SlideShare a Scribd company logo
Rachel Gordon
Mercer University School of Law
What is Privacy?
In a library (physical or virtual), the right to
privacy is the right to open inquiry without
having the subject of one’s interest examined
or scrutinized by others.
– ALA, An Interpretation of the Library Bill of
Rights
Privacy and Confidentiality
Confidentiality exists when a library is in
possession of personally identifiable
information about users and keeps that
information private on their behalf.
– ALA, An Interpretation of the Library Bill of
Rights
Personally Identifiable
Information
Generally includes any information that can
identify a specific individual
Name Address Phone/Fax number
Social security
number
Driver’s license
number
Bar or Student ID
Number
Email address
Mother’s maiden
name
Spouse information
Financial information Medical information Education information
Birth date IP address Signature
What Laws Govern Library
Privacy?
 Federal
 1st Amendment
 Video Privacy Protection Act
 Freedom of Information Act (FOIA)
 Family Educational Rights and Privacy Act
(FERPA)
 State
 Library privacy statutes
 Records retention/destruction statutes
Georgia Library Privacy Statute
Georgia Business Records
Statutes
 O.C.G.A. § 10-11-2. Time period for
retention of business records
 O.C.G.A. § 10-15-2. Disposal of
business records containing personal
information
Privacy Audit
 What is it?
 Whose responsibility is it?
 What is the end product?
What is a Privacy Audit?
 Ensure goals supported by practices
 Protect from liability
 Process, not a one-time event
Whose Responsibility?
End Products
 Privacy policy
 Document retention policy
 Staff training
Preliminary Steps
1. Evaluate existing policies and procedures
2. Compile definitions, including what is
considered PII
3. Identify a process/department to audit
Data
Collected
Protected?
Secure?Test
Destroy
Privacy Audit Cycle
Concluding Steps
 Establish ownership
 Address issues
○ Process Improvement
○ Training
 Repeat periodically
Auditing for PII
 Patron records
 Transaction logs
 Notices for overdue items and fines
 ILL and document delivery records
 Visitor registers
 Reference logs
 Public terminals
Data Collection Considerations
 Why is data being collected?
 Who is collecting?
 Who else has access?
 How stored?
 For how long?
 How will data be destroyed?
Developing a Privacy Policy
 State that privacy and 1st Amendment
rights are protected
 Specifically discuss patron use info related
to books, multimedia resources, and the
internet
 State that general statistical data may be
compiled, but that PII is not included
 Offer an opt-in for contact unrelated to
library activities
 Mention vendors
 Have it reviewed by legal counsel
Record Retention Policies
 Is there a state statute?
 Minimum time to retain
Audit Results
 Existing privacy policy
 Electronic security
 Issues in practice
 Instances of borrowing history revealed
 Papers not secured/shredded
 Processes needed updating
Audit Results – Electronic
Info
 Patron circulation data well protected
 ILS set to only keep current check outs and
unpaid fine information
 Staff not clearing patron data from
circulation computer monitor
 Scanned files need to be manually
deleted
Official Requests
 Law Enforcement
 FOIA
 Open Records Act
Social Security Numbers
 Do not use!
 Check old records
 Redact or destroy
Informal Patron Requests
 Who has Weinstein
on Evidence
checked out?
 Would jury
instructions for child
molestation be civil
or criminal?
Reference Questions
 How do I find information on whether I
have to tell my boss that I’m HIV
positive?
Holds
 Balance patron privacy with need to
know who receives item
 Wrap hold items to cover titles if stored
on an open shelf
Routing Slips
 Routing slips reveal one or more patron
names linked to an item
 Opt in
Law Enforcement Requests
 Separate policy
 Easy reference
 University-wide
THERESA CHMARA, PRIVACY AND
CONFIDENTIALITY ISSUES: A GUIDE FOR
LIBRARIES AND THEIR LAWYERS (2009).
Audit Results – Training
 10-15 student assistants each semester
with a completely new staff every 2
years
 Students are the main circulation desk
contacts
 Training issues/reinforcement
 Reminder sign posted next to the
circulation computer
Audit Results – Paper Problems
 MANY issues
 Inadvertent prints from the circulation
computer
 Copies of checks
 Old student info with social security numbers
 Graded student work left by former
employees
 Staff info page on a bulletin board
 Print copies of sent overdue notices
Inadvertent Printing
Payment Records
 Copies of checks
Overdue and Fine Notices
Rachel Gordon
123 Some Street
Macon, GA 31204
Public Internet Terminals
Components of a Good Privacy
Policy
 Notice of rights & applicable laws
 Choice & consent
 Access & updating
 Data integrity and security
 Data aggregation
 Required disclosures
Related Issues
 Internet security
 Identity theft
 Social engineering

