Editing Main Page/Crash Courses/Systems and Policies/Week six:

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
Providing access to public computers is one of the most important services that libraries provide. Patrons without internet access or personal computers are unable to access government services, apply for jobs, access information, and keep in touch with family and friends. Security is never absolute, but as librarians, we have a responsibility to provide this access in as secure as manner as possible. This includes ensuring that the part of the online experience that we control (the computer and the local area network) are as secure and protective of privacy as we can make them. This week, we'll learn about the basics of cybersecurity that all library workers should know, and then we'll talk about how to set up our public computer environments in more private and secure ways.
+
 
  
 
==== Readings ====
 
==== Readings ====
* Library privacy checklist for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-checklist-for-public-access-computers-and-networks/
 
* Library privacy guidelines for public access computers and networks: https://chooseprivacyeveryday.org/resources/guidelines-checklists-for-libraries/library-privacy-guidelines-for-public-access-computers-and-networks/
 
* What is free software? https://www.gnu.org/philosophy/free-sw.en.html
 
* All about malvertising: https://www.malwarebytes.com/malvertising
 
* How Forbes inadvertently proved the anti-malware value of adblockers https://www.networkworld.com/article/3021113/forbes-malware-ad-blocker-advertisements.html
 
  
==== Optional readings ====
 
* Using Linux on library public computers: https://www.libraryjournal.com/?detailStory=linux-privacy-essentials-field-reports#_
 
* The Tor Browser and Intellectual Freedom in the Digital Age: https://journals.ala.org/index.php/rusq/article/view/5704
 
* Tor Browser at TPL: https://blog.torproject.org/tor-browser-tpl-defending-intellectual-freedom-and-winning-awards-doing-so
 
* LibraryVPN project: https://libraryvpn.org/about/
 
 
==== Discussion ====
 
==== Discussion ====
TBD
+
*
  
 
==== Tasks ====
 
==== Tasks ====
 
* Lecture, readings, discussion forum, and final project work
 
* Lecture, readings, discussion forum, and final project work
 +
 +
 +
Week six
 +
Public computer environments/tech 101
 +
How do deal with CIPA and similar requirements, how to communicate about this stuff to patrons
 +
 +
chuck lecture from whenever that was
 +
focus more on what can go on the computers
 +
what the environments are typically like -- image software, deepfreeze etc
 +
tracy lecture
 +
free software
 +
readings about software

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)