LFI Course Materials/Cohort two final projects

From Library Freedom Wiki Page
Jump to navigation Jump to search


Tracy Treece: Privacy policy template & checklist CC BY-NC-SA[edit]

This is a template privacy policy that can be adapted to fit your institution, a vendor checklist to utilize when selecting new vendors, renewing contracts, or conducting a privacy audit, and an example of a vendor privacy policy list for Los Angeles Public Library.

TJ Lamanna Video on Tor and VPN services CC BY-NC-SA.[edit]

This is a 10-minute video describing the benefits of using Tor and VPN services. The information provided will help explain both the benefits of Tor and VPNs as well as steps on how to download and set up the services.

Carolyn Bennett Glauda: About LFP/LFI explainer; Quitting Facebook cards CC BY-NC-SA.[edit]

This 2-page flyer is for cohort members past, present, and future to use to reference Library Freedom Project and Library Freedom Institute. Use it to promote our work, do outreach to new cohort members, or help libraries find local privacy advocates and give an explainer on the difference between LFP and LFI.

Jessica Krill Vendor privacy policy list CC BY-NC-SA ; Privacy policy template & checklist CC BY-NC-SA[edit]

This is a template privacy policy that can be adapted to fit your institution, a vendor checklist to utilize when selecting new vendors, renewing contracts, or conducting a privacy audit, and an example of a vendor privacy policy list for Los Angeles Public Library.

Junior Tidal: Privacy Class; Privacy basics flyer CC BY-NC-SA[edit]

This is a presentation on basic privacy concepts, along with tools to help users to protect their digital information. The intended audience are undergraduate students but could be useful for high school students and/or the general public.

Oscar Gittemeier[edit]

Michele Alaniz: Protecting Student Privacy: What Faculty Need to Know class/workshop CC BY-NC-SA[edit]

This presentation focused on a faculty audience can be broken down into modules and customized based on amount of time available to present and who is the audience. This can also be used for library staff training. It covers privacy and FERPA basics, privacy practices and strategies, data tracking, and tips for creating assignments that are mindful of student privacy.

Bel Outwater: Privacy in Libraries: Staff Overview CC BY-NC-SA[edit]

This is a training presentation to introduce library staff to the philosophy behind library privacy policies and teach them practical applications.

Stephanie Milberger: Privacy Basics 101: VPN Guide CC BY-NC-SA[edit]

This a printable primer on VPNs for the general public. Can be used in conjunction with TJ's video.

Ashley J. Brown: SESTA/FOSTA Zine for Librarians CC BY-NC-SA 4.0.[edit]

This zine is intended to be an introduction to SESTA-FOSTA and the consequences it’s had on sex workers and online speech.

Qiana Johnson: Vendor privacy scorecard; Vendor Privacy FAQ CC BY-NC-SA[edit]

Jonathan Hernandez Perez: Poster on Privacy and Censorship CC BY-NC-SA.[edit]

Ellie Avis: Welcome to Computers CC BY-SA.[edit]

This a four-part class integrating digital literacy training and digital privacy basics. Week one covers computer basics and introduces open source software. Week two covers web browsing, encryption, and passwords. Week three covers email, phishing, and avoiding malware. Week four is focused on online learning and is a chance to reinforce the concepts presented in previous sessions.

Grace Riario[edit]

Megan Shanholtz: Privacy and Security for Public Libraries CC BY-NC-SA[edit]

This is a presentation on privacy and security aimed towards librarians. It contains live links, with the thought that it can be shared online afterwards as a more extensive resource.

Nicole Becwar: Vendor privacy scorecard; Vendor Privacy FAQ CC BY-NC-SA[edit]

In 2015, NISO brought together library staff, publishers, and software providers to create, “Consensus Principles on User’s Digital Privacy in Library, Publisher, and Software-Provider Systems” in an attempt to find common ground for library patron privacy. Based on the principles identified in the white paper, we analyzed 12 vendor privacy policies, including ProQuest, Elsevier, EBSCO, OCLC, Ex Libris, and JSTOR, vendors who were part of the core working group for the NISO white paper, to create the vendor privacy scorecard. The policies were graded against a common rubric and practices were denoted as being good privacy practices, areas of concern, or privacy practices that were incompatible with library privacy values.

Wren Kominos-Marvell: Stalkerware Training Resources; Privacy Tools Training; CC BY-NC-SA[edit]

A training for DV shelter staff to improve knowledge of stalkerware. Accompanied by a flyer for encouraging clients to come forward with their concerns.