More Related Content

Similar to Library privacy and the privacy audit

Legal Issues in Records Management
Legal Issues in Records ManagementLegal Issues in Records Management
Legal Issues in Records Management
Brad Houston
 
FERPA for Parents
FERPA for ParentsFERPA for Parents
FERPA for Parents
ggcbearessentials
 
Warning how background checks can get your staffing agency in big trouble
Warning how background checks can get your staffing agency in big troubleWarning how background checks can get your staffing agency in big trouble
Warning how background checks can get your staffing agency in big trouble
Mike McCarty
 
UWF-Basic-CE-Training_2018.pptx
UWF-Basic-CE-Training_2018.pptxUWF-Basic-CE-Training_2018.pptx
UWF-Basic-CE-Training_2018.pptx
MWPVivo
 
Ethics confidentiality-technology
Ethics confidentiality-technologyEthics confidentiality-technology
Ethics confidentiality-technology
delaneyl6238
 
Confidentiality Issues with Technology
Confidentiality Issues with TechnologyConfidentiality Issues with Technology
Confidentiality Issues with Technology
medinam0868
 
Handling whistleblower complaints a global perspective for north american c...
Handling whistleblower complaints   a global perspective for north american c...Handling whistleblower complaints   a global perspective for north american c...
Handling whistleblower complaints a global perspective for north american c...
Case IQ
 
General Counsel Presentation
General Counsel PresentationGeneral Counsel Presentation
General Counsel Presentation
Christine Klocke
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
donnajames55
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
cschumley
 
rec_report_counsellors.ppt
rec_report_counsellors.pptrec_report_counsellors.ppt
rec_report_counsellors.ppt
JoshuaPhillCatubig
 
New banner training
New banner trainingNew banner training
New banner training
uvuadvisortraining
 
FERPA tutorial
FERPA tutorial FERPA tutorial
FERPA tutorial
GallaudetRegistrar
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Steve Werby
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
canadianlawyer
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
meritnorthwest
 

Similar to Library privacy and the privacy audit (20)

Legal Issues in Records Management
Legal Issues in Records ManagementLegal Issues in Records Management
Legal Issues in Records Management
 
FERPA for Parents
FERPA for ParentsFERPA for Parents
FERPA for Parents
 
Warning how background checks can get your staffing agency in big trouble
Warning how background checks can get your staffing agency in big troubleWarning how background checks can get your staffing agency in big trouble
Warning how background checks can get your staffing agency in big trouble
 
UWF-Basic-CE-Training_2018.pptx
UWF-Basic-CE-Training_2018.pptxUWF-Basic-CE-Training_2018.pptx
UWF-Basic-CE-Training_2018.pptx
 
Ethics confidentiality-technology
Ethics confidentiality-technologyEthics confidentiality-technology
Ethics confidentiality-technology
 
Confidentiality Issues with Technology
Confidentiality Issues with TechnologyConfidentiality Issues with Technology
Confidentiality Issues with Technology
 
Handling whistleblower complaints a global perspective for north american c...
Handling whistleblower complaints   a global perspective for north american c...Handling whistleblower complaints   a global perspective for north american c...
Handling whistleblower complaints a global perspective for north american c...
 
