Provides an overview of what is cloud computing and its role in library networking and automation. It presents the legal and ethical issues facing library and information specialists when using cloud computing including confidentiality, privacy and licensing.
This presentation identifies and discusses certain ethical rules and opinions that apply to an Arizona lawyer's use of cloud computing in his or her practice. The concepts are generally applicable to lawyers in many other states as well.
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
This presentation identifies and discusses certain ethical rules and opinions that apply to an Arizona lawyer's use of cloud computing in his or her practice. The concepts are generally applicable to lawyers in many other states as well.
This ppt define the basic concepts of mobile computing. It is the first part of mobile computing.
It defines the following terms
Introduction to mobile computing
Generations of mobile computing
Cellular concepts
Signalling, modulation and Demodulation
Spread Spectrum
Frequency Reuse
Multiple access schemes
GSM
GPRS
CDMA
This presentation will highlight the key legal issues associated with cloud computing and some implementation methods for minimizing or mitigating those risks.
There are numerous legal issues in cloud computing like operational, legislative or regulatory, security, third party contractual limitations, risk allocation or mitigation, and jurisdictional issues. Security, privacy and confidentiality remain the biggest concern for the data owner, as when the data is stored on the cloud the same might be accessible to multiple users. There is concern for its safety and protection of valuable data and trade secrets. Then there are intellectual property issues regarding ownership of and rights in information and services placed in the cloud.
Cloud computing :
Accessibility: Cloud computing facilitates the access of applications and data from any location worldwide and from any device with an internet connection.
Cost savings: Cloud computing offers businesses scalable computing resources hence saving them on the cost of acquiring and maintaining them.
Security: Cloud providers especially those offering private cloud services, have strived to implement the best security standards and procedures in order to protect client’s data saved in the cloud.
Disaster recovery: Cloud computing offers the most efficient means for small, medium, and even large enterprises to backup and restore their data and applications in a fast and reliable way.
Cloud computing
Definition of Cloud Computing
History and origins of Cloud Computing
Cloud Computing services and model
cloud service engineering life cycle
TEST AND DEVELOPMENT PLATFORM
Cloud migration
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
This presentation will highlight the key legal issues associated with cloud computing and some implementation methods for minimizing or mitigating those risks.
There are numerous legal issues in cloud computing like operational, legislative or regulatory, security, third party contractual limitations, risk allocation or mitigation, and jurisdictional issues. Security, privacy and confidentiality remain the biggest concern for the data owner, as when the data is stored on the cloud the same might be accessible to multiple users. There is concern for its safety and protection of valuable data and trade secrets. Then there are intellectual property issues regarding ownership of and rights in information and services placed in the cloud.
Cloud computing :
Accessibility: Cloud computing facilitates the access of applications and data from any location worldwide and from any device with an internet connection.
Cost savings: Cloud computing offers businesses scalable computing resources hence saving them on the cost of acquiring and maintaining them.
Security: Cloud providers especially those offering private cloud services, have strived to implement the best security standards and procedures in order to protect client’s data saved in the cloud.
Disaster recovery: Cloud computing offers the most efficient means for small, medium, and even large enterprises to backup and restore their data and applications in a fast and reliable way.
Cloud computing
Definition of Cloud Computing
History and origins of Cloud Computing
Cloud Computing services and model
cloud service engineering life cycle
TEST AND DEVELOPMENT PLATFORM
Cloud migration
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Brian Miller, Solicitor
Brian Miller and Jean Boyle, solicitors at Stone King take you through the legal implication of using social media and how to ensure your staff are aware of the consequences of using it in your organisation.
legal issues in cloud computing,cloud computing and law,cyberlaw and cloud computing in india,prashant mali,cloud computing issues,cloud computing security
AWS re:Invent 2016: High Performance Computing on AWS (CMP207)Amazon Web Services
High performance computing in the cloud is enabling high scale compute- and graphics-intensive workloads across industries, ranging from aerospace, automotive, and manufacturing to life sciences, financial services, and energy. AWS provides application developers and end users with unprecedented computational power for massively parallel applications, in areas such as large-scale fluid and materials simulations, 3D content rendering, financial computing, and deep learning. This session provides an overview of HPC capabilities on AWS, describes the newest generations of accelerated computing instances (including P2), as well as highlighting customer and partner use-cases across industries.
Attendees learn about best practices for running HPC workflows in the cloud, including graphical pre- and post-processing, workflow automation, and optimization. Attendees also learn about new and emerging HPC use cases: in particular, deep learning training and inference, large-scale simulations, and high performance data analytics.
