights reserved.36
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
Pivot
eLibrary
CultureGrams
SIRS
HeritageQuest Online
ProQuest Congressional (congressional.proquest.com)
SOON!
 ©2016 ProQuest LLC. All rights reserved.37
Privacy PolicyFull Update Coming
SoonWhat data is collected
How it is used
With whom it is
sharedEU/USA Privacy Shield
Compliant
 ©2016 ProQuest LLC. All rights reserved.38
When it comes to privacy and
accountability, people always
demand the former for themselves
and the latter for everyone else.
– David Brin 
 ©2016 ProQuest LLC. All rights reserved.
Resources & Credits
NISO Consensus Framework to Support Patron Privacy in Digital
Library and Information Systems -
http://www.niso.org/topics/tl/patron_privacy/
ALA Code of Ethics -
http://www.ala.org/advocacy/proethics/codeofethics/codeethics
ALA Library Privacy Guidelines for e-book Lending and Digital
Content Vendors - http://www.ala.org/advocacy/library-privacy-
guidelines-e-book-lending-and-digital-content-vendors
STM RA21
- http://www.stm-assoc.org/standards-technology/ra21-resource-
access-21st-century/ 39
 ©2016 ProQuest LLC. All rights reserved.40
Q&A

Contenu connexe

Tendances

The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the NetworkTom Paseka
 
Fighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacksFighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacksShashi Prakash
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token StorageEric Muyser
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOVHcloud
 

Tendances (8)

ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
 
Fighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacksFighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacks
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token Storage
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 

En vedette

ProQuest Primary Source Materials
ProQuest Primary Source MaterialsProQuest Primary Source Materials
ProQuest Primary Source MaterialsProQuest
 
Summon @ LBSU
Summon @ LBSUSummon @ LBSU
Summon @ LBSUProQuest
 
A Hollow Sphere
A Hollow SphereA Hollow Sphere
A Hollow SphereProQuest
 
Our Work Here is Done
Our Work Here is DoneOur Work Here is Done
Our Work Here is DoneProQuest
 
Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project ProQuest
 
Upcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface ImprovementsUpcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface ImprovementsProQuest
 
Ebooks at Swinburne
Ebooks at SwinburneEbooks at Swinburne
Ebooks at SwinburneProQuest
 
American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971ProQuest
 
Programa de publicação de teses ProQuest
Programa de publicação de teses ProQuestPrograma de publicação de teses ProQuest
Programa de publicação de teses ProQuestProQuest
 
Simply Does It
Simply Does ItSimply Does It
Simply Does ItProQuest
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSProQuest
 
ProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential ProclamationsProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential ProclamationsProQuest
 
House of Commons Parliamentary Papers Migration
House of Commons Parliamentary PapersMigrationHouse of Commons Parliamentary PapersMigration
House of Commons Parliamentary Papers MigrationProQuest
 
EIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul OlympicsEIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul OlympicsProQuest
 
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...ProQuest
 
Case Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for ResearchCase Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for ResearchProQuest
 
ProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United StatesProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United StatesProQuest
 
Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...ProQuest
 
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...ProQuest
 
Computers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social MediaComputers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social MediaProQuest
 

En vedette (20)

ProQuest Primary Source Materials
ProQuest Primary Source MaterialsProQuest Primary Source Materials
ProQuest Primary Source Materials
 
Summon @ LBSU
Summon @ LBSUSummon @ LBSU
Summon @ LBSU
 
A Hollow Sphere
A Hollow SphereA Hollow Sphere
A Hollow Sphere
 
Our Work Here is Done
Our Work Here is DoneOur Work Here is Done
Our Work Here is Done
 
Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project
 
Upcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface ImprovementsUpcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface Improvements
 
Ebooks at Swinburne
Ebooks at SwinburneEbooks at Swinburne
Ebooks at Swinburne
 
American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971
 
Programa de publicação de teses ProQuest
Programa de publicação de teses ProQuestPrograma de publicação de teses ProQuest
Programa de publicação de teses ProQuest
 
Simply Does It
Simply Does ItSimply Does It
Simply Does It
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
 
ProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential ProclamationsProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential Proclamations
 
House of Commons Parliamentary Papers Migration
House of Commons Parliamentary PapersMigrationHouse of Commons Parliamentary PapersMigration
House of Commons Parliamentary Papers Migration
 
EIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul OlympicsEIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul Olympics
 
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
 
Case Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for ResearchCase Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for Research
 
ProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United StatesProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United States
 
Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...
 