General Counsel Presentation
General Counsel PresentationGeneral Counsel Presentation
General Counsel Presentation
 
I’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docxI’m attaching some info on the agency I work for. I work remot.docx
I’m attaching some info on the agency I work for. I work remot.docx
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
rec_report_counsellors.ppt
rec_report_counsellors.pptrec_report_counsellors.ppt
rec_report_counsellors.ppt
 
New banner training
New banner trainingNew banner training
New banner training
 
FERPA tutorial
FERPA tutorial FERPA tutorial
FERPA tutorial
 
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werb...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 

Library privacy and the privacy audit

  • 2. What is Privacy? In a library (physical or virtual), the right to privacy is the right to open inquiry without having the subject of one’s interest examined or scrutinized by others. – ALA, An Interpretation of the Library Bill of Rights
  • 3. Privacy and Confidentiality Confidentiality exists when a library is in possession of personally identifiable information about users and keeps that information private on their behalf. – ALA, An Interpretation of the Library Bill of Rights
  • 4. Personally Identifiable Information Generally includes any information that can identify a specific individual Name Address Phone/Fax number Social security number Driver’s license number Bar or Student ID Number Email address Mother’s maiden name Spouse information Financial information Medical information Education information Birth date IP address Signature
  • 5. What Laws Govern Library Privacy?  Federal  1st Amendment  Video Privacy Protection Act  Freedom of Information Act (FOIA)  Family Educational Rights and Privacy Act (FERPA)  State  Library privacy statutes  Records retention/destruction statutes
  • 7. Georgia Business Records Statutes  O.C.G.A. § 10-11-2. Time period for retention of business records  O.C.G.A. § 10-15-2. Disposal of business records containing personal information
  • 8. Privacy Audit  What is it?  Whose responsibility is it?  What is the end product?
  • 9. What is a Privacy Audit?  Ensure goals supported by practices  Protect from liability  Process, not a one-time event
  • 11. End Products  Privacy policy  Document retention policy  Staff training
  • 12. Preliminary Steps 1. Evaluate existing policies and procedures 2. Compile definitions, including what is considered PII 3. Identify a process/department to audit
  • 14. Concluding Steps  Establish ownership  Address issues ○ Process Improvement ○ Training  Repeat periodically
  • 15. Auditing for PII  Patron records  Transaction logs  Notices for overdue items and fines  ILL and document delivery records  Visitor registers  Reference logs  Public terminals
  • 16. Data Collection Considerations  Why is data being collected?  Who is collecting?  Who else has access?  How stored?  For how long?  How will data be destroyed?
  • 17. Developing a Privacy Policy  State that privacy and 1st Amendment rights are protected  Specifically discuss patron use info related to books, multimedia resources, and the internet  State that general statistical data may be compiled, but that PII is not included  Offer an opt-in for contact unrelated to library activities  Mention vendors  Have it reviewed by legal counsel
  • 18. Record Retention Policies  Is there a state statute?  Minimum time to retain
  • 19. Audit Results  Existing privacy policy  Electronic security  Issues in practice  Instances of borrowing history revealed  Papers not secured/shredded  Processes needed updating
  • 20. Audit Results – Electronic Info  Patron circulation data well protected  ILS set to only keep current check outs and unpaid fine information  Staff not clearing patron data from circulation computer monitor  Scanned files need to be manually deleted
  • 21. Official Requests  Law Enforcement  FOIA  Open Records Act
  • 22. Social Security Numbers  Do not use!  Check old records  Redact or destroy
  • 23. Informal Patron Requests  Who has Weinstein on Evidence checked out?  Would jury instructions for child molestation be civil or criminal?
  • 24. Reference Questions  How do I find information on whether I have to tell my boss that I’m HIV positive?
  • 25. Holds  Balance patron privacy with need to know who receives item  Wrap hold items to cover titles if stored on an open shelf
  • 26. Routing Slips  Routing slips reveal one or more patron names linked to an item  Opt in
  • 27. Law Enforcement Requests  Separate policy  Easy reference  University-wide THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR LIBRARIES AND THEIR LAWYERS (2009).
  • 28. Audit Results – Training  10-15 student assistants each semester with a completely new staff every 2 years  Students are the main circulation desk contacts  Training issues/reinforcement  Reminder sign posted next to the circulation computer
  • 29. Audit Results – Paper Problems  MANY issues  Inadvertent prints from the circulation computer  Copies of checks  Old student info with social security numbers  Graded student work left by former employees  Staff info page on a bulletin board  Print copies of sent overdue notices
  • 32. Overdue and Fine Notices Rachel Gordon 123 Some Street Macon, GA 31204
  • 33.
  • 35. Components of a Good Privacy Policy  Notice of rights & applicable laws  Choice & consent  Access & updating  Data integrity and security  Data aggregation  Required disclosures
  • 36. Related Issues  Internet security  Identity theft  Social engineering

