Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Privacy is the Future

489 views

Published on

The Library's role as Educator, Defender, and Enforcer

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Privacy is the Future

  1. 1. Privacy is the Future The Library’s Role as Educator, Defender and Enforcer 24 June 2017 ALA Annual 2017
  2. 2. What does he know about tech and libraries?
  3. 3. The Library
  4. 4. The Library
  5. 5. Educate, protect and defend the patron
  6. 6. 7
  7. 7. 8
  8. 8. 9 IV. Libraries should cooperate with all persons and groups concerned with resisting abridgement of free expression and free access to ideas.
  9. 9. When users recognize or fear that their privacy or confidentiality is compromised, true freedom of inquiry no longer exists.
  10. 10. Libraries have automated, digitised, protected and purged
  11. 11. Children’s Internet Protection Act (2002)
  12. 12. USA Patriot Act (2015)
  13. 13. Latent Data Collection
  14. 14. Latent Data Collection
  15. 15. Latent Data Collection
  16. 16. Latent Data Collection
  17. 17. The Data Economy If you are not paying for the product, you are the product…
  18. 18. The Data Economy If you are not paying for it you’re not the customer, the product, you’re the product being sold. -Andrew Lewis (blue_beetle) Daniel’s new corollary: Even if you are paying, unless you read deeply between the lines, you may still be the product!
  19. 19. EXAMPLES! Automobiles Lightbulbs Headphones
  20. 20. Library-purchased systems and services are not mining for data to sell Rather, data can being gathered for the benefit of the patron, at the request and informed consent of the patron, and with the underlying controls and being held by the librarian which can also bring benefit to the library.
  21. 21. 25 Data will always be collected Collection != Privacy Violation Set principles for use & sharing
  22. 22. Consumers are starting to pay attention to privacy 26 P R I V A C Y
  23. 23. Balance 28 Security & Privacy Utility
  24. 24. The perfectly secure computer?
  25. 25. The perfectly secure computer! Turned off. Unplugged from network. Locked in a safe. Accessed by no one.
  26. 26. Clearly that’s not going to work…
  27. 27. 32
  28. 28. 33 Trust (but Verify)
  29. 29. Teach your patrons well…
  30. 30. Fully Private Fully Secure Fully Open Fully Collecting Utility Balance ??? Uninformed What do I pick?
  31. 31. Fully Private Fully Secure Fully Open Fully Collecting Utility Now add in transparency Better informed Still want utility Might make better choices It’s clear what is collected It’s clear what it is used for It’s clear who they share it with It’s clear how long they keep it It’s presented so that average beings can read it quickly and clearly
  32. 32. OMG! I can use w/o sharing everything? I can decide what to share? Fully Private Fully Secure Fully Open Fully Collecting Now add in transparency • It’s clear what is collected • It’s clear what it is used for • It’s clear who they share it with • It’s clear how long they keep it • It’s presented so that average beings can read it quickly and clearly and choice! Utility
  33. 33. Fully Private Fully Secure Fully Open Fully Collecting Finally, add trust (but verify) and accountability I can trust because I’ve verified They do what they say they do More value, more control • Data security practises • Depersonalisation (and even better, aggregation) • Retention (GET RID OF IT FAST!) • Use an identity that user’s care about and protect Utility
  34. 34. 40 US ISP Browsing Data Privacy Rollback
  35. 35. 41 US Net Neutrality Rollback*
  36. 36. 42 RA21.ORG Privacy Preserving Persistent WAYF Pilot Shared WAYF Pilot Universal Resource Access (URA) Pilot
  37. 37. 43 Single Sign OnUser Goes to Site Service Login Redirects to Institution Authenticate with creds Back to Site to Research
  38. 38. Build on the existing trust patrons have in the library
  39. 39. Add privacy as a formal expertise to the “public” library offerings
  40. 40. Bring passion for privacy (and teaching about privacy) to the community
  41. 41. They are still going to go to Google & Facebook because they are EASY
  42. 42. …but when they do, help them make smart decisions about what they share
  43. 43. Buy and use technology that gives patrons
  44. 44. Balance 50 Security & Privacy Utility
  45. 45. 51
  46. 46. 52 Trust (but Verify)
  47. 47. Be there for the patrons at every turn on privacy
  48. 48. Ponder the balance of privacy and utility
  49. 49. Take a look at NISO Patron Privacy Framework http://www.niso.org/topics/tl/patron_privacy/
  50. 50. http://www.proquest.com/products-services/related/ALA-Annual.html

×