Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Undo revision 433407 by Tesskwilson (talk))
(Tag: Undo)
(Undo revision 433406 by Tesskwilson (talk))
(Tag: Undo)
Line 1: Line 1:
 
=== Week 2: Privacy in the Library Pt. 2 ===
 
=== Week 2: Privacy in the Library Pt. 2 ===
* Real time lecture: Friday June 21 2-4PM Eastern / 11-1PM Pacific on Zoom: https://zoom.us/j/9129428892
+
* Real time lecture: June 21 2:00PM Eastern / 11:00AM Pacific
  
 
==== Overview ====
 
==== Overview ====
This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.
+
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.  
  
 
==== Learning objectives ====
 
==== Learning objectives ====
* Learn about the data lifecycle in libraries
+
* Learn starting points for teaching privacy
* Learn to take a critical look at library privacy policies
+
* Learn about top privacy resources
* Learn how to develop/revise library policies through a privacy lens
+
* Learn about the importance of threat modeling and how to create a threat model
* Learn about vendors and data brokers
 
  
 
==== Readings ====
 
==== Readings ====
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
+
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
+
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/
+
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
+
* Browse through EFF's Security Education Companion: sec.eff.org
Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
 
NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf
 
LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf
 
LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun
 
ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines
 
ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy
 
Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf
 
ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists
 
Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship
 
EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security
 
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====

Revision as of 16:09, 22 May 2024

Week 2: Privacy in the Library Pt. 2

  • Real time lecture: June 21 2:00PM Eastern / 11:00AM Pacific

Overview

This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.

Learning objectives

  • Learn starting points for teaching privacy
  • Learn about top privacy resources
  • Learn about the importance of threat modeling and how to create a threat model

Readings

Guest lecturer

Guest Lecturer TBD

Discussion

  • How can we use threat modeling in our everyday work?
  • How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.

Tasks

  • Lecture, readings, discussion forum, and small group work
  • Complete one day of the Data Detox Kit
  • Schedule time with Alison to talk about questions and ideas for your small group projects