Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
+
This month we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
  
 
==== Learning objectives ====
 
==== Learning objectives ====
 
* Threat modeling  
 
* Threat modeling  
 
* Learn about the data lifecycle in libraries
 
* Learn about the data lifecycle in libraries
* Learn to take a critical look at library privacy policies  
+
* Library privacy policies  
 
* Learn about vendors and data brokers  
 
* Learn about vendors and data brokers  
  
 
==== Readings ====
 
==== Readings ====
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
+
NEED LIBRARY SPECIFIC VENDOR READINGS
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
+
* [https://drive.google.com/file/d/1wepKodHvYpiCWcfF5kV7RNN8h50i6ssW/view?usp=sharing Data Lifecycles privacy advocacy guide]
* Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/)
+
* [https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf NISO Privacy Principles]
* The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
+
* [https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxunLFP Library Policy Template]
* Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
+
* [https://www.ala.org/advocacy/privacy/guidelines ALA Library Privacy Guidelines]
* NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf)
+
* [https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle]
* LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf)
+
* [http://www.ala.org/advocacy/privacy/checklists ALA Library Privacy Checklists]
* LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun)
+
* [https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play]
* ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines)
+
* [https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security EFF’s How to Assess Vendors’ Data Security]
* ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy)
 
* Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf)
 
* ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists)
 
* Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship)
 
* EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security)
 
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Guest Lecturer TBD
+
Sarah Lamdan
  
 
==== Discussion ====
 
==== Discussion ====
 +
NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC
 
Policy Questions:  
 
Policy Questions:  
 
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
 
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)

Revision as of 15:43, 22 May 2024

Week 2: Privacy in the Library Pt. 2

Overview

This month we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.

Learning objectives

  • Threat modeling
  • Learn about the data lifecycle in libraries
  • Library privacy policies
  • Learn about vendors and data brokers

Readings

NEED LIBRARY SPECIFIC VENDOR READINGS

Guest lecturer

Sarah Lamdan

Discussion

NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC Policy Questions:

  • How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
  • What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?

Vendor Questions:

  • Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
  • What are small, harm reduction steps?
  • What are starting points for bigger action?
  • What are the challenges to standing up to these vendor practices?

Tasks

  • Lecture, readings, and answer discussion questions in Discord