Editing Main Page/Crash Courses/Systems and Policies/Week seven

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 1: Line 1:
=== Week 7: Cybersecurity basics and public computer environments ===
+
=== Week 7: Privacy audits and ongoing privacy practices ===
* Real time lecture: April 12th 8:30 - 10:30 Pacific/11:30 - 1:30 Eastern on Zoom https://zoom.us/j/9129428892
+
* Real time lecture: June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern on Zoom https://zoom.us/j/9129428892  
  
 
==== Overview ====
 
==== Overview ====
Providing access to public computers is one of the most important services that libraries provide. Patrons without internet access or personal computers are unable to access government services, apply for jobs, access information, and keep in touch with family and friends. Security is never absolute, but as librarians, we have a responsibility to provide this access in as secure as manner as possible. This includes ensuring that the part of the online experience that we control (the computer and the local area network) are as secure and protective of privacy as we can make them. This week, we'll learn about the basics of cybersecurity that all library workers should know, and then we'll talk about how to set up our public computer environments in more private and secure ways.  
+
As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard.  
  
 
==== Readings ====
 
==== Readings ====
* Library privacy checklist for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-checklist-for-public-access-computers-and-networks/
+
No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593
* Library privacy guidelines for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-guidelines-for-public-access-computers-and-networks/
 
* What is free software? https://www.gnu.org/philosophy/free-sw.en.html
 
* All about malvertising: https://www.malwarebytes.com/malvertising
 
* How Forbes inadvertently proved the anti-malware value of adblockers https://www.networkworld.com/article/3021113/forbes-malware-ad-blocker-advertisements.html
 
  
==== Optional readings ====
+
==== Guest lecturer ====
* Using Linux on library public computers: https://www.libraryjournal.com/?detailStory=linux-privacy-essentials-field-reports#_
+
Becky Yoose, [https://ldhconsultingservices.com/ LDH Consulting Services]
* The Tor Browser and Intellectual Freedom in the Digital Age: https://journals.ala.org/index.php/rusq/article/view/5704
 
* Tor Browser at TPL: https://blog.torproject.org/tor-browser-tpl-defending-intellectual-freedom-and-winning-awards-doing-so
 
* LibraryVPN project: https://libraryvpn.org/about/
 
  
 
==== Discussion ====
 
==== Discussion ====
 
TBD
 
TBD
  
==== Tasks ====
+
==== Tasks ====  
 
* Lecture, readings, discussion forum, and final project work
 
* Lecture, readings, discussion forum, and final project work
 +
 +
 +
Privacy audits of your library, How to make this into a sustainable practice, Assessment tools, What to do year after year, How to stay up to date, its a constantly moving target

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)