Main Page/Crash Courses/Systems and Policies/Week five

From Library Freedom Wiki Page
Revision as of 14:50, 23 April 2021 by Amacrina2 (talk | contribs)
Jump to navigation Jump to search

Week 5: Working with IT to protect privacy, understanding cybersecurity basics

Overview

As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard.

Readings

No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593

Guest lecturer

Becky Yoose, LDH Consulting Services

Discussion

TBD

Tasks

  • Lecture, readings, discussion forum, and final project work
	Working with IT to protect patron privacy, cybersecurity basics

Understanding some of the IT environments possible, talking points for different things people say, things IT people typically bring up


communicating about privacy https://libraryfreedom.chat/t/lfi-4-week-7-discussion-on-privacy-talking-points/723 https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources#Talking_points

also cohort 4 week 7 recording


what is the IT structure at your library how do you think they’d respond to talking about privacy whats one thing you could get them to do


The one thing I would hope to learn and be able to implement in my library work is a methodology for convincing others of the importance of privacy, the risks of not considering privacy, and why the librarians are the right people to be educating our patrons about privacy. Ideally, I would like to be able to train my colleagues on how to evaluate the privacy of a tool so they would be able to help the patrons of our library evaluate the privacy of the tools they use and give reliable recommendations for alternatives.