SlideShare a Scribd company logo
1 of 1
Download to read offline
Privacy Audits in the Law Library
What is a privacy audit?
 Review existing privacy policies
 Evaluate practices to ensure compliance
with goals/policies
 Protect from liability
Federal Laws
 1st Amendment: right to not have the subject of your interest scruti-
nized
 Video Privacy Protection Act: video borrowing data protected
 Freedom of Information Act: certain libraries may have to disclose
certain information
 Family Educational Rights and Privacy Act (FERPA)
State Laws
 Privacy: look for statutes governing privacy of business records
 Library privacy: most states have statutes (2 have AG Opinions)
 Records retention/destruction: timeframe for retention/destruction
may be set by statute for certain data in certain libraries
 Open records: libraries receiving public funds may have to disclose
certain information
Definitions:
Privacy: the right to open inquiry without having the
subject of one’s interest examined or scrutinized by others. (ALA)
Confidentiality: exists when a library is in possession of personally
identifiable information about users and keeps that information private
on their behalf. (ALA)
Personally Identifiable Information (PII): Information that alone or in
conjunction with other data points can identify a specific individual. See
diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it
needs to be collected, and how long it should be retained
Areas to audit
 Circulation data (what is collected?, who can see data on screen?,
what happens to inadvertent prints?, how are histories managed?)
 Payments received (do you keep copies of checks/credit card
receipts?)
 Reference logs (keep general statistics but nothing that identifies an
individual)
 Public computer settings and logs (level of tracking, filter settings)
 Holds (cover names if shown on materials)
 Fines & notices (paper records should be secured if retained)
Components of a good privacy policy
 Notice of rights and applicable laws: definitions and standards set
 Choice and consent: opt-in for contact not related to library activities
 Access and updating: provide users access to own data
 Data integrity and security: state what is retained and for how long
 Data aggregation: PII not included, aggregate data may be disclosed
 Required disclosures: law enforcement compliance
Initial Considerations/Questions
 What laws apply in your state?
 Does your library have an existing privacy policy?
 Who is/will be responsible for the policies?
 Will the policies apply to one library or several across an institution?
Audit—Step 2: Categorize the data based on degree of security needed
Sample categories
 Public: can be disclosed freely
 Confidential: may be subject to disclosure under open records laws
 Sensitive: includes PII , cannot be disclosed by law, policy, or
contractual obligation
Audit—Step 4: Train staff & test your security measures
 Engage staff during audit process to gain buy-in
 Student workers may handle some privacy-related requests, so
include privacy issues in their initial training and provide refresher
training periodically to keep knowledge fresh.
 Use scenarios to develop a deeper understanding of the reasoning
behind a policy.
 Spend time observing interactions at the reference and circulation
desks to ensure that practice matches goals/policies.
Audit—Step 3: Assess sensitivity, security risks, and public percep-
tions of collected information
 Assure that access is restricted to staff who need the information.
 Only collect what is reasonably necessary to library functions.
 Assess how information is stored and ensure security
 Identify staff members responsible for ongoing data privacy/audits
Audit—Step 5: Destroy data at correct time in the correct manner
 Check for statutes governing time of retention/destruction (even if
they apply to different types of data/organizations they can be
valuable as guidelines).
 Check for statutes governing manner of destruction (GA options are
erase, shred, redact).
 Don’t retain things indefinitely because you don’t know what to do
with them. Examine the process and determine why you’re keeping
something in order to determine how long you reasonably need to
keep it.
Resources
Audit Checklist
Rachel Gordon For a copy of this poster:
Mercer University School of Law
Macon, Georgia
gordon_r@law.mercer.edu
ALA Materials
 Privacy: An Interpretation of the Library Bill of Rights:
www.ala.org/Template.cfm?
Section=interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=34182
 Questions & Answers on Privacy and Confidentiality:
www.ala.org/Template.cfm?
Section=Interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=15347
 Policy Concerning Confidentiality of Personally Identifiable
Information About Library Users: www.ala.org/Template.cfm?
Section=otherpolicies&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=13087
 Privacy Tool Kit: www.ala.org/advocacy/
privacyconfidentiality/toolkitsprivacy/privacy
 Office for Intellectual Freedom, State Privacy Laws:
www.ala.org/offices/oif/ifgroups/stateifcchairs/
stateifcinaction/stateprivacy
Books and Articles
 THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR
LIBRARIES AND THEIR LAWYERS (2009). Very detailed information
on how to handle various types of law enforcement requests.
 PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND
INFORMATION PROFESSIONALS (2008). Explains privacy-related
causes of action in tort.
 Anne Klinefelter, First Amendment Limits on Library Collection
Management, 102 L. LIBRARY J. 343 (Summer, 2010).
 Anne Klinefelter, Privacy and Library Public Services: Or, I
Know What You Read Last Summer, 26 LEGAL REFERENCE SER-
VICES Q. 253 (2007).
 Ann Mackay Snowman, Privacy and Confidentiality: Using
Scenarios to Teach Your Staff about Patron’s Rights, 10 J.
ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to
reinforce staff training on patron privacy.
 Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477
(2006). Good overview of privacy law.
Selected Library Privacy Policies
 library.law.unc.edu/about/policies/privacy
 www.lib.wayne.edu/info/policies/privacy.php
 briefs.lalawlibrary.org/about/privacy.aspx
1. When do we collect information? (Identify the process)
2. What information is being collected?
o Name
o Mailing Address
o Email Address
o Phone/Fax Number
o ID Number (Student ID, Driver’s License, or Bar Number)
o Age/DOB
o Ethnicity
o Marital Status
o Gender
o Medical Information
o Mother’s Maiden Name
o Spouse Information
o Financial Information
o Educational Information
o IP Address
o Signature
3. Why is the information being collected?
4. Who is collecting this information?
5. Who else uses or has access to the information?
6. How is this information being kept, and for how long?
7. Where is this information being kept?
8. How is the information being used?
9. How is the information secured?
10. How and when is the information destroyed?

