Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Week 2: Foundational reading)
(Week 2: Privacy in the Library Pt. 2)
(One intermediate revision by the same user not shown)
Line 1: Line 1:
 
=== Week 2: Privacy in the Library Pt. 2 ===
 
=== Week 2: Privacy in the Library Pt. 2 ===
* Real time lecture: June 21 2:00PM Eastern / 11:00AM Pacific
+
* Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
  
 
==== Overview ====
 
==== Overview ====
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.  
+
This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
  
 
==== Learning objectives ====
 
==== Learning objectives ====
* Learn starting points for teaching privacy
+
* Learn about the data lifecycle in libraries
* Learn about top privacy resources
+
* Learn to take a critical look at library privacy policies
* Learn about the importance of threat modeling and how to create a threat model
+
* Learn how to develop/revise library policies through a privacy lens
 +
* Learn about vendors and data brokers
  
 
==== Readings ====
 
==== Readings ====
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
+
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
+
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
+
* Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/)
* Browse through EFF's Security Education Companion: sec.eff.org
+
* The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
 +
* Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
 +
* NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf)
 +
* LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf)
 +
* LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun)
 +
* ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines)
 +
* ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy)
 +
* Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf)
 +
* ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists)
 +
* Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship)
 +
* EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security)
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 20: Line 31:
  
 
==== Discussion ====
 
==== Discussion ====
* How can we use threat modeling in our everyday work?
+
Policy Questions:
* How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.
+
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
 +
* What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
 +
Vendor Questions:
 +
* Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
 +
* What are small, harm reduction steps?
 +
* What are starting points for bigger action?
 +
* What are the challenges to standing up to these vendor practices?
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, discussion forum, and small group work
+
* Lecture, readings, and answer discussion questions in Discord
* Complete one day of the Data Detox Kit
 
* Schedule time with Alison to talk about questions and ideas for your small group projects
 

Revision as of 15:12, 16 May 2024

Week 2: Privacy in the Library Pt. 2

Overview

This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.

Learning objectives

  • Learn about the data lifecycle in libraries
  • Learn to take a critical look at library privacy policies
  • Learn how to develop/revise library policies through a privacy lens
  • Learn about vendors and data brokers

Readings

Guest lecturer

Guest Lecturer TBD

Discussion

Policy Questions:

  • How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
  • What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?

Vendor Questions:

  • Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
  • What are small, harm reduction steps?
  • What are starting points for bigger action?
  • What are the challenges to standing up to these vendor practices?

Tasks

  • Lecture, readings, and answer discussion questions in Discord