SlideShare a Scribd company logo
1 of 10
Frameworks & Current
Issues in Library Privacy
NISO Privacy - June 19, 2015 



Laura Quilter, MLS, JD

UMass Amherst
aka



Where we’ve been, 

where we are,

where we might go
broad approaches to date
privacy against governmental intrusion: 4th Amendment. 1st
Amendment connections to anonymous speech. (late 18th c.)
privacy torts (late 19th/early mid 20th c.)
Fair Information Practice Principles [FIPPs] (late 20th c.)
sectoral implementation in US : FCRA, FERPA, HIPAA,
library privacy statutes, data breach notification statutes, etc.
more comprehensive implementation in EU: EU Data
Protection Directive, etc.
Fair Information Practice Principles
HEW, 1973 - attempting to establish a framework for
the use of information in the modern age; followed by
OECD, EU, and other organizations
fundamental premise underlying much modern privacy
regulation, but not usually implemented holistically
components: notice, choice/consent, access, integrity,
security, enforcement
FIPP implementations
EU Data Protection Directive among the fullest
implementations.
US FCRA, Fair Credit Reporting Act — typical in US for
providing consumers some modest implementations of access
and integrity, but very little notice, choice, or enforcement.
Gramm Leach Bliley (financial data)
HIPAA (health data)
Data Breach Statutes provide an implementation of security.
FIPP implementations
Library privacy statutes: Waivers from FOIA; sometimes
protection from government intrusion; sometimes fuller
implementations of FIPPs
Reader privacy statutes:
AZ - expanded to ebooks
CA - booksellers & electronic booksellers records
protected; notice to users; reporting; exceptions
MO - ebooks added; 3rd party vendor records added
Are these issues manageable
through existing approaches?
Library Privacy Laws - revisions to cover ebooks; “readers”, 3rd party holders of records; vendors
Nationally:
USA PATRIOT Act & Freedom Act reforms (limits on bulk collection of data); legal challenges
to mass warrantless surveillance.
ECPA reform and the 3rd party business records doctrine.
Federal attacks on strong cryptography, demanding weak crypto, backdoors/keys.
Ubiquitous surveillance and record collection (e.g., RFID; video footage; logging).
Data mining.
Internationally: Varying approaches in UK & Europe already only increasing. In Europe, the new
“Right to be Forgotten”, and efforts by EU and most recently Canada to enforce law
extraterritorially.
new approaches
FIPPs: Enforcement has been least-applied aspect;
expansion of regulatory enforcement or tort approaches
(negligence, duties owed to subjects of information
gathering).

Q: How to implement as a general duty? 

Q: How to handle distributed data (joint & several liability?)
Autonomy: Autonomy as a justification for privacy has been
a basis for US reproductive rights law since late 20th
century, but rarely applied to informational privacy; 1st
Amendment protections for anonymous speech make a
potential nexus. 

Q: Value of privacy as “seclusion” lost?
new approaches
Contextual privacy [Helen Nissenbaum] - Suggests
regulatory approach of notice & consent over migration
of data; strong controls around re-purposing. 

Q: Erosion of privacy as a norm.

Q: Creation of new information (via data mining &
algorithmic control) may lead to lack of awareness, so
how to regulate?
Give up “privacy” and instead regulate misuse / harms.

Q: Value of privacy as “seclusion” utterly lost

Q: How to define misuse / harm? Is “price
discrimination” a harm to the consumer?
questions for Privacy Working Group
why do we care about privacy? autonomy? “intellectual privacy”? seclusion? modesty?
relation to other values, such as consumer rights, control of time?
what interests are we trading off? privacy, accessibility, cost, options, user-friendliness,
security, freedom of speech, others?
who is in charge of “networked” data? what are the responsibilities for putting in a little data
into a larger pool? e.g., RFID; data mined & combined with other data; leading to targeted
advertising & price discrimination
are commercial uses qualitatively different from noncommercial uses of other people’s data?
ought libraries be granted more scope because they are trusted, or less scope? for the
librarians: public & nonprofit institutions’ engagements with private commercial entities is
subject to scrutiny; if data is commercial, what can be fairly shared with commercial entities?
do the differing roles of academic libraries (supporting the most privileged users) and public
libraries (supporting the least privileged) suggest different duties and perspectives?
what are effective enforcement mechanisms? Because without enforcement, principles are
nearly meaningless.