More Related Content

What's hot

What's hot (7)

Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
 
Next generation data services at the Marriott Library
Next generation data services at the Marriott LibraryNext generation data services at the Marriott Library
Next generation data services at the Marriott Library
 
Data management federal requirements 9 2015
Data management federal requirements 9 2015Data management federal requirements 9 2015
Data management federal requirements 9 2015
 
Data Management - Lynn Woolfrey
Data Management - Lynn WoolfreyData Management - Lynn Woolfrey
Data Management - Lynn Woolfrey
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Case studyworkshoponprovenance
Case studyworkshoponprovenanceCase studyworkshoponprovenance
Case studyworkshoponprovenance
 

Viewers also liked

Rapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentRapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentNHS Improvement
 
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Fernando Farias
 
Turismo Parroquia Purunuma
Turismo Parroquia PurunumaTurismo Parroquia Purunuma
Turismo Parroquia PurunumaCastilloeli
 
Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16IfimBSchool
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correçãoAlexandre Ribeiro
 
Wild Dog Design - Websites
Wild Dog Design - WebsitesWild Dog Design - Websites
Wild Dog Design - Websiteswilddogdesign
 
eCommerce homepage pop-up
eCommerce homepage pop-upeCommerce homepage pop-up
eCommerce homepage pop-upMineWhat
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015MAYANK SHARMA
 
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...HAGELE kantoormeubilair
 
Enjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DEEnjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DELaguna Poreč
 
Eyetouch
Eyetouch Eyetouch
Eyetouch glide93
 
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Beniamino Murgante
 
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT SPA - SYS-DAT Group
 

Viewers also liked (20)

Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015
 
Conferencia d anido_abril2010_def
Conferencia d anido_abril2010_defConferencia d anido_abril2010_def
Conferencia d anido_abril2010_def
 
