Main Page/Final projects
Contents
- 1 Final projects from LFI cohorts
- 1.1 All works are licensed under CC-BY-SA 4.0 International licenses
- 1.1.1 Tracy Treece: Privacy policy template & checklist
- 1.1.2 TJ Lamanna Video on Tor and VPN services
- 1.1.3 Carolyn Bennett Glauda: About LFP/LFI explainer; Quitting Facebook cards
- 1.1.4 Jessica Krill Vendor privacy policy list ; Privacy policy template & checklist
- 1.1.5 Junior Tidal: Privacy Class; Privacy basics flyer
- 1.1.6 Oscar Gittemeier
- 1.1.7 Michele Alaniz: Protecting Student Privacy: What Faculty Need to Know class/workshop
- 1.1.8 Bel Outwater: Privacy in Libraries: Staff Overview
- 1.1.9 Stephanie Milberger: Privacy Basics 101: VPN Guide
- 1.1.10 Ashley J. Brown: SESTA/FOSTA Zine for Librarians
- 1.1.11 Qiana Johnson: Vendor privacy scorecard; Vendor Privacy FAQ
- 1.1.12 Jonathan Hernandez Perez: Poster on Privacy and Censorship
- 1.1.13 Ellie Avis: Welcome to Computers.
- 1.1.14 Grace Riario
- 1.1.15 Megan Shanholtz: Privacy and Security for Public Libraries
- 1.1.16 Nicole Becwar: Vendor privacy scorecard; Vendor Privacy FAQ
- 1.1.17 Wren Kominos-Marvell: Stalkerware Training Resources; Privacy Tools Training;
- 1.1.18 Symphony Bruce: Guide to Protecting Yourself From Online Harassment
- 1.1.19 Jeff Lambert: Census 2020: Safe Secure and Online
- 1.1.20 Chad Clark
- 1.1.21 Andrea Puglisi: Trauma Informed Practice: Interpersonal Communications & Library Services - A Quick Guide
- 1.1.22 Haley Holmes: Privacy basics bookmarks; Privacy Basics Bookmark (purple, front side); Privacy Basics Bookmark (purple, back side); Privacy Basics Bookmark (green, front side); Privacy Basics Bookmark (green, back side)
- 1.1.23 Patricia B. Ball
- 1.1.24 Victor Benitez: Community Toolkit for Privacy and Surveillance
- 1.1.25 Maty Cropley: LFI Private Party Piratebox Privacy Jukebox; Face surveillance flyer, Massachusetts Face surveillance flyer, general
- 1.1.26 Kimberly Trinh-Sy: Facial Recognition Poster & Passive Program
- 1.1.27 Leigh Ann Hamel Protect Yourself From Abuse poster
- 1.1.28 Julia Wiswell: Staff Training Micro Modules
- 1.1.29 Michelle Nitto: Internet Infrastructure Bookmark
- 1.1.30 Kristy Cooper
- 1.1.31 Ariel Hahn and Eva Rios-Alvarado
- 1.1.32 Nicole Weerbrouck
- 1.1.33 Leo Nañez-Bonilla
- 1.1.34 Megan Wong
- 1.1.35 Amy An
- 1.1.36 Marisol Moreno Ortiz
- 1.1.37 Nicole Rambo
- 1.1.38 Danielle Colbert-Lewis
- 1.1.39 Sam Buechler, Chloe Horsma, and Shelley R.
- 1.1.40 Kimberly Springer
- 1.1.41 Anna Winter
- 1.1.42 Chinyere E. Oteh
- 1.1.43 Jodi Jacques
- 1.1.44 Abby Ebach, Michelle Biwer, Camille Peters
- 1.1.45 Chris Strunk
- 1.1.46 Michelle Snyder
- 1.1.47 Frank Skornia
- 1.1 All works are licensed under CC-BY-SA 4.0 International licenses
Final projects from LFI cohorts
All works are licensed under CC-BY-SA 4.0 International licenses
Tracy Treece: Privacy policy template & checklist
This is a template privacy policy that can be adapted to fit your institution, a vendor checklist to utilize when selecting new vendors, renewing contracts, or conducting a privacy audit, and an example of a vendor privacy policy list for Los Angeles Public Library.
TJ Lamanna Video on Tor and VPN services
This is a 10-minute video describing the benefits of using Tor and VPN services. The information provided will help explain both the benefits of Tor and VPNs as well as steps on how to download and set up the services.
Carolyn Bennett Glauda: About LFP/LFI explainer; Quitting Facebook cards
This 2-page flyer is for cohort members past, present, and future to use to reference Library Freedom Project and Library Freedom Institute. Use it to promote our work, do outreach to new cohort members, or help libraries find local privacy advocates and give an explainer on the difference between LFP and LFI.
Jessica Krill Vendor privacy policy list ; Privacy policy template & checklist
This is a template privacy policy that can be adapted to fit your institution, a vendor checklist to utilize when selecting new vendors, renewing contracts, or conducting a privacy audit, and an example of a vendor privacy policy list for Los Angeles Public Library.
Junior Tidal: Privacy Class; Privacy basics flyer
This is a presentation on basic privacy concepts, along with tools to help users to protect their digital information. The intended audience are undergraduate students but could be useful for high school students and/or the general public.
Oscar Gittemeier
Michele Alaniz: Protecting Student Privacy: What Faculty Need to Know class/workshop
This presentation focused on a faculty audience can be broken down into modules and customized based on amount of time available to present and who is the audience. This can also be used for library staff training. It covers privacy and FERPA basics, privacy practices and strategies, data tracking, and tips for creating assignments that are mindful of student privacy.
Bel Outwater: Privacy in Libraries: Staff Overview
This is a training presentation to introduce library staff to the philosophy behind library privacy policies and teach them practical applications.
