Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Week 2: Foundational reading)
(Week 2: Privacy in the Library Pt. 2)
Line 1: Line 1:
 
=== Week 2: Privacy in the Library Pt. 2 ===
 
=== Week 2: Privacy in the Library Pt. 2 ===
* Real time lecture: June 21 2:00PM Eastern / 11:00AM Pacific
+
* Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
  
 
==== Overview ====
 
==== Overview ====
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.  
+
This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
  
 
==== Learning objectives ====
 
==== Learning objectives ====
* Learn starting points for teaching privacy
+
* Learn about the data lifecycle in libraries
* Learn about top privacy resources
+
* Learn to take a critical look at library privacy policies
* Learn about the importance of threat modeling and how to create a threat model
+
* Learn how to develop/revise library policies through a privacy lens
 +
* Learn about vendors and data brokers
  
 
==== Readings ====
 
==== Readings ====
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
+
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
+
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
+
Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/
* Browse through EFF's Security Education Companion: sec.eff.org
+
The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
 +
Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
 +
NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf
 +
LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf
 +
LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun
 +
ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines
 +
ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy
 +
Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf
 +
ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists
 +
Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship
 +
EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====

Revision as of 15:08, 16 May 2024

Week 2: Privacy in the Library Pt. 2

Overview

This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.

Learning objectives

  • Learn about the data lifecycle in libraries
  • Learn to take a critical look at library privacy policies
  • Learn how to develop/revise library policies through a privacy lens
  • Learn about vendors and data brokers

Readings

Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/ The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security

Guest lecturer

Guest Lecturer TBD

Discussion

  • How can we use threat modeling in our everyday work?
  • How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.

Tasks

  • Lecture, readings, discussion forum, and small group work
  • Complete one day of the Data Detox Kit
  • Schedule time with Alison to talk about questions and ideas for your small group projects