Difference between revisions of "LFI Course Materials 4/Week two"
Jump to navigation
Jump to search
(→Discussion) |
|||
Line 28: | Line 28: | ||
NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC | NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC | ||
Policy Questions: | Policy Questions: | ||
− | * How does your library's policy (or the policy you chose) measure up to the best practices? ( | + | * How does your library's policy (or the policy you chose) measure up to the best practices? (Note: you don't have to identify the library in the discussion) |
+ | * How can you use threat modeling to create more robust/holistic privacy policies at your institution? | ||
* What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all? | * What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all? | ||
Vendor Questions: | Vendor Questions: |
Revision as of 15:45, 22 May 2024
Contents
Week 2: Privacy in the Library Pt. 2
- Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
Overview
This month we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
Learning objectives
- Threat modeling
- Learn about the data lifecycle in libraries
- Library privacy policies
- Learn about vendors and data brokers
Readings
NEED LIBRARY SPECIFIC VENDOR READINGS
- Data Lifecycles privacy advocacy guide
- NISO Privacy Principles
- Library Policy Template
- ALA Library Privacy Guidelines
- Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle
- ALA Library Privacy Checklists
- Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play
- EFF’s How to Assess Vendors’ Data Security
Guest lecturer
Sarah Lamdan
Discussion
NEED TO REVISE QUESTIONS TO INCLUDE THREAT MODELING ETC Policy Questions:
- How does your library's policy (or the policy you chose) measure up to the best practices? (Note: you don't have to identify the library in the discussion)
- How can you use threat modeling to create more robust/holistic privacy policies at your institution?
- What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
Vendor Questions:
- Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
- What are small, harm reduction steps?
- What are starting points for bigger action?
- What are the challenges to standing up to these vendor practices?
Tasks
- Lecture, readings, and answer discussion questions in Discord