More Related Content

What's hot

Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Mediachuckbt
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacyMicah Altman
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataRobin Rice
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...munnaslid2
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
 
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataHBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyMicah Altman
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPMicah Altman
 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social MachineUlrik Lyngs
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information PolicyNiamh Headon
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
 

What's hot (20)

Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Internet
InternetInternet
Internet
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataHBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social Machine
 
Polinter09
Polinter09Polinter09
Polinter09
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Isa12b
Isa12bIsa12b
Isa12b
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
 

Similar to Laura Quilter NISO Privacy Meeting #4 - June 19, 2015

Dan l. Burk on privacy.
Dan l. Burk on privacy.Dan l. Burk on privacy.
Dan l. Burk on privacy.Renelio
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoTLAURA VIVET
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing personsmpcislides
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of datadan hyde
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Klamberg
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?Stuart Bailey
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy RegulationMercatus Center
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...EUDAT
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Lilian Edwards
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard
 

Similar to Laura Quilter NISO Privacy Meeting #4 - June 19, 2015 (20)

Dan l. Burk on privacy.
Dan l. Burk on privacy.Dan l. Burk on privacy.
Dan l. Burk on privacy.
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Chapter2
Chapter2Chapter2
Chapter2
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of data
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Regulating code
Regulating codeRegulating code
Regulating code
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 

More from National Information Standards Organization (NISO)

More from National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
 
Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"
 
Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"
 
Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Laura Quilter NISO Privacy Meeting #4 - June 19, 2015

  • 1. Frameworks & Current Issues in Library Privacy NISO Privacy - June 19, 2015 
 
 Laura Quilter, MLS, JD
 UMass Amherst
  • 2. aka
 
 Where we’ve been, 
 where we are,
 where we might go
  • 3. broad approaches to date privacy against governmental intrusion: 4th Amendment. 1st Amendment connections to anonymous speech. (late 18th c.) privacy torts (late 19th/early mid 20th c.) Fair Information Practice Principles [FIPPs] (late 20th c.) sectoral implementation in US : FCRA, FERPA, HIPAA, library privacy statutes, data breach notification statutes, etc. more comprehensive implementation in EU: EU Data Protection Directive, etc.
  • 4. Fair Information Practice Principles HEW, 1973 - attempting to establish a framework for the use of information in the modern age; followed by OECD, EU, and other organizations fundamental premise underlying much modern privacy regulation, but not usually implemented holistically components: notice, choice/consent, access, integrity, security, enforcement
  • 5. FIPP implementations EU Data Protection Directive among the fullest implementations. US FCRA, Fair Credit Reporting Act — typical in US for providing consumers some modest implementations of access and integrity, but very little notice, choice, or enforcement. Gramm Leach Bliley (financial data) HIPAA (health data) Data Breach Statutes provide an implementation of security.
  • 6. FIPP implementations Library privacy statutes: Waivers from FOIA; sometimes protection from government intrusion; sometimes fuller implementations of FIPPs Reader privacy statutes: AZ - expanded to ebooks CA - booksellers & electronic booksellers records protected; notice to users; reporting; exceptions MO - ebooks added; 3rd party vendor records added
  • 7. Are these issues manageable through existing approaches? Library Privacy Laws - revisions to cover ebooks; “readers”, 3rd party holders of records; vendors Nationally: USA PATRIOT Act & Freedom Act reforms (limits on bulk collection of data); legal challenges to mass warrantless surveillance. ECPA reform and the 3rd party business records doctrine. Federal attacks on strong cryptography, demanding weak crypto, backdoors/keys. Ubiquitous surveillance and record collection (e.g., RFID; video footage; logging). Data mining. Internationally: Varying approaches in UK & Europe already only increasing. In Europe, the new “Right to be Forgotten”, and efforts by EU and most recently Canada to enforce law extraterritorially.
  • 8. new approaches FIPPs: Enforcement has been least-applied aspect; expansion of regulatory enforcement or tort approaches (negligence, duties owed to subjects of information gathering).
 Q: How to implement as a general duty? 
 Q: How to handle distributed data (joint & several liability?) Autonomy: Autonomy as a justification for privacy has been a basis for US reproductive rights law since late 20th century, but rarely applied to informational privacy; 1st Amendment protections for anonymous speech make a potential nexus. 
 Q: Value of privacy as “seclusion” lost?
  • 9. new approaches Contextual privacy [Helen Nissenbaum] - Suggests regulatory approach of notice & consent over migration of data; strong controls around re-purposing. 
 Q: Erosion of privacy as a norm.
 Q: Creation of new information (via data mining & algorithmic control) may lead to lack of awareness, so how to regulate? Give up “privacy” and instead regulate misuse / harms.
 Q: Value of privacy as “seclusion” utterly lost
 Q: How to define misuse / harm? Is “price discrimination” a harm to the consumer?
  • 10. questions for Privacy Working Group why do we care about privacy? autonomy? “intellectual privacy”? seclusion? modesty? relation to other values, such as consumer rights, control of time? what interests are we trading off? privacy, accessibility, cost, options, user-friendliness, security, freedom of speech, others? who is in charge of “networked” data? what are the responsibilities for putting in a little data into a larger pool? e.g., RFID; data mined & combined with other data; leading to targeted advertising & price discrimination are commercial uses qualitatively different from noncommercial uses of other people’s data? ought libraries be granted more scope because they are trusted, or less scope? for the librarians: public & nonprofit institutions’ engagements with private commercial entities is subject to scrutiny; if data is commercial, what can be fairly shared with commercial entities? do the differing roles of academic libraries (supporting the most privileged users) and public libraries (supporting the least privileged) suggest different duties and perspectives? what are effective enforcement mechanisms? Because without enforcement, principles are nearly meaningless.