Editor's Notes

  1. 3 years; shred, erase, or redact; applies to wide variety of businesses (not government)
  2. Determine what data is being collected and whether it needs to be collected Categorize data based on degree of security required Assess sensitivity, security risks, and public perceptions of collected information Test your security measures Destroy data when time requirements met Repeat for each type of data collected/process that collects it
  3. Problem: 1st Amendment and state library privacy laws protect patrons from exposure of borrowing history Solution: Train staff to respond that they cannot reveal this information, but that they can investigate and recall the item or place a hold. Address ongoing individual training issues as they arise. Student worker asking which jury instructions would have instructions on child molestation. It’s not just the impacted patron, but also the one who overhears and thinks that he can’t ask a question for fear that it will be announced to the entire library.
  4. Reference desks are often centrally placed to encourage patrons to ask questions. Some patrons don’t mind asking sensitive questions in a public area, but others may not be so comfortable. Absent completely rearranging our library, what can we do? Offer patrons a piece of paper to write down a reference question if they look hesitant or offering to move the conversation to a less public area to make them feel more comfortable.
  5. Inadvertent printing happens a lot in our library. The student workers were just recycling the inadvertently printed pages. We trained them to shred any paper that listed a patron name instead of recycling it.
  6. There are a lot of old records in my office because it is large and was used for storage for 4 years while my position was unfilled. One of the things that I found that made me think to do a privacy audit was years worth of copies of checks. With the information on a copy of a check, I have a person’s full name, address, bank name, account number, and signature. An identity thief could do a lot of damage with that information. When I looked into it, I found out that the copies were necessary in case a check was returned for insufficient funds because the university accounting office would just give the amount of the check and the check number, not the name of the person who presented it. So in the audit, we determined that we were collecting this information for a valid reason, but we had no rules for how we stored it, how long we kept it, and how we destroyed it. Now we keep the information only until the checks clear. We have no business need to keep it for any longer. We keep the copies locked up in a spot that only three people have access to, and when we discard the information, we take it to the secure shredder in the registrar’s office.
  7. Records not saved or searchable in our circulation software Print once and then are cleared out We keep a copy of what we’ve sent to patrons with overdue items and fines Was just in a notebook; now locked in a filing cabinet
  8. Students and staff had trouble remembering to clear patron data from the circulation computer. IT could not install a screen saver because of the restrictions on the machine. Compromise was this screen insert that blocks all but straight on viewing of the information on the screen.
  9. Post a notice that terminals are restricted to legal research use. This is likely to be reasonable with respect to your library’s purpose (case law) and gives you support to ask patrons to conduct non-legal research computer use elsewhere.
  10. While you’re keeping an eye out for patron data privacy issues, cast a broader net and you may be able to find related areas where you can save your library or your staff some time and trouble with some small changes/education. BTW, the rolodex is REAL!