A privacy tools training for public library staff. There is a recording of the training and a powerpoint presentation. There is a flyer included for displaying at the public computers. Public outreach was done via a local public radio program. The recording of that show is included in two different filetypes.

Symphony Bruce: Guide to Protecting Yourself From Online HarassmentCC BY-NC[edit]

This zine, written with college students in mind, provides a guide to identifying and dealing with online harassment. To print the zine, first download it and open with a .pdf viewer (Adobe works great). Print back-back. Do not switch to booklet printing. Once printed, fold in half, staple in the middle, and keep or distribute to friends and family.

Jeff Lambert: Census 2020: Safe Secure and Online CC BY-SA 4.0[edit]

A 60-minute training for library patrons about potential privacy threats and concerns with the 2020 Census, along with protections being put in place by the Census Bureau and libraries for a secure self-response.

Chad Clark[edit]

Andrea Puglisi: Trauma Informed Practice: Interpersonal Communications & Library Services - A Quick Guide CC BY-NC-SA 4.0[edit]

This is a practical interpersonal communications guide that provides a grounding on recognizing trauma; responding to trauma; and, how to adopt language that does not cause or result in further individual harm. Authored by Andrea Puglisi, MLS with consultation by Hilary Houldsworth, LMSW *Please note: I updated this since I originally posted this on our Wiki. If you have downloaded this document on 11/25 or before, please download again*

Haley Holmes: Privacy basics bookmarks; Privacy Basics Bookmark (purple, front side); Privacy Basics Bookmark (purple, back side); Privacy Basics Bookmark (green, front side); Privacy Basics Bookmark (green, back side) CC BY-NC-SA[edit]

These privacy basics bookmarks are available for libraries to print for patron use and contain information for those unfamiliar with privacy concepts including recommended tools.

Patricia B. Ball[edit]

Victor Benitez: Community Toolkit for Privacy and Surveillance CC BY-NC-SA 4.0[edit]

Maty Cropley: LFI Private Party Piratebox Privacy Jukebox; Face surveillance flyer, Massachusetts Face surveillance flyer, general[edit]

LFI Private Party Piratebox Privacy Jukebox (make party, privately in private or in public) A Piratebox stocked with a librarian-crowdsourced privacy-themed music playlist. Email me to borrow one for three weeks for your library program, block party or barricade assault: <odes@riseup.net>
Trailer: https://vimeo.com/371307453
Website: https://36thoutreachchamber.hotglue.me/
Guide: https://drive.google.com/file/d/1NSsYQ1VqnqeqJmAbcmtuVRwJv2yQo7PU/view
"PirateBox is free (as in freedom) because it is registered under the GNU GPLv3. This license grants you the right to freely copy, distribute, and transform creative works according to the principles of copyleft." from https://piratebox.cc

Kimberly Trinh-Sy: Facial Recognition Poster & Passive Program CC BY-NC-SA[edit]

This is a poster that can be used in coordination with a book display and/or passive program. An accompanying passive program might include a collection of props (hats, sunglasses, masks, etc.) that could be worn to potentially confuse facial recognition technology. Library patrons would be encouraged to try on a variety of props, then photograph themselves to see if their phone's photo or social media apps can identify them. Of course, patrons are encouraged to delete photos immediately afterward, in order to protect their privacy!

Leigh Ann Hamel Protect Yourself From Abuse poster CC BY-NC-SA[edit]

This is a poster meant to help at risk people recognise some signs of abuse and social engineering, as well as pratical tips for keeping their information safe in a digital world.

Julia Wiswell: Staff Training Micro Modules CC BY-NC-SA[edit]

These staff training micro modules are designed to be dropped into existing staff meetings to refresh or introduce privacy topics.

Michelle Nitto: Internet Infrastructure Bookmark[edit]

The bookmark on the physicality and history of the internet can also be provided in the workshops to give attendees a fuller understanding of the types of components and extractive processes involved in making the internet function. This bookmark can also be made available to students and the general population at a university in public computer areas inside libraries, or computer labs.

This work is licensed under a Creative Commons CC-BY License 4.0.

Kristy Cooper[edit]

Sex worker interview notes; Sex worker privacy and privilege (initial thoughts to be turned into a longer article and/or integrated into my Stripper Librarian book) CC BY-NC-SA