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
 
Computers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social MediaComputers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social Media
 

Similaire à Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017

Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016Benjamin Cabé
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceNowSecure
 
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...Daniel Ayala
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeNowSecure
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsCaserta
 
Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware LabThreatConnect
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareAmit Serper
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017Adam Faeder
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...Cyber Security Alliance
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Firefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid ApplicationFirefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid ApplicationRizky Ariestiyansyah
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10NowSecure
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileNat Sakimura
 
Sitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn'tSitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn'tBas Lijten
 
The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.All Things Open
 
The Datacenter Network You Wish You Had
The Datacenter Network You Wish You HadThe Datacenter Network You Wish You Had
The Datacenter Network You Wish You HadJeremy Schulman
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...SecureAuth
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsAlbert Hui
 

Similaire à Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017 (20)

Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure Limitations
 
Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware Lab
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Firefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid ApplicationFirefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid Application
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
 
Sitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn'tSitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn't
 
The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.
 
The Datacenter Network You Wish You Had
The Datacenter Network You Wish You HadThe Datacenter Network You Wish You Had
The Datacenter Network You Wish You Had
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber Forensics
 

Plus de ProQuest

Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...ProQuest
 
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...ProQuest
 
Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...ProQuest
 
Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...ProQuest
 
Women and Social Movements Library - Key Topics
Women and Social Movements Library - Key TopicsWomen and Social Movements Library - Key Topics
Women and Social Movements Library - Key TopicsProQuest
 
Gerritsen collection on Women's Studies - A Resource Guide
Gerritsen collection on Women's Studies  - A Resource GuideGerritsen collection on Women's Studies  - A Resource Guide
Gerritsen collection on Women's Studies - A Resource GuideProQuest
 
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019ProQuest
 
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018ProQuest
 
Visual History Archive
Visual History ArchiveVisual History Archive
Visual History ArchiveProQuest
 
History vault-black-freedom-naacp-research
History vault-black-freedom-naacp-researchHistory vault-black-freedom-naacp-research
History vault-black-freedom-naacp-researchProQuest
 
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...ProQuest
 
The Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc ResearchThe Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc ResearchProQuest
 
ProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th CenturyProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th CenturyProQuest
 
History Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use CasesHistory Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use CasesProQuest
 
Privacy is the Future
Privacy is the FuturePrivacy is the Future
Privacy is the FutureProQuest
 
Preserving Technology Through Stories
Preserving Technology Through StoriesPreserving Technology Through Stories
Preserving Technology Through StoriesProQuest
 
Making Connections - Turing user insights into impact
Making Connections - Turing user insights into impactMaking Connections - Turing user insights into impact
Making Connections - Turing user insights into impactProQuest
 

Plus de ProQuest (17)

Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
 
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
 
Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...
 
Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...
 
