SlideShare a Scribd company logo
 ©2016 ProQuest LLC. All rights reserved.
Security & Privacy:
What’s Ahead for 2017
Library Edition
Daniel Ayala (@buddhake)
Director, Global Information Security, ProQuest
ALA Midwinter 2017
Atlanta, Georgia
 ©2016 ProQuest LLC. All rights reserved.2
First, a story…
 ©2016 ProQuest LLC. All rights reserved.
Modern technology is
amazing. 3
The sky is the
limit…
…but there is
reason for
caution
 ©2016 ProQuest LLC. All rights reserved.
Security & privacy
go beyond the
library
4
 ©2016 ProQuest LLC. All rights reserved.5
Library as Hub of Privacy & Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
6
Device Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
7
Malware
Ransomware
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
8
Phishing
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
9
Browser
Security
 ©2016 ProQuest LLC. All rights reserved.
Protect the
Systems!
Protect the Users!
Protect the Data!
10
Mobile Devices
 ©2016 ProQuest LLC. All rights reserved.
A few words on
11
P R I V A C
Y
 ©2016 ProQuest LLC. All rights reserved.12
USA Patriot
Act
 ©2016 ProQuest LLC. All rights reserved.13
USA Freedom
Act
 ©2016 ProQuest LLC. All rights reserved.14
Consumer
Services
Devour Data
 ©2016 ProQuest LLC. All rights reserved.15
Anonymisation
& Tor
 ©2016 ProQuest LLC. All rights reserved.16
Personalisatio
n
 ©2016 ProQuest LLC. All rights reserved.17
Opt-in vs Opt-
Out
 ©2016 ProQuest LLC. All rights reserved.18
Net Neutrality
Rollback*
*In discussion, not yet submitted for public
 ©2016 ProQuest LLC. All rights reserved.19
ISP Browsing
Data Privacy
Rollback*
*In discussion, not yet submitted for public
 ©2016 ProQuest LLC. All rights reserved.
Tools
20
Ghostery (Chrome) –
https://www.ghostery.com
1Blocker (Mac/iOS) -
http://1blocker.com
BuiltWith (Chrome) -
https://builtwith.com
Malwarebytes -
https://www.malwarebytes.com
Deep Freeze - http://www.faronics.com/products/deep-
freeze/
Tor - https://www.torproject.org
Let’s Encrypt (SSL) - https://letsencrypt.org
 ©2016 ProQuest LLC. All rights reserved.21
Shared responsibility for
privacy
 ©2016 ProQuest LLC. All rights reserved.22
Transparency
 ©2016 ProQuest LLC. All rights reserved.23
Anonymisation
 ©2016 ProQuest LLC. All rights reserved.24
Options & Informed Consent
 ©2016 ProQuest LLC. All rights reserved.25
Sharing Data w/ Others
 ©2016 ProQuest LLC. All rights reserved.26
Support Anonymous Use
 ©2016 ProQuest LLC. All rights reserved.27
Access to One’s own User
Data
 ©2016 ProQuest LLC. All rights reserved.28
Accountability
 ©2016 ProQuest LLC. All rights reserved.29
RA21
RA21’s mission is to align and simplify
pathways to subscribed content across
participating scientific platforms. RA21 will
address the common problems users face
when interacting with multiple and varied
information protocols. 
http://www.stm-assoc.org/standards-technology/ra21-resource-access-
21st-century/
 ©2016 ProQuest LLC. All rights reserved.
Balance
30
Security &
Privacy Utility
 ©2016 ProQuest LLC. All rights reserved.
Foundational thinking31
Data will always be
collected
Collection !=
Privacy Violation
Serve the
user/patron!
Set principles for use
& sharing
If you collect it, use it wisely
and get rid of it when you’re
done!
TRUST!(but verify)
 ©2016 ProQuest LLC. All rights reserved.
Give patrons/users the information, options
to make smart, well-informed privacy
decisions32
 ©2016 ProQuest LLC. All rights reserved.
Security & privacy
go beyond the
library
33
Give patrons/users the information, options
to make smart, well-informed privacy
decisions
 ©2016 ProQuest LLC. All rights reserved.34
HTTP
S
11 Available Now, +5 More
Soon
All new ProQuest products, HTTPS
only
HTTPS only - later this
summer
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
 ©2016 ProQuest LLC. All rights reserved.35
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
ProQuest platform (search.proquest.com)
ProQuest Dialog (search.proquest.com/professional) 
ProQuest Administrator Module (PAM) 
Legacy RefWorks
The New RefWorks
Ebook Central
ProQuest Research Companion
Pi2 Drug Safety Triager
Alexander Street Platform (search.alexanderstreet.com)
Alexander Street Academic Video Store
(search.alexanderstreet.com/store) 
Alexander Street Admin Portal
NOW!
 ©2016 ProQuest LLC. All rights reserved.36
http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean-
Something-to-You-.html
Pivot
eLibrary
CultureGrams
SIRS
HeritageQuest Online
ProQuest Congressional (congressional.proquest.com)
SOON!
 ©2016 ProQuest LLC. All rights reserved.37
Privacy PolicyFull Update Coming
SoonWhat data is collected
How it is used
With whom it is
sharedEU/USA Privacy Shield
Compliant
 ©2016 ProQuest LLC. All rights reserved.38
When it comes to privacy and
accountability, people always
demand the former for themselves
and the latter for everyone else.
– David Brin 
 ©2016 ProQuest LLC. All rights reserved.
Resources & Credits
NISO Consensus Framework to Support Patron Privacy in Digital
Library and Information Systems -
http://www.niso.org/topics/tl/patron_privacy/
ALA Code of Ethics -
http://www.ala.org/advocacy/proethics/codeofethics/codeethics
ALA Library Privacy Guidelines for e-book Lending and Digital
Content Vendors - http://www.ala.org/advocacy/library-privacy-
guidelines-e-book-lending-and-digital-content-vendors
STM RA21
- http://www.stm-assoc.org/standards-technology/ra21-resource-
access-21st-century/ 39
 ©2016 ProQuest LLC. All rights reserved.40
Q&A

