Difference between revisions of "Main Page/Crash Courses/Systems and Policies/Week seven"

From Library Freedom Wiki Page
Jump to navigation Jump to search
 
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
=== Week 7: Privacy audits and ongoing privacy practices ===
+
=== Week 7: Cybersecurity basics and public computer environments ===
* Real time lecture: June 17th 9:30 - 11:30 Pacific/12:30 - 2:30 Eastern on Zoom https://zoom.us/j/9129428892  
+
* Real time lecture: April 12th 8:30 - 10:30 Pacific/11:30 - 1:30 Eastern on Zoom https://zoom.us/j/9129428892
  
 
==== Overview ====
 
==== Overview ====
As we try to shift to a privacy-centric culture in our libraries, it's vital that we build relationships with stakeholders like IT and administration to adopt privacy best practices. This week, we'll hear from Becky Yoose, Library Data Privacy Consultant at LDH consulting, on how to leverage relationships to get the support and resources for making privacy happen at your library. Becky will present on this topic, then address questions and experiences from our "working with IT/admin" thread on the messageboard.  
+
Providing access to public computers is one of the most important services that libraries provide. Patrons without internet access or personal computers are unable to access government services, apply for jobs, access information, and keep in touch with family and friends. Security is never absolute, but as librarians, we have a responsibility to provide this access in as secure as manner as possible. This includes ensuring that the part of the online experience that we control (the computer and the local area network) are as secure and protective of privacy as we can make them. This week, we'll learn about the basics of cybersecurity that all library workers should know, and then we'll talk about how to set up our public computer environments in more private and secure ways.  
  
 
==== Readings ====
 
==== Readings ====
No readings this week. Contribute to this thread instead: https://libraryfreedom.chat/t/talking-to-it-and-admin-about-privacy-whats-your-experience/593
+
* Library privacy checklist for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-checklist-for-public-access-computers-and-networks/
 +
* Library privacy guidelines for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-guidelines-for-public-access-computers-and-networks/
 +
* What is free software? https://www.gnu.org/philosophy/free-sw.en.html
 +
* All about malvertising: https://www.malwarebytes.com/malvertising
 +
* How Forbes inadvertently proved the anti-malware value of adblockers https://www.networkworld.com/article/3021113/forbes-malware-ad-blocker-advertisements.html
  
==== Guest lecturer ====
+
==== Optional readings ====
Becky Yoose, [https://ldhconsultingservices.com/ LDH Consulting Services]
+
* Using Linux on library public computers: https://www.libraryjournal.com/?detailStory=linux-privacy-essentials-field-reports#_
 +
* The Tor Browser and Intellectual Freedom in the Digital Age: https://journals.ala.org/index.php/rusq/article/view/5704
 +
* Tor Browser at TPL: https://blog.torproject.org/tor-browser-tpl-defending-intellectual-freedom-and-winning-awards-doing-so
 +
* LibraryVPN project: https://libraryvpn.org/about/
  
 
==== Discussion ====
 
==== Discussion ====
 
TBD
 
TBD
  
==== Tasks ====  
+
==== Tasks ====
 
* Lecture, readings, discussion forum, and final project work
 
* Lecture, readings, discussion forum, and final project work
 
 
Privacy audits of your library, How to make this into a sustainable practice, Assessment tools, What to do year after year, How to stay up to date, its a constantly moving target
 

Latest revision as of 15:00, 31 March 2022

Week 7: Cybersecurity basics and public computer environments[edit]

Overview[edit]

Providing access to public computers is one of the most important services that libraries provide. Patrons without internet access or personal computers are unable to access government services, apply for jobs, access information, and keep in touch with family and friends. Security is never absolute, but as librarians, we have a responsibility to provide this access in as secure as manner as possible. This includes ensuring that the part of the online experience that we control (the computer and the local area network) are as secure and protective of privacy as we can make them. This week, we'll learn about the basics of cybersecurity that all library workers should know, and then we'll talk about how to set up our public computer environments in more private and secure ways.

Readings[edit]

Optional readings[edit]

Discussion[edit]

TBD

Tasks[edit]

  • Lecture, readings, discussion forum, and final project work