SlideShare a Scribd company logo
Privacy and Libraries  in the Digital Age Bradley Shipps IST 618 Survey of Telecommunications and Information Policy November 5, 2007
Privacy laws in the  United States A brief overview
Right to privacy ,[object Object],(Rubin, 2001 also Neuhaus, 2003) The United States Consititution (AP)
Source of right to privacy ,[object Object],[object Object],[object Object],(Image: http://www.schorsch.com/kbase/glossary/penumbra.html)
Supreme Court on privacy ,[object Object],[object Object],[object Object],The United States Supreme Court   (AP)
Privacy in libraries Why is privacy important in libraries?
ALA on Privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],(AP)
Legal protection of privacy in libraries
State laws on privacy in libraries ,[object Object]
Types of state laws ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NY Statute, cont. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Librarians’ professional commitment to privacy
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of best practices ,[object Object],[object Object],[object Object],[object Object]
[object Object],Charleston County Public Library Staff Day (Image: mstephens7, http://flickr.com/photos/michaelsphotos/475515141/)
Legal challenges to privacy in libraries
[object Object],[object Object],(Image: sunside,  http://flickr.com/photos/10832246@N06/1433052868/)
Challenge: ,[object Object],[object Object],(AP)
Response: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenge: ,[object Object],[object Object],[object Object],[object Object]
Response: ,[object Object],[object Object],[object Object],(AP)
Response: ,[object Object],[object Object],[object Object],[object Object]
Best Practices: ,[object Object],[object Object],[object Object],[object Object]
[object Object],Four Connecticut librarians sought help from the ACLU after the FBI demanded patron records through a National Security Letter. (AP)
Technological Challenges to Privacy
March 21, 2006 - FBI agents followed terror suspect Syed Ahmed into the Chestatee Regional Library in Dawsonville, Georgia. After Ahmed left the library, the agents accessed the browser history of the computer.  The FBI agents did not have a search warrant.  Syed Ahmed (AP)
“ The actions of the government agent,  contrary to the policies and procedures of the library … violated the defendant’s reasonable expectations of privacy.”  - Jack Martin, attorney for Syed Ahmed (Terror suspect, 2007) Technology allowed federal agents to bypass library policy….
Digital library transactions involve outside parties, such as software developers, database vendors, or Internet service providers. Existing laws and policies may not protect privacy of digital transactions.  None of the existing state laws specifically discuss privacy of digital reference records.  (Neuhaus, 2003)
Technology challenge: ,[object Object],[object Object],(AP)
Privacy issue: ,[object Object],[object Object],[object Object]
Technology challenge: ,[object Object],[object Object],(AP)
Privacy issue: ,[object Object],[object Object],(AP)
Technology challenge: ,[object Object],[object Object],[object Object],[object Object]
Privacy issue: ,[object Object],[object Object],[object Object],(Image: M.J.S., http://flickr.com/photos/booksnake/171233840/)
Conclusion ,[object Object],(Image: NJLA,  http://flickr.com/photos/njla/473873371/)
Policy Recommendations
Librarians should… ,[object Object],[object Object],[object Object],[object Object]
Librarians should… ,[object Object],[object Object],[object Object],[object Object]
Librarians should… ,[object Object],[object Object],[object Object]
Works Cited American Library Association. (1988, July 13).  Resolution in opposition to FBI Library Awareness Program (88.07.13 #77.4) . Retrieved October 21, 2007, from  http://www.ala.org/ala/godort/godortresolutions/19880713153.htm   _____. (1995, June 28).  Code of ethics of the American Library Association.  Retrieved October 19, 2007, from   http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm   _____. (2002, January 23) .  Resolution reaffirming the principles of intellectual freedom in the aftermath of terrorist attacks.  Retrieved October 13, 2007, from  http://www.ala.org/Template.cfm?Section=ifresolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=78173   _____. (2002, June 19).  Privacy: an interpretation of the Library Bill of Rights.  Retrieved October 19, 2007, from   http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=132904   American Society for Information Science and Technology. (1992, May 30).  ASIS&T Professional Guidelines . Retrieved October 19, 2007, from   http://www.asis.org/AboutASIS/professional-guidelines.html Fourie, D. K. & Dowell, D. R. (2002).  Libraries in the information age: An introduction and career exploration . Greenwood Village, CO: Libraries Unlimited.
Works Cited, cont. International Federation of Library Associations and Institutions. (2002, August 19).  The Glasgow Declaration on Libraries, Information Services and Intellectual Freedom . Retrieved October 20, 2007 from  http://www.ifla.org/faife/policy/iflastat/gldeclar-e.html   Merriam-Webster Online . (n.d.). Retrieved October 20, 2007, from  http://www.merriam-webster.com/dictionary/penumbra   Neuhaus, P. (2003). Privacy and confidentiality in digital reference [Electronic version].  Reference and User Services Quarterly, 43 (1), 26-36. Rubin, R. E. (2001). Ethical aspects of reference service. In R. E. Bopp & L. C. Smith (Eds.),  Reference and information services: An introduction  (3 rd  ed., pp. 28-46). Englewood, CO: Libraries Unlimited. _____. (2004).  Foundations of library and information science  (2 nd  ed.). New York: Neal-Schuman. Terror suspect says FBI spied on his library computer use. (2007, October 11).  The International Herald Tribune.  Retrieved October 12, 2007, from  http://www.iht.com/articles/ap/2007/10/11/america/NA-GEN-US-Terrorism-Arrests.php

