Difference between revisions of "LFI 2024/Month 3"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Discussion)
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
=== Month 3: TOPIC ===
+
=== Month 3: Privacy in the Library 2 ===
* Real time lecture:  
+
* Real time lecture: Friday July 19 at 2:00-4:00 Eastern / 11:00-1:00 Pacific on Zoom
  
 
==== Overview ====
 
==== Overview ====
  
RENAME THIS WEEK TO PRIVACY IN THE LIBRARY 2
+
This month, we'll dig deeper into privacy best practices and explore how we talk about privacy in an accessible and personal way. We will talk about gaps in technical literacies and how we as library workers can bridge those gaps with patron and staff trainings, policy reviews and audits, and more.
  
MOVE TALKING POINTS TO THIS WEEK
+
==== Readings ====
  
START COVERING:
+
No readings for this month. Instead, answer the discussion questions in Discord.
  
- privacy best practices in depth
+
==== Guest lecturer ====
- access v privacy issues
 
- how privacy is talked about
 
- how we want to talk about privacy - communicating in an accessible and personal way
 
- how to talk through people's fears about technology that does exploit them 
 
- privacy rights
 
- getting people on your side about privacy
 
- Huge tech literacy gaps in general public
 
- Defeatist attitudes or “nothing to hide” attitudes vs privacy paranoia/fear about institutions, and how this plays out on racial, gender, age, urban/rural, and class lines
 
- Dealing with surveillance of patrons by library staff
 
- Personal data exploitation 101 level
 
- scams and fraud
 
- Pushing back against libraries collecting data “just in case we need it”
 
- privacy on public computers, issues - will address privacy tech in the next class
 
- ways that library surveillance and policies are used against patrons
 
- Explaining why not to collect data
 
  
==== Readings ====
 
  
 +
==== Discussion ====
  
==== Guest lecturer ====
+
Threat modeling framework:
 +
* Assets: What do you want to protect?
 +
* Adversaries: Who might want your assets?
 +
* Capabilities: What can your adversary do?
 +
* Consequences: What could happen if your adversary succeeds? What is the likelihood of this happening?
  
 +
Threat Modeling Discussion Questions: What resonated about the threat modeling framework? How can you picture using this in a library environment? Are there threat models/personas that feel particularly relevant to your work?
  
==== Discussion ====
+
Privacy Policies Discussion Questions: How does your library privacy policy measure up to the best practices discussed in month 2? Does your policy match the library's practices? Does it address the data lifecycle in libraries? If not, what needs to change for these conditions to be met?
  
 +
Vendor Issues Discussion Questions: What resonated about the vendor discussion, and our conversation with Sarah Lamdan? What vendor issues are you most concerned about? What do you think about the advocacy and reform efforts that have taken place in libraries? What still needs to happen? What would need to shift to create real vendor accountability and change? What power do we currently hold to make this change, and what power do we need to build?
  
 
==== Tasks ====
 
==== Tasks ====

Latest revision as of 12:19, 25 June 2024

Month 3: Privacy in the Library 2[edit]

  • Real time lecture: Friday July 19 at 2:00-4:00 Eastern / 11:00-1:00 Pacific on Zoom

Overview[edit]

This month, we'll dig deeper into privacy best practices and explore how we talk about privacy in an accessible and personal way. We will talk about gaps in technical literacies and how we as library workers can bridge those gaps with patron and staff trainings, policy reviews and audits, and more.

Readings[edit]

No readings for this month. Instead, answer the discussion questions in Discord.

Guest lecturer[edit]

Discussion[edit]

Threat modeling framework:

  • Assets: What do you want to protect?
  • Adversaries: Who might want your assets?
  • Capabilities: What can your adversary do?
  • Consequences: What could happen if your adversary succeeds? What is the likelihood of this happening?

Threat Modeling Discussion Questions: What resonated about the threat modeling framework? How can you picture using this in a library environment? Are there threat models/personas that feel particularly relevant to your work?

Privacy Policies Discussion Questions: How does your library privacy policy measure up to the best practices discussed in month 2? Does your policy match the library's practices? Does it address the data lifecycle in libraries? If not, what needs to change for these conditions to be met?

Vendor Issues Discussion Questions: What resonated about the vendor discussion, and our conversation with Sarah Lamdan? What vendor issues are you most concerned about? What do you think about the advocacy and reform efforts that have taken place in libraries? What still needs to happen? What would need to shift to create real vendor accountability and change? What power do we currently hold to make this change, and what power do we need to build?

Tasks[edit]