Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Undo revision 433403 by Tesskwilson (talk))
(Tag: Undo)
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
=== Week 2: Privacy in the Library Pt. 2 ===
+
=== Week 2: Foundational reading===
* Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
+
* Real time lecture: June 21, 2-4PM Eastern / 12-2PM Pacific on Zoom https://zoom.us/j/9129428892
  
 
==== Overview ====
 
==== Overview ====
This month we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
 
  
==== Learning objectives ====
 
* Threat modeling
 
* Learn about the data lifecycle in libraries
 
* Library privacy policies
 
* Learn about vendors and data brokers
 
  
 
==== Readings ====
 
==== Readings ====
NEED LIBRARY SPECIFIC VENDOR READINGS
+
 
* [https://drive.google.com/file/d/1wepKodHvYpiCWcfF5kV7RNN8h50i6ssW/view?usp=sharing Data Lifecycles privacy advocacy guide]
 
* [https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf NISO Privacy Principles]
 
* [https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxunLFP Library Policy Template]
 
* [https://www.ala.org/advocacy/privacy/guidelines ALA Library Privacy Guidelines]
 
* [https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle]
 
* [http://www.ala.org/advocacy/privacy/checklists ALA Library Privacy Checklists]
 
* [https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play]
 
* [https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security EFF’s How to Assess Vendors’ Data Security]
 
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Sarah Lamdan
+
 
  
 
==== Discussion ====
 
==== Discussion ====
NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC
 
Policy Questions:
 
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
 
* What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
 
Vendor Questions:
 
* Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
 
* What are small, harm reduction steps?
 
* What are starting points for bigger action?
 
* What are the challenges to standing up to these vendor practices?
 
  
==== Tasks ====  
+
 
* Lecture, readings, and answer discussion questions in Discord
+
 
 +
==== Tasks ====

Latest revision as of 16:10, 22 May 2024

Week 2: Foundational reading[edit]

Overview[edit]

Readings[edit]

Guest lecturer[edit]

Discussion[edit]

Tasks[edit]