More Related Content

What's hot

Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends
Kaustav Saha
 

What's hot (20)

New trends and skill in library automation: impact of Artificial Intelligence...
New trends and skill in library automation: impact of Artificial Intelligence...New trends and skill in library automation: impact of Artificial Intelligence...
New trends and skill in library automation: impact of Artificial Intelligence...
 
Impact of Artificial Intelligence (AI) on Libraries
Impact of Artificial Intelligence (AI) on Libraries Impact of Artificial Intelligence (AI) on Libraries
Impact of Artificial Intelligence (AI) on Libraries
 
The Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information LiteracyThe Role of Libraries and Librarians in Information Literacy
The Role of Libraries and Librarians in Information Literacy
 
Use and user study
Use and user study Use and user study
Use and user study
 
Oclc
OclcOclc
Oclc
 
Library congress subject headings
Library congress subject headings Library congress subject headings
Library congress subject headings
 
INFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICESINFORMATION SOURCES AND SERVICES
INFORMATION SOURCES AND SERVICES
 
User education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practicesUser education and information literacy - Innovative strategies and practices
User education and information literacy - Innovative strategies and practices
 
Library and information policy at national and international 1
Library and information policy at national and international 1Library and information policy at national and international 1
Library and information policy at national and international 1
 
User Education: what is it and why is it important?
User Education: what is it and why is it important?User Education: what is it and why is it important?
User Education: what is it and why is it important?
 
Intellectual Freedom
Intellectual FreedomIntellectual Freedom
Intellectual Freedom
 
Library Censorship
Library CensorshipLibrary Censorship
Library Censorship
 
New trends in Libraries with IT, AI & i4.0
New trends in Libraries with IT, AI & i4.0New trends in Libraries with IT, AI & i4.0
New trends in Libraries with IT, AI & i4.0
 
Ontology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical StudyOntology and Ontology Libraries: a Critical Study
Ontology and Ontology Libraries: a Critical Study
 
Open access resources in LIS education
Open access resources in LIS educationOpen access resources in LIS education
Open access resources in LIS education
 
Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends Integrated Library Management System to Resource Discovery : Recent Trends
Integrated Library Management System to Resource Discovery : Recent Trends
 
Collection development
Collection developmentCollection development
Collection development
 
Evolution of Digital Libraries
Evolution of Digital LibrariesEvolution of Digital Libraries
Evolution of Digital Libraries
 
Attributes of universe of knowledge
Attributes of universe of knowledgeAttributes of universe of knowledge
Attributes of universe of knowledge
 
SEARS LIST OF SUBJECT HEADINGS (PRACTICE)
SEARS LIST OF SUBJECT HEADINGS (PRACTICE)SEARS LIST OF SUBJECT HEADINGS (PRACTICE)
SEARS LIST OF SUBJECT HEADINGS (PRACTICE)
 

Viewers also liked

Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014
Hugo Kerschot
 
Paintings by Jeroen Molenaar
Paintings by Jeroen MolenaarPaintings by Jeroen Molenaar
Paintings by Jeroen Molenaar
Jeroen Molenaar
 
Mi proyecto de vida vanessa
Mi proyecto de vida  vanessaMi proyecto de vida  vanessa
Mi proyecto de vida vanessa
IE Simona Duque
 
Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011
Cindy Royal
 
ամառ
ամառամառ
ամառ
ganyan
 
日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス
tomokiyo-n
 
Diplom Sverigehälsan
Diplom SverigehälsanDiplom Sverigehälsan
Diplom Sverigehälsan
Tilde Westrup
 

Viewers also liked (20)

Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014Ecim smart mobility issy 13032014
Ecim smart mobility issy 13032014
 
Cultivating Mid-Level Donors
Cultivating Mid-Level DonorsCultivating Mid-Level Donors
Cultivating Mid-Level Donors
 