Amazon Web Services (AWS) provides on-demand computing resources and services in the cloud, with pay-as-you-go pricing. This session provides an overview and describes how using AWS resources instead of your own is like purchasing electricity from a power company instead of running your own generator. Using AWS resources provides many of the same benefits as a public utility: Capacity exactly matches your need, you pay only for what you use, economies of scale result in lower costs, and the service is provided by a vendor experienced in running large-scale networks. A high-level overview of AWS infrastructure (such as AWS Regions and Availability Zones) and AWS services is provided as part of this session.
Speaker: Tom Whateley, Solutions Architect and Stephanie Zieno, Account Manager, Amazon Web Services
Bessemer Venture Partners has backed over 100 Cloud Computing companies, including over 1/4 of all cloud IPOs and 4 of 7 cloud IPOs last year alone. Byron Deeter leads BVP's cloud computing practice and recently presented an entirely updated version of BVP's famous 10 Laws at the SaaStr 2016 conference. For more BVP presentations, white papers, and content you can visit www.bvp.com/cloud
North Bridge and Wikibon, announced the results of its sixth annual Future of Cloud Computing Survey, which analyzes trends in cloud computing, adoption, use and challenges on a yearly basis. The study provides the broadest and deepest exploration of cloud in the industry with 53 leading cloud companies participating as collaborators. This year’s survey received 1,351 responses, a record-breaking number, representing a 60/40 balance of user/vendor perspectives spanning senior executives to practitioners across all industry sectors such as Technology, F.I.R.E., Government, Healthcare, Manufacturing, Media, Professional Services and Transportation.
According to Wikibon’s July 2016 report based on market conditions and recent public cloud revenue results of Amazon, Microsoft, Oracle, SAP, and IBM; public cloud spending is expected to accelerate rapidly, growing from $75B in 2015 to $522B by 2026 at a compound annual growth rate of 19%. Within each public cloud segment continued rapid growth rates are also expected during this period: SaaS (19% CAGR), PaaS (33% CAGR), and IaaS (18% CAGR). Wikibon estimates that by 2026, cloud will account for nearly 50% of spending related to enterprise hardware, software, and outsourcing services.
Cloud Strategy
Based on our survey, while slightly less than 50% of all companies either have a cloud first or cloud only strategy; some form of cloud strategy is pervasive among all with 90% of companies surveyed reporting that they use it in some way.
A new finding this year is the fact that a surprisingly high number, 42%, of companies surveyed derive 50% or more of their business through cloud-based applications. In fact, a whopping 79.9% of the companies surveyed were getting some revenue from the cloud. This speaks to the digital transformation occurring across many industries and how many are looking to not only move more quickly with the cloud but profit from it as well.
Read more: http://www.northbridge.com/2016-future-cloud-computing-survey
cloud computing is a growing field in computer science. This ppt can help the beginners understand it. contains information about PaaS, Iaas, SaaS and other concepts of Cloud Computing.It also contains a video on cloud computing.
Use of cloud computing technology as an application in librariesDr. Mohd Asif Khan
Cloud computing Technology changing rapidly and is forming a layer that is touching each and every aspect of life like power grids, traffic control, medical and health care, water supply, food and energy library science is not exception to it. Information technology impacted positively on library and information system and services they provide for users. The libraries have been automated, networked and now moving towards manual libraries to paper less or virtual libraries. To gather challenges in the profession librarians are also applying different platforms in Library science filed for attaining economy in information handling. This paper overviews the basic concept of newly develop area known as cloud computing. The use of cloud computing in libraries and how cloud computing actually works is illustrated in this communication.
In computing, It is the description about Grid Computing.
It gives deep idea about grid, what is grid computing? , why we need it? , why it is so ? etc. History and Architecture of grid computing is also there. Advantages , disadvantages and conclusion is also included.
Privacy preserving public auditing for secured cloud storagedbpublications
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
Securing Apps & Data in the Cloud by Spyders & NetskopeAhmad Abdalla
Securing Apps & Data in the Cloud Presented by Spyders & Netskope - a discussion of shadow IT and the emergence of Cloud Access Security Brokers (CASBs) like Netskope, Spyders latest technology partner, have emerged to help solve the issue of shadow IT. Cloud Access Security Brokers were listed as the #1 technology in the Gartner 2014 Top 10 Technologies for Information Security. If your wondering about what cloud access security brokers are, Gartner defines CASBs as “on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. Essentially, CASBs consolidate multiple types of security policy enforcement.”
As organizations embrace cloud applications, new risks and complexities have arisen. Staying on top of the ever-changing policy, legal and tech landscapes is daunting and gives rise to complex legal and business challenges.
