Main Page/Crash Courses/Systems and Policies/Week five
Contents
Week 5: Working with IT to protect privacy, understanding cybersecurity basics
- Real time lecture: June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern on Zoom https://zoom.us/j/9129428892
Overview
As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard.
Readings
No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593
Guest lecturer
Becky Yoose, LDH Consulting Services
Discussion
TBD
Tasks
- Lecture, readings, discussion forum, and final project work
Working with IT to protect patron privacy, cybersecurity basics
Understanding some of the IT environments possible, talking points for different things people say, things IT people typically bring up
communicating about privacy https://libraryfreedom.chat/t/lfi-4-week-7-discussion-on-privacy-talking-points/723 https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points
also cohort 4 week 7 recording
what is the IT structure at your library how do you think they’d respond to talking about privacy whats one thing you could get them to do
The one thing I would hope to learn and be able to implement in my library work is a methodology for convincing others of the importance of privacy, the risks of not considering privacy, and why the librarians are the right people to be educating our patrons about privacy. Ideally, I would like to be able to train my colleagues on how to evaluate the privacy of a tool so they would be able to help the patrons of our library evaluate the privacy of the tools they use and give reliable recommendations for alternatives.