SIO_110_syllabus
SIO_110_syllabusSIO_110_syllabus
SIO_110_syllabus
 
SXTXState Final Presentation
SXTXState Final PresentationSXTXState Final Presentation
SXTXState Final Presentation
 
Housewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by RathipriyaHousewives Guide To Teach Children - Tamil Version by Rathipriya
Housewives Guide To Teach Children - Tamil Version by Rathipriya
 
Happy buyer
Happy buyerHappy buyer
Happy buyer
 
liceo de pakil Alumni reg. form 2011
liceo de pakil Alumni reg. form 2011liceo de pakil Alumni reg. form 2011
liceo de pakil Alumni reg. form 2011
 
4150415
41504154150415
4150415
 
Paintings by Jeroen Molenaar
Paintings by Jeroen MolenaarPaintings by Jeroen Molenaar
Paintings by Jeroen Molenaar
 
求人掲載マニュアル
求人掲載マニュアル求人掲載マニュアル
求人掲載マニュアル
 
Test Dependencies and the Future of Build Acceleration
Test Dependencies and the Future of Build AccelerationTest Dependencies and the Future of Build Acceleration
Test Dependencies and the Future of Build Acceleration
 
Awkward Originals
Awkward OriginalsAwkward Originals
Awkward Originals
 
carolina!
carolina!carolina!
carolina!
 
Mi proyecto de vida vanessa
Mi proyecto de vida  vanessaMi proyecto de vida  vanessa
Mi proyecto de vida vanessa
 
Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011Trends in Online Media - ASNE 2011
Trends in Online Media - ASNE 2011
 
Tecnologia salud
Tecnologia saludTecnologia salud
Tecnologia salud
 
ամառ
ամառամառ
ամառ
 
日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス日本&仏リハビリテーションコングレス
日本&仏リハビリテーションコングレス
 
How to Study New Ones
How to Study New OnesHow to Study New Ones
How to Study New Ones
 
Diplom Sverigehälsan
Diplom SverigehälsanDiplom Sverigehälsan
Diplom Sverigehälsan
 

Similar to Privacy and Libraries

Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
Rachel
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Paper
eward511
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
elinoraudley582231
 
Legal Ethics And Professional Conduct
Legal Ethics And Professional ConductLegal Ethics And Professional Conduct
Legal Ethics And Professional Conduct
legalinfo
 

Similar to Privacy and Libraries (20)

Niso library law
Niso library lawNiso library law
Niso library law
 
Privacy and security 815
Privacy and security 815Privacy and security 815
Privacy and security 815
 
CIPA Policy Tracking Paper
CIPA Policy Tracking PaperCIPA Policy Tracking Paper
CIPA Policy Tracking Paper
 
Patron Privacy in Libraries
Patron Privacy in LibrariesPatron Privacy in Libraries
Patron Privacy in Libraries
 
Privacy Audits in Law Libraries
Privacy Audits in Law LibrariesPrivacy Audits in Law Libraries
Privacy Audits in Law Libraries
 
Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...Ownership, intellectual property, and governance considerations for academic ...
Ownership, intellectual property, and governance considerations for academic ...
 
Data, librarians, and services
Data, librarians, and servicesData, librarians, and services
Data, librarians, and services
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008
 
Rl1.1 dm defined
Rl1.1 dm definedRl1.1 dm defined
Rl1.1 dm defined
 
ILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all TogetherILL & Copyright: Putting it all Together
ILL & Copyright: Putting it all Together
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docxDOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
DOCUMENT RESUMEED 479 254 IR 022 044AUTHOR Alexander, .docx
 
Legal Ethics And Professional Conduct
Legal Ethics And Professional ConductLegal Ethics And Professional Conduct
Legal Ethics And Professional Conduct
 
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
Laura Quilter NISO Privacy Meeting #4 - June 19, 2015
 
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNINGBLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
BLACK FUTURES: COLLECTING SOCIOCULTURAL DATA THROUGH MACHINE LEARNING
 
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...Peter Doorn -  Data Protection Issues for Trusted Digital Repositories: Chall...
Peter Doorn - Data Protection Issues for Trusted Digital Repositories: Chall...
 
