Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Week 2: Privacy in the Library Pt. 2)
(Week 2: Privacy in the Library Pt. 2)
Line 14: Line 14:
 
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
 
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
 
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
 
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/
+
* Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/)
The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
+
* The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
+
* Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf
+
* NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf)
LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf
+
* LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf)
LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun
+
* LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun)
ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines
+
* ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines)
ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy
+
* ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy)
Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf
+
* Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf)
ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists
+
* ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists)
Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship
+
* Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship)
EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security
+
* EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security)
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 31: Line 31:
  
 
==== Discussion ====
 
==== Discussion ====
* How can we use threat modeling in our everyday work?
+
Policy Questions:
* How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.
+
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
 +
* What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
 +
Vendor Questions:
 +
* Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
 +
* What are small, harm reduction steps?
 +
* What are starting points for bigger action?
 +
* What are the challenges to standing up to these vendor practices?
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, discussion forum, and small group work
+
* Lecture, readings, and answer discussion questions in Discord
* Complete one day of the Data Detox Kit
 
* Schedule time with Alison to talk about questions and ideas for your small group projects
 

Revision as of 15:12, 16 May 2024

Week 2: Privacy in the Library Pt. 2

Overview

This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.

Learning objectives

  • Learn about the data lifecycle in libraries
  • Learn to take a critical look at library privacy policies
  • Learn how to develop/revise library policies through a privacy lens
  • Learn about vendors and data brokers

Readings

Guest lecturer

Guest Lecturer TBD

Discussion

Policy Questions:

  • How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
  • What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?

Vendor Questions:

  • Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
  • What are small, harm reduction steps?
  • What are starting points for bigger action?
  • What are the challenges to standing up to these vendor practices?

Tasks

  • Lecture, readings, and answer discussion questions in Discord