Difference between revisions of "LFI Course Materials 4/Week two"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Undo revision 433416 by Amacrina2 (talk))
(Tag: Undo)
(Undo revision 433407 by Tesskwilson (talk))
(Tag: Undo)
Line 14: Line 14:
 
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
 
* Means of Control Map from Tech Inquiry (https://techinquiry.org/?bookURL=https%3A%2F%2Fwww%2Epenguinrandomhouse%2Ecom%2Fbooks%2F706321%2Fmeans-of-control-by-byron-tau%2F)
 
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
 
* A Brief History of the Internet by Internet Society (https://www.internetsociety.org/internet/history-internet/brief-history-internet/)
* Another Network is Possible by April Glaser (https://logicmag.io/bodies/another-network-is-possible/)
+
Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/
* The New Terminology for Privacy by the International Association of Privacy Professionals (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
+
The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
* Data Lifecycles from ALA (https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing)
+
Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing
* NISO Privacy Principles (https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf)
+
NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf
* LFP Vendor Privacy Scorecard (https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf)
+
LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf
* LFP Library Policy Template (https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun)
+
LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun
* ALA Library Privacy Guidelines (https://www.ala.org/advocacy/privacy/guidelines)
+
ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines
* ALA Guidelines on Developing/Revising Privacy Policy (http://www.ala.org/advocacy/privacy/toolkit/policy)
+
ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy
* Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle (https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf)
+
Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf
* ALA Library Privacy Checklists (http://www.ala.org/advocacy/privacy/checklists)
+
ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists
* Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play (https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship)
+
Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship
* EFF’s How to Assess Vendors’ Data Security (https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security)
+
EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 31: Line 31:
  
 
==== Discussion ====
 
==== Discussion ====
Policy Questions:
+
* How can we use threat modeling in our everyday work?
* How does your library's policy (or the policy you chose) measure up to the best practices? (note: you don't have to identify the library in the discussion)
+
* How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.
* What challenges might you face trying to update your library's policy to meet best practices? Implementation? Enforcement? Making the policy a priority at all?
 
Vendor Questions:
 
* Where do you see opportunities for resisting or challenging the vendor practices we discussed today?
 
* What are small, harm reduction steps?
 
* What are starting points for bigger action?
 
* What are the challenges to standing up to these vendor practices?
 
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, and answer discussion questions in Discord
+
* Lecture, readings, discussion forum, and small group work
 +
* Complete one day of the Data Detox Kit
 +
* Schedule time with Alison to talk about questions and ideas for your small group projects

Revision as of 16:09, 22 May 2024

Week 2: Privacy in the Library Pt. 2

Overview

This week we'll discuss library privacy policies, the data lifecycle, and how privacy law plays a role in libraries. We will also discuss vendors and data brokers.

Learning objectives

  • Learn about the data lifecycle in libraries
  • Learn to take a critical look at library privacy policies
  • Learn how to develop/revise library policies through a privacy lens
  • Learn about vendors and data brokers

Readings

Another Network is Possible by April Glaser https://logicmag.io/bodies/another-network-is-possible/ The New Terminology for Privacy by the International Association of Privacy Professionals https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing Data Lifecycles from ALA https://drive.google.com/drive/folders/1anZa_vgxa6Rdq-2XZInCXKklYHrTRnfx?usp=sharing NISO Privacy Principles https://groups.niso.org/higherlogic/ws/public/download/16064/NISO%20Privacy%20Principles.pdf LFP Vendor Privacy Scorecard https://libraryfreedom.org/wp-content/uploads/2021/02/LFP-Vendor_Privacy_Audit_022121.pdf LFP Library Policy Template https://docs.google.com/document/d/1a9n2SAYLua0ELQzAcJtbfpxWg2MRkucL7sM92aniNMo/edit#heading=h.9v96ldaenxun ALA Library Privacy Guidelines https://www.ala.org/advocacy/privacy/guidelines ALA Guidelines on Developing/Revising Privacy Policy http://www.ala.org/advocacy/privacy/toolkit/policy Library Privacy and Vendor Management: A Privacy Oriented Overview of the Vendor Relationship Lifecycle https://www.plpinfo.org/wp-content/uploads/2021/09/Library-Privacy-and-Vendor-Management-I-Handout.pdf ALA Library Privacy Checklists http://www.ala.org/advocacy/privacy/checklists Protecting Patron Privacy: Librarians, Vendors, and Patrons Each Have a Role to Play https://digitalcommons.du.edu/cgi/viewcontent.cgi?article=1330&context=collaborativelibrarianship EFF’s How to Assess Vendors’ Data Security https://www.eff.org/deeplinks/2018/01/how-assess-vendors-data-security

Guest lecturer

Guest Lecturer TBD

Discussion

  • How can we use threat modeling in our everyday work?
  • How could you get started teaching privacy in your library? If you're already teaching privacy, talk about the ways you're doing so.

Tasks

  • Lecture, readings, discussion forum, and small group work
  • Complete one day of the Data Detox Kit
  • Schedule time with Alison to talk about questions and ideas for your small group projects