Privacy and security expert, Lisa Abe-Oldenburg, and Pranav Shah, a CIO advocate and security specialist, go over latest considerations facing Canadian organizations transitioning to cloud-based apps.
Lisa provides insight and guidance from a legal perspective, and Pranav addresses the business challenges related to architecture, technology, and human capital. Participants also gain insight into how organizations are successfully leveraging one of Gartner's newest categories, Cloud Access Security Brokers (CASB), as an integral component of their secure, SaaS business and security strategies.
Visit http://www.spyders.ca to learn more about Netskope and Cloud Access Security Brokers.
Universal health coverage Morocco conference 2020e-Marefa
This presentation is made as part of theme "Health" at the The International Conference on Advanced Intelligent Systems for Sustainable Development applied to Agriculture, Energy, Health, Environment, Industry, Education, Economy and Security (http://ai2sd.com/)
This presentation was made during the launch of Arcif annual Impact Factor report for 2020. The statistics shows the progress in terms of numbers of articles, journals, authors, citations. countries in e-Marefa database..
e-Marefa Islamic econmics and finance data banke-Marefa
This presentation was made at the World Islamic Banking Conference held in Manama, Bahrain 5-7 December 2017 as part of the conference proceedings and the launch of the e-Marefa Data Bank on Islamic Economics and Finance
المؤتمر الرابع عشر للمكتبيين الاردنيين: صناعة المعلومات: تحديات الحاضر و المس...e-Marefa
هذه ورقة فنية بعنوان ادارة حقوق الملكية الفكرية في البيئة الاكترونية.
This is a technical paper presented at the 14th JLIA Conference on information industry. It address the intellectual property and copyright issues in the digital and electronic publishing.
A keynote address made at the 2013 Transnational Summit of Trustworthy use of Data for Health. It was a provocative speech as it compare the abuse of health data with the abuse of natural resources extracted from countries through manipulation of people without giving them back any of the benefits of the resources they give. Big data in health, unethical use of data and the need for better regulations and ethical principles.
The changing role of libraries in the knowledge-based economy and sustainable...e-Marefa
This keynote address was made at the second international conference of the Lebanese Library Association in Beirut under the title of Thinking together: innovate, share, preserve and access.
Early diagnosis and prevention enabled by big data geneva conference finale-Marefa
The presentation provides an overview of how digital health or use of data processing and telecommunication infrastructure can contribute to the early diagnosis and prevention of diseases.
This is the last keynote address I made at the International Medical Informatics Conference (MEDINFO).The speech presented the areas in which eHealth can contributed to health and well-being, the emerging trend of using big data in health and examples of how big data from mobile phones, social media and internet have been used.
Presents a futuristic view based on development in health and medical data processing. the concept of and future of ePatient was discussed. The risks and limitations to digital medicine were presented.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
4. Are you cloud computing?
• Do you have a gmail.com, Yahoo or Hotmail
account?
• Do you have a Dropbox or Instagram account?
• Do you have a Facebook or Twitter?
• Do you have an iCloud account?
• If the answer is yes to any of these, then you
are cloud computing.
5. Cloud computing (1/8)
• Over the years, "cloud" has become a vague and flexible
term that does not reference anything in particular. (Expert
insight: Cloud computing defined.
http://docs.media.bitpipe.com/io_10x/io_100433/item_419064/HPandIntel_sCloudComputing
_SO%23034437_E-Guide_052611.pdf)
• Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool
of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal
management effort or service provider interaction. (The
NIST Definition of Cloud Computing. 2011
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf)
6. Cloud computing (2/8)
• Efficiency through resource sharing:
– Local Area Networks
– Wide Area Networks
– Metropolitan Area Networks
– Storage Area Networks
– Internet (network of networks)
– Cloud computing
• Tata study (2015) reported that 83 percent of enterprises
are seeing benefits they did not expect. The most popular
of these are increased productivity (69 percent), better
access to data (65 percent), and reductions in costs (63
percent). Nathan Eddy. Cloud Computing Reducing Costs, Improving Productivity
http://www.eweek.com/small-business/cloud-computing-reducing-costs-improving-
productivity.html
7. Cloud computing (3/8)
• Provides shared services as opposed to local
servers or storage resources;
• Enables access to information from most web-
enabled hardware;
• Allows for cost savings – reduced facility,
hardware/software investments, support;
• Data resides on servers that the customer cannot
physically access;
• Vendors may store data anywhere at lowest cost
if not restrained by agreement.
