Editing LFI Course Materials 4/Week two
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | === Week 2: | + | === Week 2: Privacy in the Library Pt. 2 === |
− | * Real time lecture: June 21 | + | * Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892 |
==== Overview ==== | ==== Overview ==== | ||
+ | This month we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers. | ||
+ | ==== Learning objectives ==== | ||
+ | * Threat modeling | ||
+ | * Learn about the data lifecycle in libraries | ||
+ | * Library privacy policies | ||
+ | * Learn about vendors and data brokers | ||
==== Readings ==== | ==== Readings ==== | ||
− | + | NEED LIBRARY SPECIFIC VENDOR READINGS | |
+ | * [https://drive.google.com/file/d/1wepKodHvYpiCWcfF5kV7RNN8h50i6ssW/view?usp=sharing Data Lifecycles privacy advocacy guide] | ||
+ | * [https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf NISO Privacy Principles] | ||
+ | * [https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxunLFP Library Policy Template] | ||
+ | * [https://www.ala.org/advocacy/privacy/guidelines ALA Library Privacy Guidelines] | ||
+ | * [https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle] | ||
+ | * [http://www.ala.org/advocacy/privacy/checklists ALA Library Privacy Checklists] | ||
+ | * [https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play] | ||
+ | * [https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security EFF’s How to Assess Vendors’ Data Security] | ||
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
− | + | Sarah Lamdan | |
==== Discussion ==== | ==== Discussion ==== | ||
+ | NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC | ||
+ | Policy Questions: | ||
+ | * How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion) | ||
+ | * What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all? | ||
+ | Vendor Questions: | ||
+ | * Where do you see opportunities for resisting or challenging the vendor practices we discussed today? | ||
+ | * What are small, harm reduction steps? | ||
+ | * What are starting points for bigger action? | ||
+ | * What are the challenges to standing up to these vendor practices? | ||
− | + | ==== Tasks ==== | |
− | + | * Lecture, readings, and answer discussion questions in Discord | |
− | ==== Tasks ==== |