Women and Social Movements Library - Key Topics
Women and Social Movements Library - Key TopicsWomen and Social Movements Library - Key Topics
Women and Social Movements Library - Key Topics
 
Gerritsen collection on Women's Studies - A Resource Guide
Gerritsen collection on Women's Studies  - A Resource GuideGerritsen collection on Women's Studies  - A Resource Guide
Gerritsen collection on Women's Studies - A Resource Guide
 
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
 
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
 
Visual History Archive
Visual History ArchiveVisual History Archive
Visual History Archive
 
History vault-black-freedom-naacp-research
History vault-black-freedom-naacp-researchHistory vault-black-freedom-naacp-research
History vault-black-freedom-naacp-research
 
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
 
The Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc ResearchThe Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc Research
 
ProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th CenturyProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th Century
 
History Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use CasesHistory Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use Cases
 
Privacy is the Future
Privacy is the FuturePrivacy is the Future
Privacy is the Future
 
Preserving Technology Through Stories
Preserving Technology Through StoriesPreserving Technology Through Stories
Preserving Technology Through Stories
 
Making Connections - Turing user insights into impact
Making Connections - Turing user insights into impactMaking Connections - Turing user insights into impact
Making Connections - Turing user insights into impact
 

Dernier

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Dernier (20)

Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 

Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017

  • 1.  ©2016 ProQuest LLC. All rights reserved. Security & Privacy: What’s Ahead for 2017 Library Edition Daniel Ayala (@buddhake) Director, Global Information Security, ProQuest ALA Midwinter 2017 Atlanta, Georgia
  • 2.  ©2016 ProQuest LLC. All rights reserved.2 First, a story…
  • 3.  ©2016 ProQuest LLC. All rights reserved. Modern technology is amazing. 3 The sky is the limit… …but there is reason for caution
  • 4.  ©2016 ProQuest LLC. All rights reserved. Security & privacy go beyond the library 4
  • 5.  ©2016 ProQuest LLC. All rights reserved.5 Library as Hub of Privacy & Security
  • 6.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 6 Device Security
  • 7.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 7 Malware Ransomware
  • 8.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 8 Phishing
  • 9.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 9 Browser Security
  • 10.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 10 Mobile Devices
  • 11.  ©2016 ProQuest LLC. All rights reserved. A few words on 11 P R I V A C Y
  • 12.  ©2016 ProQuest LLC. All rights reserved.12 USA Patriot Act
  • 13.  ©2016 ProQuest LLC. All rights reserved.13 USA Freedom Act
  • 14.  ©2016 ProQuest LLC. All rights reserved.14 Consumer Services Devour Data
  • 15.  ©2016 ProQuest LLC. All rights reserved.15 Anonymisation & Tor
  • 16.  ©2016 ProQuest LLC. All rights reserved.16 Personalisatio n
  • 17.  ©2016 ProQuest LLC. All rights reserved.17 Opt-in vs Opt- Out
  • 18.  ©2016 ProQuest LLC. All rights reserved.18 Net Neutrality Rollback* *In discussion, not yet submitted for public
  • 19.  ©2016 ProQuest LLC. All rights reserved.19 ISP Browsing Data Privacy Rollback* *In discussion, not yet submitted for public
  • 20.  ©2016 ProQuest LLC. All rights reserved. Tools 20 Ghostery (Chrome) – https://www.ghostery.com 1Blocker (Mac/iOS) - http://1blocker.com BuiltWith (Chrome) - https://builtwith.com Malwarebytes - https://www.malwarebytes.com Deep Freeze - http://www.faronics.com/products/deep- freeze/ Tor - https://www.torproject.org Let’s Encrypt (SSL) - https://letsencrypt.org
  • 21.  ©2016 ProQuest LLC. All rights reserved.21 Shared responsibility for privacy
  • 22.  ©2016 ProQuest LLC. All rights reserved.22 Transparency
  • 23.  ©2016 ProQuest LLC. All rights reserved.23 Anonymisation
  • 24.  ©2016 ProQuest LLC. All rights reserved.24 Options & Informed Consent
  • 25.  ©2016 ProQuest LLC. All rights reserved.25 Sharing Data w/ Others
  • 26.  ©2016 ProQuest LLC. All rights reserved.26 Support Anonymous Use
  • 27.  ©2016 ProQuest LLC. All rights reserved.27 Access to One’s own User Data
  • 28.  ©2016 ProQuest LLC. All rights reserved.28 Accountability
