Editing Main Page/Crash Courses/Systems and Policies/Week five
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | === Week 5: | + | === Week 5: Working with IT to protect privacy, understanding cybersecurity basics === |
− | * Real time lecture: | + | * Real time lecture: June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern on Zoom https://zoom.us/j/9129428892 |
==== Overview ==== | ==== Overview ==== | ||
− | As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. | + | As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard. |
==== Readings ==== | ==== Readings ==== | ||
− | No readings this week | + | No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593 |
+ | |||
+ | ==== Guest lecturer ==== | ||
+ | Becky Yoose, [https://ldhconsultingservices.com/ LDH Consulting Services] | ||
==== Discussion ==== | ==== Discussion ==== | ||
− | + | TBD | |
==== Tasks ==== | ==== Tasks ==== | ||
− | * Lecture,discussion forum, and final project work | + | * Lecture, readings, discussion forum, and final project work |
+ | |||
+ | Working with IT to protect patron privacy, cybersecurity basics | ||
+ | |||
+ | Understanding some of the IT environments possible, talking points for different things people say, things IT people typically bring up | ||
+ | |||
+ | |||
+ | |||
+ | communicating about privacy | ||
+ | https://libraryfreedom.chat/t/lfi-4-week-7-discussion-on-privacy-talking-points/723 | ||
+ | https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points | ||
+ | https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points | ||
+ | |||
+ | also cohort 4 week 7 recording | ||
+ | |||
+ | |||
+ | |||
+ | what is the IT structure at your library | ||
+ | how do you think they’d respond to talking about privacy | ||
+ | whats one thing you could get them to do | ||
+ | |||
+ | |||
+ | The one thing I would hope to learn and be able to implement in my library work is a methodology for convincing others of the importance of privacy, the risks of not considering privacy, and why the librarians are the right people to be educating our patrons about privacy. Ideally, I would like to be able to train my colleagues on how to evaluate the privacy of a tool so they would be able to help the patrons of our library evaluate the privacy of the tools they use and give reliable recommendations for alternatives. |