More Related Content

What's hot

ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
Murray Security Services
 
The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
Tom Paseka
 
Fighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacksFighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacks
Shashi Prakash
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token Storage
Eric Muyser
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
s116num
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
OVHcloud
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
Surendran Balachandran
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
ForgeRock Identity Tech Talks
 

What's hot (8)

ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
 
Fighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacksFighting the next wave of sophisticated phishing attacks
Fighting the next wave of sophisticated phishing attacks
 
Secure Token Storage
Secure Token StorageSecure Token Storage
Secure Token Storage
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Online passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattackOnline passwords – understanding "credential stuffing" cyberattack
Online passwords – understanding "credential stuffing" cyberattack
 
Cryptoparty v1
Cryptoparty v1Cryptoparty v1
Cryptoparty v1
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 

Viewers also liked

ProQuest Primary Source Materials
ProQuest Primary Source MaterialsProQuest Primary Source Materials
ProQuest Primary Source Materials
ProQuest
 
Summon @ LBSU
Summon @ LBSUSummon @ LBSU
Summon @ LBSU
ProQuest
 
A Hollow Sphere
A Hollow SphereA Hollow Sphere
A Hollow Sphere
ProQuest
 
Our Work Here is Done
Our Work Here is DoneOur Work Here is Done
Our Work Here is Done
ProQuest
 
Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project
ProQuest
 
Upcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface ImprovementsUpcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface Improvements
ProQuest
 
Ebooks at Swinburne
Ebooks at SwinburneEbooks at Swinburne
Ebooks at Swinburne
ProQuest
 
American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971
ProQuest
 
Programa de publicação de teses ProQuest
Programa de publicação de teses ProQuestPrograma de publicação de teses ProQuest
Programa de publicação de teses ProQuest
ProQuest
 
Simply Does It
Simply Does ItSimply Does It
Simply Does It
ProQuest
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
ProQuest
 
ProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential ProclamationsProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential Proclamations
ProQuest
 
House of Commons Parliamentary Papers Migration
House of Commons Parliamentary PapersMigrationHouse of Commons Parliamentary PapersMigration
House of Commons Parliamentary Papers Migration
ProQuest
 
EIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul OlympicsEIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul Olympics
ProQuest
 
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
ProQuest
 
Case Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for ResearchCase Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for Research
ProQuest
 
ProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United StatesProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United States
ProQuest
 
Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...
ProQuest
 
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest
 
Computers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social MediaComputers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social Media
ProQuest
 

Viewers also liked (20)

ProQuest Primary Source Materials
ProQuest Primary Source MaterialsProQuest Primary Source Materials
ProQuest Primary Source Materials
 
Summon @ LBSU
Summon @ LBSUSummon @ LBSU
Summon @ LBSU
 
A Hollow Sphere
A Hollow SphereA Hollow Sphere
A Hollow Sphere
 
Our Work Here is Done
Our Work Here is DoneOur Work Here is Done
Our Work Here is Done
 
Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project Improving the Availability of ISSN - A Joint Project
Improving the Availability of ISSN - A Joint Project
 
Upcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface ImprovementsUpcoming ProQuest User Interface Improvements
Upcoming ProQuest User Interface Improvements
 
Ebooks at Swinburne
Ebooks at SwinburneEbooks at Swinburne
Ebooks at Swinburne
 
American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971American Indians and the American West, 1809-1971
American Indians and the American West, 1809-1971
 
Programa de publicação de teses ProQuest
Programa de publicação de teses ProQuestPrograma de publicação de teses ProQuest
Programa de publicação de teses ProQuest
 
Simply Does It
Simply Does ItSimply Does It
Simply Does It
 
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMSPROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
PROQUEST EDUCATION AND PROFESSIONAL DEVELOPMENT PROGRAMS
 
ProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential ProclamationsProQuest Executive Orders and Presidential Proclamations
ProQuest Executive Orders and Presidential Proclamations
 
House of Commons Parliamentary Papers Migration
House of Commons Parliamentary PapersMigrationHouse of Commons Parliamentary PapersMigration
House of Commons Parliamentary Papers Migration
 
EIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul OlympicsEIU Country Reports Archive Example Use Case Seoul Olympics
EIU Country Reports Archive Example Use Case Seoul Olympics
 
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
Early European Books, Images from Collection 6 La Bibliotheque nationale de F...
 
Case Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for ResearchCase Study: Using Dissertations Data for Research
Case Study: Using Dissertations Data for Research
 
ProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United StatesProQuest Statistical Abstract of the United States
ProQuest Statistical Abstract of the United States
 
Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...Case Study: Dissertation Data for Research. Graduate Center, City University ...
Case Study: Dissertation Data for Research. Graduate Center, City University ...
 
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
ProQuest History Vault Black Freedom Struggle in the 20th Century: Organizati...
 
Computers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social MediaComputers in Libraries 2014: Engaging Students Through Social Media
Computers in Libraries 2014: Engaging Students Through Social Media
 

Similar to Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017

Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Benjamin Cabé
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
NowSecure
 
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Daniel Ayala
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
NowSecure
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure Limitations
Caserta
 
Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware Lab
ThreatConnect
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
Amit Serper
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
Leonard Moustacchis
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
Adam Faeder
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
Adam Faeder
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
Cyber Security Alliance
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
Firefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid ApplicationFirefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid Application
Rizky Ariestiyansyah
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
NowSecure
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
Nat Sakimura
 
Sitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn'tSitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn't
Bas Lijten
 
The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.
All Things Open
 
The Datacenter Network You Wish You Had
The Datacenter Network You Wish You HadThe Datacenter Network You Wish You Had
The Datacenter Network You Wish You Had
Jeremy Schulman
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber Forensics
Albert Hui
 

Similar to Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017 (20)

Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016Examining the emergent open source IoT ecosystem - IoT World Europe 2016
Examining the emergent open source IoT ecosystem - IoT World Europe 2016
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
Data Privacy and Governance – Just Because You Can Use the Data, Doesn’t Mean...
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure Limitations
 
Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware Lab
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
ASFWS 2013 - Cryptocat: récents défis en faisant la cryptographie plus facile...
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Firefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid ApplicationFirefox OS, Web APIs & Hybrid Application
Firefox OS, Web APIs & Hybrid Application
 
OWASP Mobile Top 10
OWASP Mobile Top 10OWASP Mobile Top 10
OWASP Mobile Top 10
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
 
Sitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn'tSitecore might be secure, but your site isn't
Sitecore might be secure, but your site isn't
 
The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.The Datacenter Network You Wish You Had: It's yours for the taking.
The Datacenter Network You Wish You Had: It's yours for the taking.
 
