SlideShare a Scribd company logo
The Documents of Freedom:
Establishing Policies That Protect
      Intellectual Freedom

    Ohio Library Council Intellectual Freedom Committee
                 OLC Convention and Expo
                  Friday, October 28, 2011
                       Amy Switzer
               Shaker Heights Public Library
                    Jeff Regensburger
                   Worthington Libraries
What is intellectual freedom?



                     Seek and receive
Every individual’s
                     information from
      right
                     all points of view


Free access to all     Applies to all
 expressions of       areas of library
      ideas               service
What policies are we talking about?


Internet and computer use

Collection development

Meeting rooms

Display of community information

Patron privacy and confidentiality

Inquiries from law enforcement
Why are they important?



Rationale for   Instruct how
                                Authority and
the library's     to handle
                                accountability
  position        situations

Checks and      Ensure equity   Educate staff
 balances         of access     and patrons
Internet and Computer Use Policies



     Reasonable
                    • Time, place, and manner
     restrictions
                    • Obscene
    No unlawful     • Child pornography
      purposes      • “Harmful to minors”
                    • Other illegal things

 Privacy of users   • Protect confidentiality
     Everyone is
 responsible for    • Parents/guardians responsible for minors
what they access
Collection Development/Selection Policies


                          • Service Policy
            Consider      • Collection Specifications
                          • Current Selection Needs



                          • Goals for Acquiring
                            Material
                          • Responsibility
             Include      • Criteria
                          • Selection Procedures
                          • Reconsideration of
                            Material
Requests for Reconsideration



  Why do I      • Consistency for both patrons and staff
                • Resolve misunderstandings
need a formal   • Reduce incidents of conflict
  process?      • Protect the library from litigation




What should     • Written complaint form
                • Review process
be included?    • Notify governing body about complaint
Patron Privacy and Confidentiality



It’s the law! ORC §149.432

Covers a record in any form that is maintained by
the library and contains info that :
•Is required to be eligible to use the library or borrow
 materials.
•Identifies someone as having requested material/info on a
 specific subject.
When can we release information?



                            To            With subpoena,
To the individual    parents/guardians   search warrant, or
                     of minor children      court order


          Law enforcement
                                    Library
            officer - public
                                 administrative
           safety in exigent
                                   purposes
            circumstances
What about our internal process?



How           What ID is required for adults? For children?
information
will be       What about over the phone?
released?     What about lost/stolen cards?

What about    Staff access customer information as permitted by law
staff
access?
              Staff who are customers are entitled to confidentiality
Inquiries from Law Enforcement



 September 11th
                    Section 215 of
  and the USA
                   the Patriot Act
   Patriot Act

                     The Ohio
 Library Code of
                   Revised Code
      Ethics
                      149.432
How do I prepare for a visit from
            law enforcement?


Create a privacy policy

Have a written procedure for staff

Make sure staff and Board know the procedure and the law

Don't create unnecessary records

Don't save records that aren't essential to the operation of the library

Be aware of information on public view
Law enforcement has arrived –
                what do I do?



In advance:        During a visit:
•Decide who will   •Ask for
 handle these       identification           Foreign
 requests          •Refer the official     Intelligence
•Backup plan for    to the library                          Next steps
                                         Surveillance Act
 removal of         director
 equipment         •Is there a court
                                              (FISA)
                    order? (Subpoena?
                    Search warrant?)
Meeting Room Policies



Explain scope and                              Be
 purpose of the        Be inclusive     viewpoint/content
  meeting room                               neutral



           Apply the same        You can have
           standard to all        some rules
Displays of Community Information
           and Exhibit Space



Explain scope and purpose

Be inclusive

Be viewpoint/content neutral

Cover free newspapers, periodicals, & voter or campaign info
Conclusion, Questions, and Contacts



Amy Switzer, Shaker Heights Public Library
 • aswitzer@shakerlibrary.org

Jeff Regensburger, Worthington Libraries
 • jregensb@worthingtonlibraries.org

Online
 • http://www.olc.org/IntellectualFreedom.asp

On Twitter:
 • http://twitter.com/olcif
Resources and Sample Policies



http://www.olc.org/policies.asp (OLC)

http://www.ala.org/ala/aboutala/offices/oif/iftoolkits/intellectual.cfm (ALA)

http://dpi.state.wi.us/pld/policies.html (Wisconsin)

http://midhudson.org/department/member_information/library_policies.htm
(Mid-Hudson)

http://www.webjunction.org/policies-procedures (Webjunction)

http://www.mrsc.org/subjects/infoserv/publiclib/libpolicy.aspx?r=1
(Washington State)
Handouts
are online.
http://tinyurl.com/3ftxl65