8. Cloud computing (4/8)
• Essential Characteristics of cloud computing:
– On-demand self-service
– Broad network access
– Resource pooling
– Rapid elasticity
– Measured service
• Service Models:
– Software as a Service
– Platform as a Service
– Infrastructure as a Service
9. Cloud computing (5/8)
• Deployment Models:
– Private cloud
– Community cloud
– Public cloud
– Hybrid cloud
Peter Mell and Timothy Grance. The NIST Definition of Cloud Computing:
Recommendations of the National Institute of Standards and Technology.
Gaithersburg, MD: National Institute of Standards and Technology, 2011
(http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-
145.pdf)
11. Cloud computing (7/8)
• Disadvantages:
– Requires a constant Internet connection
– Does not work well with low-speed connections
– Features might be limited
– Can be slow
– Stored data can be lost
– Stored data might not be secure.
12. Cloud computing (8/8)
• Risk Areas
– Service Provider Risks:
• Dissolving, bankruptcy, merger, overexpansion, etc.
– Technical Risks:
• Availability of service
• Data/Service Reliability
• Data Management
• Scalability
• Flexibility
• Interoperability
• Maintainability
13. Cloud computing (8/8)
• Risk Areas
– Non-technical Risk
• Organizational change
• Legislations and standards
• Data ownership
• Privacy, trust and liability issues
• Usability and end users experiences
• External (Overseas) Risks
– Management/Oversight Risks
– Security / Connectivity / Privacy Risks
14. Library & Information Services:
Challenges
• Meeting the legal and ethical requirements to serve users
(Five laws of library science by Ranganathan 1931).
• The information explosion and overload. No one library or
even library network can fulfil all the needs of its users;
• The changing pattern of publishing and access to
information:
– Open Access,
– Mobile and ubiquitous access
– Electronic and digital publishing,
– Licensing requirements,
– Copyright and intellectual property laws,
– Privacy and confidentiality.
15. Library & Information Services:
Challenges
• Availability of ICT solutions that meet the needs of
libraries:
– Proprietary software solutions
– Integrated services
– Platform dependence
– Multilingualism
– Standardization and interoperability
• Technology
• Content
– Maintainability and sustainability
– Adaptability for local content
– Low bandwidth
– Power supply
16. Library & Information Services:
Challenges
• Budget constraints on:
– information and communication technology
infrastructures;
– Collection development (acquisition);
– Human resources and
– Expansion and sustainability of services.
• Multidisciplinary professionals:
– In the library and information services
– User community.
• New breed of librarians and information
specialists
17. Library & information services enabled
by cloud computing: challenges
1. Most library computer systems are built on pre-Web technology;
2. Systems distributed across the Net using pre-Web technology are
harder and more costly to integrate;
3. Libraries store and maintain much of the same data hundreds and
thousands of times;
4. With library data scatter across distributed systems the library’s
Web presence is weakened;
5. With libraries running independent systems collaboration
between libraries is made difficult and expensive;
6. Information seekers work in common Web environments and
distributed systems make it difficult to get the library into their
workflow ;
7. Many systems are only used to 10% of their capacity. Combining
systems into a cloud environment reduces the carbon footprints,
making libraries greener
OCLC, 2010. http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf.
18. Library & information services enabled
by cloud computing: potential
1. Take advantage of current and rapidly emerging
technology to fully participate in the Web’s information
landscape;
2. Increased visibility and accessibility of collections;
3. Reduced duplication of effort from networked technical
services and collection management;
4. Streamlined workflows, optimized to fully benefit from
network participation;
5. Cooperative intelligence and improved service levels
enabled by the large-scale aggregation of usage data;
6. Make libraries greener by sharing computing power thus
reducing carbon footprints.
OCLC, 2010. http://www.oclc.org/content/dam/oclc/events/2011/files/IFLA-winds-of-change-paper.pdf
19. Legal aspects influencing library cloud
computing
• The basic principle is that the library “rents” the
application functionality from a service provider
instead of the traditional approach of “owning” the
software. This renting of computing services as
needed, deploying of applications, storing and
accessing data is equated with a scalable computing
power at a much reduced cost structure.
Legal frameworks have been developed to govern the
availability, quality, security, expandability, etc. of such
services.
Information policies should be in place to allow for
better legal agreements, audit, transparency and
accountability.
20. Legal aspects influencing library cloud
computing
• Some regularity controls need to be articulated as part
of the relation between the library and the cloud
service provider, including:
– reasonable assurance that library staff are aware of their
responsibilities related to the confidentiality, integrity, and
availability of data and information systems;
– reasonable assurance that systems and services are
available to library users in accordance with the controlling
Service Level Agreements (SLA);
– reasonable assurance that installation of services are
properly partitioned and configures to ensure contractual
obligations are met; and
– reasonable assurance that confidential and/or personal
client data including system access credentials are
protected (e.g., encrypted) from unauthorized interception
when transmitted over open networks e.g., Internet.
