Difference between revisions of "LFI 2024/Month 2"

From Library Freedom Wiki Page
Jump to navigation Jump to search
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This month we'll discuss threat modeling. We will also talk about library privacy policies, the data lifecycle, and library vendors.
+
This month we'll discuss threat modeling. We will also talk about library privacy policies and how our practices can often be at odds with them, the data lifecycle in libraries, and library vendors and their various discontents. We'll talk about expectations of convenience from library patrons, and how that conflicts with privacy goals. We'll also be assigning small groups this month.
  
 
==== Learning objectives ====
 
==== Learning objectives ====
Line 10: Line 10:
 
* Learn best practices for library privacy policies  
 
* Learn best practices for library privacy policies  
 
* Learn about library vendors and their issues  
 
* Learn about library vendors and their issues  
* We will also be assigning small groups this month
+
 
 
 
==== Readings ====
 
==== Readings ====
 
NEED A READING ABOUT THREAT MODELING  
 
NEED A READING ABOUT THREAT MODELING  

Revision as of 19:07, 22 May 2024

Month 2: Privacy in the Library

Overview

This month we'll discuss threat modeling. We will also talk about library privacy policies and how our practices can often be at odds with them, the data lifecycle in libraries, and library vendors and their various discontents. We'll talk about expectations of convenience from library patrons, and how that conflicts with privacy goals. We'll also be assigning small groups this month.

Learning objectives

  • Learn about threat modeling
  • Learn about the data lifecycle in libraries
  • Learn best practices for library privacy policies
  • Learn about library vendors and their issues

Readings

NEED A READING ABOUT THREAT MODELING NEED LIBRARY SPECIFIC VENDOR READINGS HOOPLA LIBRARY MERGERS AND ACQUISITIONS RESOURCE SOMETHING SARAH HAS WRITTEN

Guest lecturer

Sarah Lamdan

Discussion

  • Brief discussion of month one readings
  • How can you use threat modeling to create more robust/holistic privacy policies at your institution?
  • How does your library's policy measure up to the best practices? (Note: you don't have to identify the library in the discussion)
  • What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
  • Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
  • What are small, harm reduction steps?
  • What are starting points for bigger action?
  • What are the challenges to standing up to these vendor practices?

Tasks

  • Lecture, readings, and participate in discussion questions in Discord