The Datacenter Network You Wish You Had
The Datacenter Network You Wish You HadThe Datacenter Network You Wish You Had
The Datacenter Network You Wish You Had
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber Forensics
 

More from ProQuest

Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
ProQuest
 
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
ProQuest
 
Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...
ProQuest
 
Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...
ProQuest
 
Women and Social Movements Library - Key Topics
Women and Social Movements Library - Key TopicsWomen and Social Movements Library - Key Topics
Women and Social Movements Library - Key Topics
ProQuest
 
Gerritsen collection on Women's Studies - A Resource Guide
Gerritsen collection on Women's Studies  - A Resource GuideGerritsen collection on Women's Studies  - A Resource Guide
Gerritsen collection on Women's Studies - A Resource Guide
ProQuest
 
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
ProQuest
 
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
ProQuest
 
Visual History Archive
Visual History ArchiveVisual History Archive
Visual History Archive
ProQuest
 
History vault-black-freedom-naacp-research
History vault-black-freedom-naacp-researchHistory vault-black-freedom-naacp-research
History vault-black-freedom-naacp-research
ProQuest
 
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
ProQuest
 
The Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc ResearchThe Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc Research
ProQuest
 
ProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th CenturyProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest
 
History Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use CasesHistory Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use Cases
ProQuest
 
Privacy is the Future
Privacy is the FuturePrivacy is the Future
Privacy is the Future
ProQuest
 
Preserving Technology Through Stories
Preserving Technology Through StoriesPreserving Technology Through Stories
Preserving Technology Through Stories
ProQuest
 
Making Connections - Turing user insights into impact
Making Connections - Turing user insights into impactMaking Connections - Turing user insights into impact
Making Connections - Turing user insights into impact
ProQuest
 

More from ProQuest (17)

Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
Women and Social Movements: Modern Empires Since 1820 - Selections from Docum...
 
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
Women and Social Movements in Modern Empires Since 1820 - Selections from Doc...
 
Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...Women and Social Movements in Modern Empires - Selections from Document Clust...
Women and Social Movements in Modern Empires - Selections from Document Clust...
 
Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...Women and Social Movements, International 1840 to Present - Conference Procee...
Women and Social Movements, International 1840 to Present - Conference Procee...
 
Women and Social Movements Library - Key Topics
Women and Social Movements Library - Key TopicsWomen and Social Movements Library - Key Topics
Women and Social Movements Library - Key Topics
 
Gerritsen collection on Women's Studies - A Resource Guide
Gerritsen collection on Women's Studies  - A Resource GuideGerritsen collection on Women's Studies  - A Resource Guide
Gerritsen collection on Women's Studies - A Resource Guide
 
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019“The People vs. the Elite” ProQuest Luncheon, DLC 2019
“The People vs. the Elite” ProQuest Luncheon, DLC 2019
 
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
The Value of Newspapers in Research: Newspapers Citations Analysis, August 2018
 
Visual History Archive
Visual History ArchiveVisual History Archive
Visual History Archive
 
History vault-black-freedom-naacp-research
History vault-black-freedom-naacp-researchHistory vault-black-freedom-naacp-research
History vault-black-freedom-naacp-research
 
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...History Vault Students for a Democratic Society, Vietnam Veterans Against the...
History Vault Students for a Democratic Society, Vietnam Veterans Against the...
 
The Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc ResearchThe Impacts of Digital Collections Jisc Research
The Impacts of Digital Collections Jisc Research
 
ProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th CenturyProQuest History Vault Black Freedom Struggle in the 20th Century
ProQuest History Vault Black Freedom Struggle in the 20th Century
 
History Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use CasesHistory Vault Black Freedom and NAACP Use Cases
History Vault Black Freedom and NAACP Use Cases
 
Privacy is the Future
Privacy is the FuturePrivacy is the Future
Privacy is the Future
 
Preserving Technology Through Stories
Preserving Technology Through StoriesPreserving Technology Through Stories
Preserving Technology Through Stories
 
Making Connections - Turing user insights into impact
Making Connections - Turing user insights into impactMaking Connections - Turing user insights into impact
Making Connections - Turing user insights into impact
 