Stephanie Milberger: Privacy Basics 101: VPN Guide
This a printable primer on VPNs for the general public. Can be used in conjunction with TJ's video.
Ashley J. Brown: SESTA/FOSTA Zine for Librarians
This zine is intended to be an introduction to SESTA-FOSTA and the consequences it’s had on sex workers and online speech.
Qiana Johnson: Vendor privacy scorecard; Vendor Privacy FAQ
Jonathan Hernandez Perez: Poster on Privacy and Censorship
Ellie Avis: Welcome to Computers.
This a four-part class integrating digital literacy training and digital privacy basics. Week one covers computer basics and introduces open source software. Week two covers web browsing, encryption, and passwords. Week three covers email, phishing, and avoiding malware. Week four is focused on online learning and is a chance to reinforce the concepts presented in previous sessions.
Grace Riario
Megan Shanholtz: Privacy and Security for Public Libraries
This is a presentation on privacy and security aimed towards librarians. It contains live links, with the thought that it can be shared online afterwards as a more extensive resource.
Nicole Becwar: Vendor privacy scorecard; Vendor Privacy FAQ
In 2015, NISO brought together library staff, publishers, and software providers to create, “Consensus Principles on User’s Digital Privacy in Library, Publisher, and Software-Provider Systems” in an attempt to find common ground for library patron privacy. Based on the principles identified in the white paper, we analyzed 12 vendor privacy policies, including ProQuest, Elsevier, EBSCO, OCLC, Ex Libris, and JSTOR, vendors who were part of the core working group for the NISO white paper, to create the vendor privacy scorecard. The policies were graded against a common rubric and practices were denoted as being good privacy practices, areas of concern, or privacy practices that were incompatible with library privacy values.
Wren Kominos-Marvell: Stalkerware Training Resources; Privacy Tools Training;
A training for DV shelter staff to improve knowledge of stalkerware. Accompanied by a flyer for encouraging clients to come forward with their concerns.
&
A privacy tools training for public library staff. There is a recording of the training and a powerpoint presentation. There is a flyer included for displaying at the public computers. Public outreach was done via a local public radio program. The recording of that show is included in two different filetypes.
Symphony Bruce: Guide to Protecting Yourself From Online Harassment
This zine, written with college students in mind, provides a guide to identifying and dealing with online harassment. To print the zine, first download it and open with a .pdf viewer (Adobe works great). Print back-back. Do not switch to booklet printing. Once printed, fold in half, staple in the middle, and keep or distribute to friends and family.
Jeff Lambert: Census 2020: Safe Secure and Online
A 60-minute training for library patrons about potential privacy threats and concerns with the 2020 Census, along with protections being put in place by the Census Bureau and libraries for a secure self-response.
Chad Clark
Andrea Puglisi: Trauma Informed Practice: Interpersonal Communications & Library Services - A Quick Guide
This is a practical interpersonal communications guide that provides a grounding on recognizing trauma; responding to trauma; and, how to adopt language that does not cause or result in further individual harm. Authored by Andrea Puglisi, MLS with consultation by Hilary Houldsworth, LMSW *Please note: I updated this since I originally posted this on our Wiki. If you have downloaded this document on 11/25 or before, please download again*
Haley Holmes: Privacy basics bookmarks; Privacy Basics Bookmark (purple, front side); Privacy Basics Bookmark (purple, back side); Privacy Basics Bookmark (green, front side); Privacy Basics Bookmark (green, back side)
These privacy basics bookmarks are available for libraries to print for patron use and contain information for those unfamiliar with privacy concepts including recommended tools.
Patricia B. Ball
Victor Benitez: Community Toolkit for Privacy and Surveillance
Maty Cropley: LFI Private Party Piratebox Privacy Jukebox; Face surveillance flyer, Massachusetts Face surveillance flyer, general
LFI Private Party Piratebox Privacy Jukebox (make party, privately in private or in public)
A Piratebox stocked with a librarian-crowdsourced privacy-themed music playlist. Email me to borrow one for three weeks for your library program, block party or barricade assault: <[email protected]>
Trailer: https://vimeo.com/371307453
Website: https://36thoutreachchamber.hotglue.me/
Guide: https://drive.google.com/file/d/1NSsYQ1VqnqeqJmAbcmtuVRwJv2yQo7PU/view
"PirateBox is free (as in freedom) because it is registered under the GNU GPLv3. This license grants you the right to freely copy, distribute, and transform creative works according to the principles of copyleft." from https://piratebox.cc
Kimberly Trinh-Sy: Facial Recognition Poster & Passive Program
This is a poster that can be used in coordination with a book display and/or passive program. An accompanying passive program might include a collection of props (hats, sunglasses, masks, etc.) that could be worn to potentially confuse facial recognition technology. Library patrons would be encouraged to try on a variety of props, then photograph themselves to see if their phone's photo or social media apps can identify them. Of course, patrons are encouraged to delete photos immediately afterward, in order to protect their privacy!
Leigh Ann Hamel Protect Yourself From Abuse poster
This is a poster meant to help at risk people recognise some signs of abuse and social engineering, as well as pratical tips for keeping their information safe in a digital world.
Julia Wiswell: Staff Training Micro Modules
These staff training micro modules are designed to be dropped into existing staff meetings to refresh or introduce privacy topics.
Michelle Nitto: Internet Infrastructure Bookmark
The bookmark on the physicality and history of the internet can also be provided in the workshops to give attendees a fuller understanding of the types of components and extractive processes involved in making the internet function. This bookmark can also be made available to students and the general population at a university in public computer areas inside libraries, or computer labs.
Kristy Cooper
Sex worker interview notes; Sex worker privacy and privilege (initial thoughts to be turned into a longer article and/or integrated into my Stripper Librarian book)