Difference between revisions of "LFI Course Materials 4/Week two"
Jump to navigation
Jump to search
Tesskwilson (talk | contribs) (→Week 2: Privacy in the Library Pt. 2) |
Tesskwilson (talk | contribs) (→Week 2: Privacy in the Library Pt. 2) |
||
Line 14: | Line 14: | ||
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F) | * Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F) | ||
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/) | * A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/) | ||
− | Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/ | + | * Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/) |
− | The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing | + | * The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing) |
− | Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing | + | * Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing) |
− | NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf | + | * NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf) |
− | LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf | + | * LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf) |
− | LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun | + | * LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun) |
− | ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines | + | * ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines) |
− | ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy | + | * ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy) |
− | Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf | + | * Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf) |
− | ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists | + | * ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists) |
− | Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship | + | * Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship) |
− | EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security | + | * EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security) |
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
Line 31: | Line 31: | ||
==== Discussion ==== | ==== Discussion ==== | ||
− | * How | + | Policy Questions: |
− | * | + | * How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion) |
+ | * What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all? | ||
+ | Vendor Questions: | ||
+ | * Where do you see opportunities for resisting or challenging the vendor practices we discussed today? | ||
+ | * What are small, harm reduction steps? | ||
+ | * What are starting points for bigger action? | ||
+ | * What are the challenges to standing up to these vendor practices? | ||
==== Tasks ==== | ==== Tasks ==== | ||
− | * Lecture, readings, discussion | + | * Lecture, readings, and answer discussion questions in Discord |
− | |||
− |
Revision as of 15:12, 16 May 2024
Contents
Week 2: Privacy in the Library Pt. 2
- Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
Overview
This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
Learning objectives
- Learn about the data lifecycle in libraries
- Learn to take a critical look at library privacy policies
- Learn how to develop/revise library policies through a privacy lens
- Learn about vendors and data brokers
Readings
- Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
- A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
- Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/)
- The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
- Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
- NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf)
- LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf)
- LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun)
- ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines)
- ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy)
- Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf)
- ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists)
- Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship)
- EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security)
Guest lecturer
Guest Lecturer TBD
Discussion
Policy Questions:
- How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
- What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
Vendor Questions:
- Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
- What are small, harm reduction steps?
- What are starting points for bigger action?
- What are the challenges to standing up to these vendor practices?
Tasks
- Lecture, readings, and answer discussion questions in Discord