Recently uploaded

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 

Recently uploaded (19)

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 

Cybersecurity & Privacy: What's Ahead for 2017 - ALA Midwinter 2017

  • 1.  ©2016 ProQuest LLC. All rights reserved. Security & Privacy: What’s Ahead for 2017 Library Edition Daniel Ayala (@buddhake) Director, Global Information Security, ProQuest ALA Midwinter 2017 Atlanta, Georgia
  • 2.  ©2016 ProQuest LLC. All rights reserved.2 First, a story…
  • 3.  ©2016 ProQuest LLC. All rights reserved. Modern technology is amazing. 3 The sky is the limit… …but there is reason for caution
  • 4.  ©2016 ProQuest LLC. All rights reserved. Security & privacy go beyond the library 4
  • 5.  ©2016 ProQuest LLC. All rights reserved.5 Library as Hub of Privacy & Security
  • 6.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 6 Device Security
  • 7.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 7 Malware Ransomware
  • 8.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 8 Phishing
  • 9.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 9 Browser Security
  • 10.  ©2016 ProQuest LLC. All rights reserved. Protect the Systems! Protect the Users! Protect the Data! 10 Mobile Devices
  • 11.  ©2016 ProQuest LLC. All rights reserved. A few words on 11 P R I V A C Y
  • 12.  ©2016 ProQuest LLC. All rights reserved.12 USA Patriot Act
  • 13.  ©2016 ProQuest LLC. All rights reserved.13 USA Freedom Act
  • 14.  ©2016 ProQuest LLC. All rights reserved.14 Consumer Services Devour Data
  • 15.  ©2016 ProQuest LLC. All rights reserved.15 Anonymisation & Tor
  • 16.  ©2016 ProQuest LLC. All rights reserved.16 Personalisatio n
  • 17.  ©2016 ProQuest LLC. All rights reserved.17 Opt-in vs Opt- Out
  • 18.  ©2016 ProQuest LLC. All rights reserved.18 Net Neutrality Rollback* *In discussion, not yet submitted for public
  • 19.  ©2016 ProQuest LLC. All rights reserved.19 ISP Browsing Data Privacy Rollback* *In discussion, not yet submitted for public
  • 20.  ©2016 ProQuest LLC. All rights reserved. Tools 20 Ghostery (Chrome) – https://www.ghostery.com 1Blocker (Mac/iOS) - http://1blocker.com BuiltWith (Chrome) - https://builtwith.com Malwarebytes - https://www.malwarebytes.com Deep Freeze - http://www.faronics.com/products/deep- freeze/ Tor - https://www.torproject.org Let’s Encrypt (SSL) - https://letsencrypt.org
  • 21.  ©2016 ProQuest LLC. All rights reserved.21 Shared responsibility for privacy
  • 22.  ©2016 ProQuest LLC. All rights reserved.22 Transparency
  • 23.  ©2016 ProQuest LLC. All rights reserved.23 Anonymisation
  • 24.  ©2016 ProQuest LLC. All rights reserved.24 Options & Informed Consent
  • 25.  ©2016 ProQuest LLC. All rights reserved.25 Sharing Data w/ Others
  • 26.  ©2016 ProQuest LLC. All rights reserved.26 Support Anonymous Use
  • 27.  ©2016 ProQuest LLC. All rights reserved.27 Access to One’s own User Data
  • 28.  ©2016 ProQuest LLC. All rights reserved.28 Accountability
  • 29.  ©2016 ProQuest LLC. All rights reserved.29 RA21 RA21’s mission is to align and simplify pathways to subscribed content across participating scientific platforms. RA21 will address the common problems users face when interacting with multiple and varied information protocols.  http://www.stm-assoc.org/standards-technology/ra21-resource-access- 21st-century/
  • 30.  ©2016 ProQuest LLC. All rights reserved. Balance 30 Security & Privacy Utility
  • 31.  ©2016 ProQuest LLC. All rights reserved. Foundational thinking31 Data will always be collected Collection != Privacy Violation Serve the user/patron! Set principles for use & sharing If you collect it, use it wisely and get rid of it when you’re done! TRUST!(but verify)
  • 32.  ©2016 ProQuest LLC. All rights reserved. Give patrons/users the information, options to make smart, well-informed privacy decisions32
  • 33.  ©2016 ProQuest LLC. All rights reserved. Security & privacy go beyond the library 33 Give patrons/users the information, options to make smart, well-informed privacy decisions
  • 34.  ©2016 ProQuest LLC. All rights reserved.34 HTTP S 11 Available Now, +5 More Soon All new ProQuest products, HTTPS only HTTPS only - later this summer http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html
  • 35.  ©2016 ProQuest LLC. All rights reserved.35 http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html ProQuest platform (search.proquest.com) ProQuest Dialog (search.proquest.com/professional)  ProQuest Administrator Module (PAM)  Legacy RefWorks The New RefWorks Ebook Central ProQuest Research Companion Pi2 Drug Safety Triager Alexander Street Platform (search.alexanderstreet.com) Alexander Street Academic Video Store (search.alexanderstreet.com/store)  Alexander Street Admin Portal NOW!
  • 36.  ©2016 ProQuest LLC. All rights reserved.36 http://www.proquest.com/blog/pqblog/2017/Why-Those-HTTPS-Messages-Mean- Something-to-You-.html Pivot eLibrary CultureGrams SIRS HeritageQuest Online ProQuest Congressional (congressional.proquest.com) SOON!
  • 37.  ©2016 ProQuest LLC. All rights reserved.37 Privacy PolicyFull Update Coming SoonWhat data is collected How it is used With whom it is sharedEU/USA Privacy Shield Compliant
  • 38.  ©2016 ProQuest LLC. All rights reserved.38 When it comes to privacy and accountability, people always demand the former for themselves and the latter for everyone else. – David Brin 
  • 39.  ©2016 ProQuest LLC. All rights reserved. Resources & Credits NISO Consensus Framework to Support Patron Privacy in Digital Library and Information Systems - http://www.niso.org/topics/tl/patron_privacy/ ALA Code of Ethics - http://www.ala.org/advocacy/proethics/codeofethics/codeethics ALA Library Privacy Guidelines for e-book Lending and Digital Content Vendors - http://www.ala.org/advocacy/library-privacy- guidelines-e-book-lending-and-digital-content-vendors STM RA21 - http://www.stm-assoc.org/standards-technology/ra21-resource- access-21st-century/ 39
  • 40.  ©2016 ProQuest LLC. All rights reserved.40 Q&A