21. Legal aspects influencing library cloud
computing
Vendor lock-in and proprietary technologies. If
library data and databases get locked in, then the
flow of data will be disrupted, disrupting the very
nature of the cloud itself.
• Licensing agreements for access, availability and
ownership:
– Flat fee vs. pay per use
– Best seller phenomena
– Consolidation of resources
– Digitization and preservation
– Data ownership
22. Legal aspects influencing library cloud
computing
• National vs. international jurisdictions for:
– Definition of terms and conditions;
– Conclusion of agreements;
– Terms, conditions of payment, including currency;
– Conflict resolution and arbitration.
23. The EU Cloud Service Level
Agreement Standardization Guidelines
• The guidelines will help reassure cloud users that the
Service Level Agreement and the contract with the
cloud provider meet key requirements. These include:
– the availability and reliability of the cloud service being
purchased;
– the quality of support services they receive from their
cloud provider;
– what happens to their data when they terminate their
contract;
– the security levels they need for their data;
– how to better manage the data they keep in the cloud.
http://ec.europa.eu/newsroom/dae/document.cfm?action=display&doc
_id=6138
24. Access to information is a human right
• The United Nations Universal Declaration of
Human Rights (1948), Article 19 sets out rights of
freedom of opinion, expression and access to
information for all human beings.
• The Article (19) expressly sets out a right to
“Seek, receive and impart information and ideas
in any media and regardless of frontiers”;
• Libraries, information centers and services and
all modern methods and tools for managing
knowledge (collecting, processing, storage,
dissemination, sharing, utilization) fit into this
domain.
25. Library ethics in a changing environment
• Protection of the privacy of the library user
(patron) and confidentiality of data are basic
principles of librarianship;
• This principle was strictly safeguarded by the
librarians when they kept paper records. They
were safeguarded when library computer
systems were locally developed, configured
and managed.
26. Library ethics in a changing environment
• The challenge by cloud computing emerged as
data on library users is kept on third party
computers out of direct control of the librarians;
• Personal data and usage transitions may include:
– Personal information which may expose the patron to
abuse if leaked including unsolicited marketing,
exposure of professional, research and personal
interests, address, family history, user names,
passwords and other credentials; etc.;
27. Library ethics in a changing environment
• Transactions data by a user may include:
– Frequency and timing of visits/searching the
database;
– Materials requested fro acquisition or interlibrary
loan,;
– Materials borrowed, downloaded or used;
– Search strategies used to find content or
references;
– Private space on the cloud where downloads,
profiles, private content is stored;
28. ALA code of ethics: selected elements
I. We provide the highest level of service to all library users through
appropriate and usefully organized resources; equitable service policies;
equitable access; and accurate, unbiased, and courteous responses to
all requests.
II. We uphold the principles of intellectual freedom and resist all efforts to
censor library resources.
III. We protect each library user's right to privacy and confidentiality with
respect to information sought or received and resources consulted,
borrowed, acquired or transmitted.
IV. We respect intellectual property rights and advocate balance between
the interests of information users and rights holders.
V. We strive for excellence in the profession by maintaining and enhancing
our own knowledge and skills, by encouraging the professional
development of coworkers, and by fostering the aspirations of potential
members of the profession.
29. Arab Federation of Libraries and
Information Code of Conduct
The Code of Conduct issued by Arab Federation of
Libraries and Information (AFLI) included a number of
elements under the section “Information and Intellectual
Priority”, including:
– Ensure satisfaction of users anywhere, …;
– Encourage the free exchange of information and
resources, open licenses, and other means to support
access information in equal, fast and economic manner;
– Library and information specialists have to protect the
right of users for privacy and confidentiality of their
information activities in addition to respecting their
personal data taking into consideration the social
responsibility and placing public interest above personal
interest.
30. Security and privacy issues in the
library cloud environment
• Confidentiality: ensuring that personal and system data is not accessed by
unauthorized parties.
• Integrity: ensuring the accuracy and consistency of both bibliographic and
non-bibliographic data.
• Authentication: ensuring that library users are the persons they claim to
be and who have the right to access the resources.
• Access control: ensuring that library users access only the part (s) of data
that they are allowed to access based on their authentication and access
levels.
• Non-repudiation: ensuring that a party of a communication cannot deny
having sent or received the data.
• Privacy: ensuring that library users maintain the right to control the
personal data collected about them, how it is used, who uses it, who
maintains it, and what purpose it is used for.
• Audit: ensuring the safety of personal and transaction data and the overall
Cloud library system by recording and monitoring all users and data access
activities .