SlideShare a Scribd company logo
Privacy Audits in the Law Library
What is a privacy audit?
 Review existing privacy policies
 Evaluate practices to ensure compliance
with goals/policies
 Protect from liability
Federal Laws
 1st Amendment: right to not have the subject of your interest scruti-
nized
 Video Privacy Protection Act: video borrowing data protected
 Freedom of Information Act: certain libraries may have to disclose
certain information
 Family Educational Rights and Privacy Act (FERPA)
State Laws
 Privacy: look for statutes governing privacy of business records
 Library privacy: most states have statutes (2 have AG Opinions)
 Records retention/destruction: timeframe for retention/destruction
may be set by statute for certain data in certain libraries
 Open records: libraries receiving public funds may have to disclose
certain information
Definitions:
Privacy: the right to open inquiry without having the
subject of one’s interest examined or scrutinized by others. (ALA)
Confidentiality: exists when a library is in possession of personally
identifiable information about users and keeps that information private
on their behalf. (ALA)
Personally Identifiable Information (PII): Information that alone or in
conjunction with other data points can identify a specific individual. See
diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it
needs to be collected, and how long it should be retained
Areas to audit
 Circulation data (what is collected?, who can see data on screen?,
what happens to inadvertent prints?, how are histories managed?)
 Payments received (do you keep copies of checks/credit card
receipts?)
 Reference logs (keep general statistics but nothing that identifies an
individual)
 Public computer settings and logs (level of tracking, filter settings)
 Holds (cover names if shown on materials)
 Fines & notices (paper records should be secured if retained)
Components of a good privacy policy
 Notice of rights and applicable laws: definitions and standards set
 Choice and consent: opt-in for contact not related to library activities
 Access and updating: provide users access to own data
 Data integrity and security: state what is retained and for how long
 Data aggregation: PII not included, aggregate data may be disclosed
 Required disclosures: law enforcement compliance
Initial Considerations/Questions
 What laws apply in your state?
 Does your library have an existing privacy policy?
 Who is/will be responsible for the policies?
 Will the policies apply to one library or several across an institution?
Audit—Step 2: Categorize the data based on degree of security needed
Sample categories
 Public: can be disclosed freely
 Confidential: may be subject to disclosure under open records laws
 Sensitive: includes PII , cannot be disclosed by law, policy, or
contractual obligation
Audit—Step 4: Train staff & test your security measures
 Engage staff during audit process to gain buy-in
 Student workers may handle some privacy-related requests, so
include privacy issues in their initial training and provide refresher
training periodically to keep knowledge fresh.
 Use scenarios to develop a deeper understanding of the reasoning
behind a policy.
 Spend time observing interactions at the reference and circulation
desks to ensure that practice matches goals/policies.
Audit—Step 3: Assess sensitivity, security risks, and public percep-
tions of collected information
 Assure that access is restricted to staff who need the information.
 Only collect what is reasonably necessary to library functions.
 Assess how information is stored and ensure security
 Identify staff members responsible for ongoing data privacy/audits
Audit—Step 5: Destroy data at correct time in the correct manner
 Check for statutes governing time of retention/destruction (even if
they apply to different types of data/organizations they can be
valuable as guidelines).
 Check for statutes governing manner of destruction (GA options are
erase, shred, redact).
 Don’t retain things indefinitely because you don’t know what to do
with them. Examine the process and determine why you’re keeping
something in order to determine how long you reasonably need to
keep it.
Resources
Audit Checklist
Rachel Gordon For a copy of this poster:
Mercer University School of Law
Macon, Georgia
gordon_r@law.mercer.edu
ALA Materials
 Privacy: An Interpretation of the Library Bill of Rights:
www.ala.org/Template.cfm?
Section=interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=34182
 Questions & Answers on Privacy and Confidentiality:
www.ala.org/Template.cfm?
Section=Interpretations&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=15347
 Policy Concerning Confidentiality of Personally Identifiable
Information About Library Users: www.ala.org/Template.cfm?
Section=otherpolicies&Template=/ContentManagement/
ContentDisplay.cfm&ContentID=13087
 Privacy Tool Kit: www.ala.org/advocacy/
privacyconfidentiality/toolkitsprivacy/privacy
 Office for Intellectual Freedom, State Privacy Laws:
www.ala.org/offices/oif/ifgroups/stateifcchairs/
stateifcinaction/stateprivacy
Books and Articles
 THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR
LIBRARIES AND THEIR LAWYERS (2009). Very detailed information
on how to handle various types of law enforcement requests.
 PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND
INFORMATION PROFESSIONALS (2008). Explains privacy-related
causes of action in tort.
 Anne Klinefelter, First Amendment Limits on Library Collection
Management, 102 L. LIBRARY J. 343 (Summer, 2010).
 Anne Klinefelter, Privacy and Library Public Services: Or, I
Know What You Read Last Summer, 26 LEGAL REFERENCE SER-
VICES Q. 253 (2007).
 Ann Mackay Snowman, Privacy and Confidentiality: Using
Scenarios to Teach Your Staff about Patron’s Rights, 10 J.
ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to
reinforce staff training on patron privacy.
 Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477
(2006). Good overview of privacy law.
Selected Library Privacy Policies
 library.law.unc.edu/about/policies/privacy
 www.lib.wayne.edu/info/policies/privacy.php
 briefs.lalawlibrary.org/about/privacy.aspx
1. When do we collect information? (Identify the process)
2. What information is being collected?
o Name
o Mailing Address
o Email Address
o Phone/Fax Number
o ID Number (Student ID, Driver’s License, or Bar Number)
o Age/DOB
o Ethnicity
o Marital Status
o Gender
o Medical Information
o Mother’s Maiden Name
o Spouse Information
o Financial Information
o Educational Information
o IP Address
o Signature
3. Why is the information being collected?
4. Who is collecting this information?
5. Who else uses or has access to the information?
6. How is this information being kept, and for how long?
7. Where is this information being kept?
8. How is the information being used?
9. How is the information secured?
10. How and when is the information destroyed?