More Related Content

What's hot

Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Jim Loter
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
Dan Michaluk
 
Privacy
PrivacyPrivacy
INTELLLEX: Getting Your Research Basics Right
INTELLLEX: Getting Your Research Basics RightINTELLLEX: Getting Your Research Basics Right
INTELLLEX: Getting Your Research Basics Right
INTELLLEX
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
Mindaugas Kiskis
 
Darknet
DarknetDarknet
Darknet
sai shankar
 
What's the fuss about all this metadata?
What's the fuss about all this metadata?What's the fuss about all this metadata?
What's the fuss about all this metadata?
Sara Sterkenburg
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
Dan Houser
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
Kirby Drake
 

What's hot (9)

Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Privacy
PrivacyPrivacy
Privacy
 
INTELLLEX: Getting Your Research Basics Right
INTELLLEX: Getting Your Research Basics RightINTELLLEX: Getting Your Research Basics Right
INTELLLEX: Getting Your Research Basics Right
 
Intellectual Property in Cyberspace
Intellectual Property in CyberspaceIntellectual Property in Cyberspace
Intellectual Property in Cyberspace
 
Darknet
DarknetDarknet
Darknet
 
What's the fuss about all this metadata?
What's the fuss about all this metadata?What's the fuss about all this metadata?
What's the fuss about all this metadata?
 
The Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & PolicyThe Challenges & Risks of New Technology: Privacy Law & Policy
The Challenges & Risks of New Technology: Privacy Law & Policy
 
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
E-Discovery 10 Years after Qualcomm v. Broadcom - Where We Are and Where We A...
 

Viewers also liked

Libr 267 intellectual freedom heroes presentation with text
Libr 267 intellectual freedom heroes presentation with textLibr 267 intellectual freedom heroes presentation with text
Libr 267 intellectual freedom heroes presentation with text
angelaocana
 
Intellectual Freedom
Intellectual FreedomIntellectual Freedom
Intellectual Freedom
Michael Lambert
 
Libr 267 intellectual freedom heroes presentation ppt
Libr 267 intellectual freedom heroes presentation pptLibr 267 intellectual freedom heroes presentation ppt
Libr 267 intellectual freedom heroes presentation ppt
angelaocana
 
Introduction to Intellectual Freedom in Libraries
Introduction to Intellectual Freedom in LibrariesIntroduction to Intellectual Freedom in Libraries
Introduction to Intellectual Freedom in Libraries
Carolyn Noah
 
Censorship, Intellectual Freedom, and Right to Read (LIS 152)
Censorship, Intellectual Freedom, and Right to Read (LIS 152)Censorship, Intellectual Freedom, and Right to Read (LIS 152)
Censorship, Intellectual Freedom, and Right to Read (LIS 152)
Roy Santos Necesario
 
Be an intellectual freedom fighter! Responding to challenges @ your school li...
Be an intellectual freedom fighter! Responding to challenges @ your school li...Be an intellectual freedom fighter! Responding to challenges @ your school li...
Be an intellectual freedom fighter! Responding to challenges @ your school li...
kimberlyhirsh
 
Intellectual Freedom and Libraries: an overview
 Intellectual Freedom and Libraries: an overview  Intellectual Freedom and Libraries: an overview
Intellectual Freedom and Libraries: an overview
Jim McCluskey
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
Barry Feldman
 

Viewers also liked (8)

Libr 267 intellectual freedom heroes presentation with text
Libr 267 intellectual freedom heroes presentation with textLibr 267 intellectual freedom heroes presentation with text
Libr 267 intellectual freedom heroes presentation with text
 
Intellectual Freedom
Intellectual FreedomIntellectual Freedom
Intellectual Freedom
 
Libr 267 intellectual freedom heroes presentation ppt
Libr 267 intellectual freedom heroes presentation pptLibr 267 intellectual freedom heroes presentation ppt
Libr 267 intellectual freedom heroes presentation ppt
 
