Editing Main Page/Crash Courses/Systems and Policies/Week five

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 1: Line 1:
=== Week 5: Talking about privacy ===
+
=== Week 5: Working with IT to protect privacy, understanding cybersecurity basics ===
* Real time lecture: March 29th 8:30 Pacific/11:30 Eastern on Zoom https://zoom.us/j/9129428892  
+
* Real time lecture: June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern on Zoom https://zoom.us/j/9129428892  
  
 
==== Overview ====
 
==== Overview ====
As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. But the first step is learning the right kind of language to use to make convincing pro-privacy arguments. Part of making the case for privacy involves putting it in terms that the stakeholder cares about, for example, admin tends to respond well to ideas that fit within strategic planning directives; IT tends to be more in favor of making library infrastructures secure. We'll talk about different strategies that can be effective in convincing different stakeholder groups, helping them understand why privacy is so important, and why libraries are the right places to focus on privacy. We'll also cover common anti-privacy arguments and ways to counter them.  
+
As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard.  
  
 
==== Readings ====
 
==== Readings ====
No readings this week, instead, contribute to this thread: https://libraryfreedom.chat/t/cc-3-talking-points/952
+
No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593
 +
 
 +
==== Guest lecturer ====
 +
Becky Yoose, [https://ldhconsultingservices.com/ LDH Consulting Services]
  
 
==== Discussion ====
 
==== Discussion ====
https://libraryfreedom.chat/t/cc-3-talking-points/952
+
TBD
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture,discussion forum, and final project work
+
* Lecture, readings, discussion forum, and final project work
 +
 
 +
Working with IT to protect patron privacy, cybersecurity basics
 +
 
 +
Understanding some of the IT environments possible, talking points for different things people say, things IT people typically bring up
 +
 
 +
 
 +
 
 +
communicating about privacy
 +
https://libraryfreedom.chat/t/lfi-4-week-7-discussion-on-privacy-talking-points/723
 +
https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points
 +
https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points
 +
 
 +
also cohort 4 week 7 recording
 +
 
 +
 
 +
 
 +
what is the IT structure at your library
 +
how do you think they’d respond to talking about privacy
 +
whats one thing you could get them to do
 +
 
 +
 
 +
The one thing I would hope to learn and be able to implement in my library work is a methodology for convincing others of the importance of privacy, the risks of not considering privacy, and why the librarians are the right people to be educating our patrons about privacy. Ideally, I would like to be able to train my colleagues on how to evaluate the privacy of a tool so they would be able to help the patrons of our library evaluate the privacy of the tools they use and give reliable recommendations for alternatives.

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)