  • 29.  ©2016 ProQuest LLC. All rights reserved.29 RA21 RA21’s mission is to align and simplify pathways to subscribed content across participating scientific platforms. RA21 will address the common problems users face when interacting with multiple and varied information protocols.  http://www.stm-assoc.org/standards-technology/ra21-resource-access- 21st-century/
  • 30.  ©2016 ProQuest LLC. All rights reserved. Balance 30 Security & Privacy Utility
  • 31.  ©2016 ProQuest LLC. All rights reserved. Foundational thinking31 Data will always be collected Collection != Privacy Violation Serve the user/patron! Set principles for use & sharing If you collect it, use it wisely and get rid of it when you’re done! TRUST!(but verify)
  • 32.  ©2016 ProQuest LLC. All rights reserved. Give patrons/users the information, options to make smart, well-informed privacy decisions32
  • 33.  ©2016 ProQuest LLC. All rights reserved. Security & privacy go beyond the library 33 Give patrons/users the information, options to make smart, well-informed privacy decisions
  • 34.  ©2016 ProQuest LLC. All rights reserved.34 HTTP S 11 Available Now, +5 More Soon All new ProQuest products, HTTPS only HTTPS only - later this summer http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html
  • 35.  ©2016 ProQuest LLC. All rights reserved.35 http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html ProQuest platform (search.proquest.com) ProQuest Dialog (search.proquest.com/professional)  ProQuest Administrator Module (PAM)  Legacy RefWorks The New RefWorks Ebook Central ProQuest Research Companion Pi2 Drug Safety Triager Alexander Street Platform (search.alexanderstreet.com) Alexander Street Academic Video Store (search.alexanderstreet.com/store)  Alexander Street Admin Portal NOW!
  • 36.  ©2016 ProQuest LLC. All rights reserved.36 http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html Pivot eLibrary CultureGrams SIRS HeritageQuest Online ProQuest Congressional (congressional.proquest.com) SOON!
  • 37.  ©2016 ProQuest LLC. All rights reserved.37 Privacy PolicyFull Update Coming SoonWhat data is collected How it is used With whom it is sharedEU/USA Privacy Shield Compliant
  • 38.  ©2016 ProQuest LLC. All rights reserved.38 When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else. – David Brin 
  • 39.  ©2016 ProQuest LLC. All rights reserved. Resources & Credits NISO Consensus Framework to Support Patron Privacy in Digital Library and Information Systems - http://www.niso.org/topics/tl/patron_privacy/ ALA Code of Ethics - http://www.ala.org/advocacy/proethics/codeofethics/codeethics ALA Library Privacy Guidelines for e-book Lending and Digital Content Vendors - http://www.ala.org/advocacy/library-privacy- guidelines-e-book-lending-and-digital-content-vendors STM RA21 - http://www.stm-assoc.org/standards-technology/ra21-resource- access-21st-century/ 39
  • 40.  ©2016 ProQuest LLC. All rights reserved.40 Q&A

Notes de l'éditeur

  1. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  2. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  3. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  4. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  5. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  6. Ghostery 1Blocker MadeWith Malwarebytes Deepfreeze
  7. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  8. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  9. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  10. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  11. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  12. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  13. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  14. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  15. At the foundation of everything, we have some guiding principles that we worked with as we developed our approach: Some data will always be collected; it’s the nature of online services. Collection alone does not equal violation of user privacy, especially if explicit approval to use is given by the user. The underlying primary goal is to assist the missions of the researcher, library or author in achieving their missions. Guiding principles will define the rules of data collection, use and sharing. If you collect it, use it wisely, protect it and get rid of it when you don’t need it any longer.
  16. In March 2016 Apple product keynote, a section was devoted to privacy of data A Reuters article1 released at the same time chronicled the internal ”privacy czar” review and scrutiny process within Apple Apple has employed a similar review process prior to data being collected and/or used Apple has been clear about their commitment to privacy [1] http://www.reuters.com/article/us-apple-encryption-privacy-insight-idUSKCN0WN0BO