Introduction to Intellectual Freedom in Libraries
Introduction to Intellectual Freedom in LibrariesIntroduction to Intellectual Freedom in Libraries
Introduction to Intellectual Freedom in Libraries
 
Censorship, Intellectual Freedom, and Right to Read (LIS 152)
Censorship, Intellectual Freedom, and Right to Read (LIS 152)Censorship, Intellectual Freedom, and Right to Read (LIS 152)
Censorship, Intellectual Freedom, and Right to Read (LIS 152)
 
Be an intellectual freedom fighter! Responding to challenges @ your school li...
Be an intellectual freedom fighter! Responding to challenges @ your school li...Be an intellectual freedom fighter! Responding to challenges @ your school li...
Be an intellectual freedom fighter! Responding to challenges @ your school li...
 
Intellectual Freedom and Libraries: an overview
 Intellectual Freedom and Libraries: an overview  Intellectual Freedom and Libraries: an overview
Intellectual Freedom and Libraries: an overview
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Documents of Freedom: Establishing Policies That Protect Intellectual Freedom

Privacy Law and Practices in the Public Library
Privacy Law and Practices in the Public LibraryPrivacy Law and Practices in the Public Library
Privacy Law and Practices in the Public Library
DerryLibrary
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
BoyarMiller
 
Knowledge, data and information in the corporate context
Knowledge, data and information in the corporate contextKnowledge, data and information in the corporate context
Knowledge, data and information in the corporate context
Kschopflin
 
Legal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsLegal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research Paradigms
Neal Axton
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethics
Oxg015
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
Kabul Education University
 
HVP Country Node Development Workshop
HVP Country Node Development WorkshopHVP Country Node Development Workshop
HVP Country Node Development Workshop
Human Variome Project
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
stevejudge123
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
stevejudge123
 
هديل القفيدي
هديل القفيديهديل القفيدي
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1
Traciwm
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
BoyarMiller
 
Online privacy
Online privacyOnline privacy
Online privacy
Swaleh Ahmed
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
Swaleh Ahmed
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015
Patrick Doyle
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
murnan
 
Ala Fall PD Day Presentation
Ala Fall PD Day PresentationAla Fall PD Day Presentation
Ala Fall PD Day Presentation
cmillburg
 
Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2
cmillburg
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13
jan4tarheels
 
Information literacy Presentation 2010
Information literacy Presentation 2010Information literacy Presentation 2010
Information literacy Presentation 2010
jparker050
 

Similar to Documents of Freedom: Establishing Policies That Protect Intellectual Freedom (20)

Privacy Law and Practices in the Public Library
Privacy Law and Practices in the Public LibraryPrivacy Law and Practices in the Public Library
Privacy Law and Practices in the Public Library
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
Knowledge, data and information in the corporate context
Knowledge, data and information in the corporate contextKnowledge, data and information in the corporate context
Knowledge, data and information in the corporate context
 
Legal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research ParadigmsLegal Research: Advanced Techniques and Research Paradigms
Legal Research: Advanced Techniques and Research Paradigms
 
Professional ethics
Professional ethicsProfessional ethics
Professional ethics
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
HVP Country Node Development Workshop
HVP Country Node Development WorkshopHVP Country Node Development Workshop
HVP Country Node Development Workshop
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
 
Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)Disconnecting the wiredwifidjuror (2)
Disconnecting the wiredwifidjuror (2)
 
هديل القفيدي
هديل القفيديهديل القفيدي
هديل القفيدي
 
Cj 4111 serial killers1
Cj 4111 serial killers1Cj 4111 serial killers1
Cj 4111 serial killers1
 
Trade Secret Theft in the Digital Age
Trade Secret Theft in the Digital AgeTrade Secret Theft in the Digital Age
Trade Secret Theft in the Digital Age
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Security compentency s lideshare july 2015
Security compentency s lideshare july 2015Security compentency s lideshare july 2015
Security compentency s lideshare july 2015
 
Internal Auditors Association
Internal Auditors AssociationInternal Auditors Association
Internal Auditors Association
 
Ala Fall PD Day Presentation
Ala Fall PD Day PresentationAla Fall PD Day Presentation
Ala Fall PD Day Presentation
 
Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2Ala Fall PD Day Presentation v2
Ala Fall PD Day Presentation v2
 