Mam assign
Mam assignMam assign
Mam assign
 
LIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project postersLIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project posters
 
IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK IAMSLIC 2012, ANCHORAGE, AK
IAMSLIC 2012, ANCHORAGE, AK
 

More from Bradley Shipps

More from Bradley Shipps (10)

Reference Interview 101
Reference Interview 101Reference Interview 101
Reference Interview 101
 
Rules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the LibraryRules of Conduct and Banning Patrons from the Library
Rules of Conduct and Banning Patrons from the Library
 
Adventures in Digitization
Adventures in DigitizationAdventures in Digitization
Adventures in Digitization
 
Web 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteersWeb 2.0 a crash course for VISTA volunteers
Web 2.0 a crash course for VISTA volunteers
 
Twitter @Fayfree
Twitter @FayfreeTwitter @Fayfree
Twitter @Fayfree
 
Intro to CNY Heritage - updated
Intro to CNY Heritage - updatedIntro to CNY Heritage - updated
Intro to CNY Heritage - updated
 
Indexing Photographs
Indexing PhotographsIndexing Photographs
Indexing Photographs
 
Cataloging Games
Cataloging GamesCataloging Games
Cataloging Games
 
e-Gyptian Expedition
e-Gyptian Expeditione-Gyptian Expedition
e-Gyptian Expedition
 
Intro to CNY Heritage
Intro to CNY HeritageIntro to CNY Heritage
Intro to CNY Heritage
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 

Privacy and Libraries

  • 1. Privacy and Libraries in the Digital Age Bradley Shipps IST 618 Survey of Telecommunications and Information Policy November 5, 2007
  • 2. Privacy laws in the United States A brief overview
  • 3.
  • 4.
  • 5.
  • 6. Privacy in libraries Why is privacy important in libraries?
  • 7.
  • 8. Legal protection of privacy in libraries
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Legal challenges to privacy in libraries
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29. March 21, 2006 - FBI agents followed terror suspect Syed Ahmed into the Chestatee Regional Library in Dawsonville, Georgia. After Ahmed left the library, the agents accessed the browser history of the computer. The FBI agents did not have a search warrant. Syed Ahmed (AP)
  • 30. “ The actions of the government agent, contrary to the policies and procedures of the library … violated the defendant’s reasonable expectations of privacy.” - Jack Martin, attorney for Syed Ahmed (Terror suspect, 2007) Technology allowed federal agents to bypass library policy….
  • 31. Digital library transactions involve outside parties, such as software developers, database vendors, or Internet service providers. Existing laws and policies may not protect privacy of digital transactions. None of the existing state laws specifically discuss privacy of digital reference records. (Neuhaus, 2003)
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 40.
  • 41.
  • 42.
  • 43. Works Cited American Library Association. (1988, July 13). Resolution in opposition to FBI Library Awareness Program (88.07.13 #77.4) . Retrieved October 21, 2007, from http://www.ala.org/ala/godort/godortresolutions/19880713153.htm _____. (1995, June 28). Code of ethics of the American Library Association. Retrieved October 19, 2007, from http://www.ala.org/ala/oif/statementspols/codeofethics/codeethics.htm _____. (2002, January 23) . Resolution reaffirming the principles of intellectual freedom in the aftermath of terrorist attacks. Retrieved October 13, 2007, from http://www.ala.org/Template.cfm?Section=ifresolutions&Template=/ContentManagement/ContentDisplay.cfm&ContentID=78173 _____. (2002, June 19). Privacy: an interpretation of the Library Bill of Rights. Retrieved October 19, 2007, from http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=132904 American Society for Information Science and Technology. (1992, May 30). ASIS&T Professional Guidelines . Retrieved October 19, 2007, from http://www.asis.org/AboutASIS/professional-guidelines.html Fourie, D. K. & Dowell, D. R. (2002). Libraries in the information age: An introduction and career exploration . Greenwood Village, CO: Libraries Unlimited.
  • 44. Works Cited, cont. International Federation of Library Associations and Institutions. (2002, August 19). The Glasgow Declaration on Libraries, Information Services and Intellectual Freedom . Retrieved October 20, 2007 from http://www.ifla.org/faife/policy/iflastat/gldeclar-e.html Merriam-Webster Online . (n.d.). Retrieved October 20, 2007, from http://www.merriam-webster.com/dictionary/penumbra Neuhaus, P. (2003). Privacy and confidentiality in digital reference [Electronic version]. Reference and User Services Quarterly, 43 (1), 26-36. Rubin, R. E. (2001). Ethical aspects of reference service. In R. E. Bopp & L. C. Smith (Eds.), Reference and information services: An introduction (3 rd ed., pp. 28-46). Englewood, CO: Libraries Unlimited. _____. (2004). Foundations of library and information science (2 nd ed.). New York: Neal-Schuman. Terror suspect says FBI spied on his library computer use. (2007, October 11). The International Herald Tribune. Retrieved October 12, 2007, from http://www.iht.com/articles/ap/2007/10/11/america/NA-GEN-US-Terrorism-Arrests.php