M&d formazione la metafora del ristorante ita eng
M&d formazione   la metafora del ristorante ita engM&d formazione   la metafora del ristorante ita eng
M&d formazione la metafora del ristorante ita eng
 
Rapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentRapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatment
 
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
 
Turismo Parroquia Purunuma
Turismo Parroquia PurunumaTurismo Parroquia Purunuma
Turismo Parroquia Purunuma
 
Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correção
 
Wild Dog Design - Websites
Wild Dog Design - WebsitesWild Dog Design - Websites
Wild Dog Design - Websites
 
eCommerce homepage pop-up
eCommerce homepage pop-upeCommerce homepage pop-up
eCommerce homepage pop-up
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015
 
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
 
Paseo en velero
Paseo en veleroPaseo en velero
Paseo en velero
 
Mundo Plano 2
Mundo Plano 2Mundo Plano 2
Mundo Plano 2
 
Enjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DEEnjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DE
 
Eyetouch
Eyetouch Eyetouch
Eyetouch
 
Soporteusuario
SoporteusuarioSoporteusuario
Soporteusuario
 
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
 
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de español
 

Similar to Privacy Audits in Law Libraries

ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Saide OER Africa
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive dataARDC
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfAsefaAdimasu2
 
Data Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesData Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesIUPUI
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!Renaine Julian
 
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxPR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxChristopherMaldicas
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Project
 
Data Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsData Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsIUPUI
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementKathryn Houk
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsfBrad Houston
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdfAmirKhan811717
 

Similar to Privacy Audits in Law Libraries (20)

Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
 
Levine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal ConsiderationsLevine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal Considerations
 
Niso library law
Niso library lawNiso library law
Niso library law
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Data Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesData Management Lab: Session 4 Slides
Data Management Lab: Session 4 Slides
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
 
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxPR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Data Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsData Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructions
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Research data life cycle
Research data life cycleResearch data life cycle
Research data life cycle
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
RDM: a briefing for Health Sciences
RDM: a briefing for Health SciencesRDM: a briefing for Health Sciences
RDM: a briefing for Health Sciences
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Privacy Audits in Law Libraries