Communications4 staff1 15-13
Communications4 staff1 15-13Communications4 staff1 15-13
Communications4 staff1 15-13
 
Information literacy Presentation 2010
Information literacy Presentation 2010Information literacy Presentation 2010
Information literacy Presentation 2010
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 

Documents of Freedom: Establishing Policies That Protect Intellectual Freedom

  • 1. The Documents of Freedom: Establishing Policies That Protect Intellectual Freedom Ohio Library Council Intellectual Freedom Committee OLC Convention and Expo Friday, October 28, 2011 Amy Switzer Shaker Heights Public Library Jeff Regensburger Worthington Libraries
  • 2. What is intellectual freedom? Seek and receive Every individual’s information from right all points of view Free access to all Applies to all expressions of areas of library ideas service
  • 3. What policies are we talking about? Internet and computer use Collection development Meeting rooms Display of community information Patron privacy and confidentiality Inquiries from law enforcement
  • 4. Why are they important? Rationale for Instruct how Authority and the library's to handle accountability position situations Checks and Ensure equity Educate staff balances of access and patrons
  • 5. Internet and Computer Use Policies Reasonable • Time, place, and manner restrictions • Obscene No unlawful • Child pornography purposes • “Harmful to minors” • Other illegal things Privacy of users • Protect confidentiality Everyone is responsible for • Parents/guardians responsible for minors what they access
  • 6. Collection Development/Selection Policies • Service Policy Consider • Collection Specifications • Current Selection Needs • Goals for Acquiring Material • Responsibility Include • Criteria • Selection Procedures • Reconsideration of Material
  • 7. Requests for Reconsideration Why do I • Consistency for both patrons and staff • Resolve misunderstandings need a formal • Reduce incidents of conflict process? • Protect the library from litigation What should • Written complaint form • Review process be included? • Notify governing body about complaint
  • 8. Patron Privacy and Confidentiality It’s the law! ORC §149.432 Covers a record in any form that is maintained by the library and contains info that : •Is required to be eligible to use the library or borrow materials. •Identifies someone as having requested material/info on a specific subject.
  • 9. When can we release information? To With subpoena, To the individual parents/guardians search warrant, or of minor children court order Law enforcement Library officer - public administrative safety in exigent purposes circumstances
  • 10. What about our internal process? How What ID is required for adults? For children? information will be What about over the phone? released? What about lost/stolen cards? What about Staff access customer information as permitted by law staff access? Staff who are customers are entitled to confidentiality
  • 11. Inquiries from Law Enforcement September 11th Section 215 of and the USA the Patriot Act Patriot Act The Ohio Library Code of Revised Code Ethics 149.432
  • 12. How do I prepare for a visit from law enforcement? Create a privacy policy Have a written procedure for staff Make sure staff and Board know the procedure and the law Don't create unnecessary records Don't save records that aren't essential to the operation of the library Be aware of information on public view
  • 13. Law enforcement has arrived – what do I do? In advance: During a visit: •Decide who will •Ask for handle these identification Foreign requests •Refer the official Intelligence •Backup plan for to the library Next steps Surveillance Act removal of director equipment •Is there a court (FISA) order? (Subpoena? Search warrant?)
  • 14. Meeting Room Policies Explain scope and Be purpose of the Be inclusive viewpoint/content meeting room neutral Apply the same You can have standard to all some rules
  • 15. Displays of Community Information and Exhibit Space Explain scope and purpose Be inclusive Be viewpoint/content neutral Cover free newspapers, periodicals, & voter or campaign info
  • 16. Conclusion, Questions, and Contacts Amy Switzer, Shaker Heights Public Library • aswitzer@shakerlibrary.org Jeff Regensburger, Worthington Libraries • jregensb@worthingtonlibraries.org Online • http://www.olc.org/IntellectualFreedom.asp On Twitter: • http://twitter.com/olcif
  • 17. Resources and Sample Policies http://www.olc.org/policies.asp (OLC) http://www.ala.org/ala/aboutala/offices/oif/iftoolkits/intellectual.cfm (ALA) http://dpi.state.wi.us/pld/policies.html (Wisconsin) http://midhudson.org/department/member_information/library_policies.htm (Mid-Hudson) http://www.webjunction.org/policies-procedures (Webjunction) http://www.mrsc.org/subjects/infoserv/publiclib/libpolicy.aspx?r=1 (Washington State)