Editor's Notes

  1. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  2. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  3. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  4. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  5. Devise appropriate access to data Least privilege Revisit rights frequently Encrypt it! Both in motion and at rest Log all the access, and review the logs regularly Audit your suppliers to your standards Educate the users that use the data Trust, but verify Be ready for a compromise It’s not IF it’s WHEN Protect the data as though you guarantee it will be taken Incident response & communications plan beforehand!
  6. Ghostery 1Blocker MadeWith Malwarebytes Deepfreeze
  7. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  8. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  9. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  10. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  11. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  12. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  13. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  14. http://www.niso.org/apps/group_public/download.php/16064/NISO%20Privacy%20Principles.pdf http://www.ala.org/advocacy/library-privacy-guidelines-e-book-lending-and-digital-content-vendors Shared Privacy Responsibilities Transparency and Facilitating Privacy Awareness Security Data Collection and Use Anonymization Options and Informed Consent Sharing Data with Others Notification of Privacy Policies and Practices Supporting Anonymous Use Access to One’s Own User Data Continuous Improvement Accountability
  15. At the foundation of everything, we have some guiding principles that we worked with as we developed our approach: Some data will always be collected; it’s the nature of online services. Collection alone does not equal violation of user privacy, especially if explicit approval to use is given by the user. The underlying primary goal is to assist the missions of the researcher, library or author in achieving their missions. Guiding principles will define the rules of data collection, use and sharing. If you collect it, use it wisely, protect it and get rid of it when you don’t need it any longer.
  16. In March 2016 Apple product keynote, a section was devoted to privacy of data A Reuters article1 released at the same time chronicled the internal ”privacy czar” review and scrutiny process within Apple Apple has employed a similar review process prior to data being collected and/or used Apple has been clear about their commitment to privacy [1] http://www.reuters.com/article/us-apple-encryption-privacy-insight-idUSKCN0WN0BO