  • 1. Privacy Audits in the Law Library What is a privacy audit?  Review existing privacy policies  Evaluate practices to ensure compliance with goals/policies  Protect from liability Federal Laws  1st Amendment: right to not have the subject of your interest scruti- nized  Video Privacy Protection Act: video borrowing data protected  Freedom of Information Act: certain libraries may have to disclose certain information  Family Educational Rights and Privacy Act (FERPA) State Laws  Privacy: look for statutes governing privacy of business records  Library privacy: most states have statutes (2 have AG Opinions)  Records retention/destruction: timeframe for retention/destruction may be set by statute for certain data in certain libraries  Open records: libraries receiving public funds may have to disclose certain information Definitions: Privacy: the right to open inquiry without having the subject of one’s interest examined or scrutinized by others. (ALA) Confidentiality: exists when a library is in possession of personally identifiable information about users and keeps that information private on their behalf. (ALA) Personally Identifiable Information (PII): Information that alone or in conjunction with other data points can identify a specific individual. See diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it needs to be collected, and how long it should be retained Areas to audit  Circulation data (what is collected?, who can see data on screen?, what happens to inadvertent prints?, how are histories managed?)  Payments received (do you keep copies of checks/credit card receipts?)  Reference logs (keep general statistics but nothing that identifies an individual)  Public computer settings and logs (level of tracking, filter settings)  Holds (cover names if shown on materials)  Fines & notices (paper records should be secured if retained) Components of a good privacy policy  Notice of rights and applicable laws: definitions and standards set  Choice and consent: opt-in for contact not related to library activities  Access and updating: provide users access to own data  Data integrity and security: state what is retained and for how long  Data aggregation: PII not included, aggregate data may be disclosed  Required disclosures: law enforcement compliance Initial Considerations/Questions  What laws apply in your state?  Does your library have an existing privacy policy?  Who is/will be responsible for the policies?  Will the policies apply to one library or several across an institution? Audit—Step 2: Categorize the data based on degree of security needed Sample categories  Public: can be disclosed freely  Confidential: may be subject to disclosure under open records laws  Sensitive: includes PII , cannot be disclosed by law, policy, or contractual obligation Audit—Step 4: Train staff & test your security measures  Engage staff during audit process to gain buy-in  Student workers may handle some privacy-related requests, so include privacy issues in their initial training and provide refresher training periodically to keep knowledge fresh.  Use scenarios to develop a deeper understanding of the reasoning behind a policy.  Spend time observing interactions at the reference and circulation desks to ensure that practice matches goals/policies. Audit—Step 3: Assess sensitivity, security risks, and public percep- tions of collected information  Assure that access is restricted to staff who need the information.  Only collect what is reasonably necessary to library functions.  Assess how information is stored and ensure security  Identify staff members responsible for ongoing data privacy/audits Audit—Step 5: Destroy data at correct time in the correct manner  Check for statutes governing time of retention/destruction (even if they apply to different types of data/organizations they can be valuable as guidelines).  Check for statutes governing manner of destruction (GA options are erase, shred, redact).  Don’t retain things indefinitely because you don’t know what to do with them. Examine the process and determine why you’re keeping something in order to determine how long you reasonably need to keep it. Resources Audit Checklist Rachel Gordon For a copy of this poster: Mercer University School of Law Macon, Georgia gordon_r@law.mercer.edu ALA Materials  Privacy: An Interpretation of the Library Bill of Rights: www.ala.org/Template.cfm? Section=interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=34182  Questions & Answers on Privacy and Confidentiality: www.ala.org/Template.cfm? Section=Interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=15347  Policy Concerning Confidentiality of Personally Identifiable Information About Library Users: www.ala.org/Template.cfm? Section=otherpolicies&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=13087  Privacy Tool Kit: www.ala.org/advocacy/ privacyconfidentiality/toolkitsprivacy/privacy  Office for Intellectual Freedom, State Privacy Laws: www.ala.org/offices/oif/ifgroups/stateifcchairs/ stateifcinaction/stateprivacy Books and Articles  THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR LIBRARIES AND THEIR LAWYERS (2009). Very detailed information on how to handle various types of law enforcement requests.  PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND INFORMATION PROFESSIONALS (2008). Explains privacy-related causes of action in tort.  Anne Klinefelter, First Amendment Limits on Library Collection Management, 102 L. LIBRARY J. 343 (Summer, 2010).  Anne Klinefelter, Privacy and Library Public Services: Or, I Know What You Read Last Summer, 26 LEGAL REFERENCE SER- VICES Q. 253 (2007).  Ann Mackay Snowman, Privacy and Confidentiality: Using Scenarios to Teach Your Staff about Patron’s Rights, 10 J. ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to reinforce staff training on patron privacy.  Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477 (2006). Good overview of privacy law. Selected Library Privacy Policies  library.law.unc.edu/about/policies/privacy  www.lib.wayne.edu/info/policies/privacy.php  briefs.lalawlibrary.org/about/privacy.aspx 1. When do we collect information? (Identify the process) 2. What information is being collected? o Name o Mailing Address o Email Address o Phone/Fax Number o ID Number (Student ID, Driver’s License, or Bar Number) o Age/DOB o Ethnicity o Marital Status o Gender o Medical Information o Mother’s Maiden Name o Spouse Information o Financial Information o Educational Information o IP Address o Signature 3. Why is the information being collected? 4. Who is collecting this information? 5. Who else uses or has access to the information? 6. How is this information being kept, and for how long? 7. Where is this information being kept? 8. How is the information being used? 9. How is the information secured? 10. How and when is the information destroyed?