More Related Content

What's hot

Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
London School of Hygiene and Tropical Medicine
 
Next generation data services at the Marriott Library
Next generation data services at the Marriott LibraryNext generation data services at the Marriott Library
Next generation data services at the Marriott Library
Rebekah Cummings
 
Data management federal requirements 9 2015
Data management federal requirements 9 2015Data management federal requirements 9 2015
Data management federal requirements 9 2015
UT MD Anderson Cancer Center Research Medical Library
 
Data Management - Lynn Woolfrey
Data Management - Lynn WoolfreyData Management - Lynn Woolfrey
Data Management - Lynn Woolfrey
pvhead123
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
Dalal Rahme
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
Rebekah Cummings
 
Case studyworkshoponprovenance
Case studyworkshoponprovenanceCase studyworkshoponprovenance
Case studyworkshoponprovenance
Khalid Belhajjame
 

What's hot (7)

Shareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your ResearchShareable by Design: Making Better Use of your Research
Shareable by Design: Making Better Use of your Research
 
Next generation data services at the Marriott Library
Next generation data services at the Marriott LibraryNext generation data services at the Marriott Library
Next generation data services at the Marriott Library
 
Data management federal requirements 9 2015
Data management federal requirements 9 2015Data management federal requirements 9 2015
Data management federal requirements 9 2015
 
Data Management - Lynn Woolfrey
Data Management - Lynn WoolfreyData Management - Lynn Woolfrey
Data Management - Lynn Woolfrey
 
Research Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal RahmeResearch Data Services Best Practices by Dalal Rahme
Research Data Services Best Practices by Dalal Rahme
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Case studyworkshoponprovenance
Case studyworkshoponprovenanceCase studyworkshoponprovenance
Case studyworkshoponprovenance
 

Viewers also liked

Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015
Agrupación Guerrero
 
Conferencia d anido_abril2010_def
Conferencia d anido_abril2010_defConferencia d anido_abril2010_def
Conferencia d anido_abril2010_def
Universidad Politécnica de Valencia
 
Rapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentRapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatment
NHS Improvement
 
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Fernando Farias
 
Turismo Parroquia Purunuma
Turismo Parroquia PurunumaTurismo Parroquia Purunuma
Turismo Parroquia Purunuma
Castilloeli
 
Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16
IfimBSchool
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correção
Alexandre Ribeiro
 
Wild Dog Design - Websites
Wild Dog Design - WebsitesWild Dog Design - Websites
Wild Dog Design - Websites
wilddogdesign
 
eCommerce homepage pop-up
eCommerce homepage pop-upeCommerce homepage pop-up
eCommerce homepage pop-up
MineWhat
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015
MAYANK SHARMA
 
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
HAGELE kantoormeubilair
 
Paseo en velero
Paseo en veleroPaseo en velero
Paseo en velero
globalturismo
 
Mundo Plano 2
Mundo Plano 2Mundo Plano 2
Mundo Plano 2
andres lopez astudillo
 
Enjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DEEnjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DE
Laguna Poreč
 
Eyetouch
Eyetouch Eyetouch
Eyetouch
glide93
 
Soporteusuario
SoporteusuarioSoporteusuario
Soporteusuario
repacomputo
 
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Beniamino Murgante
 
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT SPA - SYS-DAT Group
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de español
COLEGIO JOSÉ SARTO
 

Viewers also liked (20)

Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015Catalogo Merchandising 2014-2015
Catalogo Merchandising 2014-2015
 
Conferencia d anido_abril2010_def
Conferencia d anido_abril2010_defConferencia d anido_abril2010_def
Conferencia d anido_abril2010_def
 
M&d formazione la metafora del ristorante ita eng
M&d formazione   la metafora del ristorante ita engM&d formazione   la metafora del ristorante ita eng
M&d formazione la metafora del ristorante ita eng
 
Rapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatmentRapid review of current service provision following cancer treatment
Rapid review of current service provision following cancer treatment
 
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
Costo de Oxígeno Pico Luego de Series de Ejercicios con Sobrecarga: Fundament...
 
Turismo Parroquia Purunuma
Turismo Parroquia PurunumaTurismo Parroquia Purunuma
Turismo Parroquia Purunuma
 
Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16Ifim b school prospectus 2014 16
Ifim b school prospectus 2014 16
 
08 adesivos, corte e correção
08   adesivos, corte e correção08   adesivos, corte e correção
08 adesivos, corte e correção
 
Wild Dog Design - Websites
Wild Dog Design - WebsitesWild Dog Design - Websites
Wild Dog Design - Websites
 
eCommerce homepage pop-up
eCommerce homepage pop-upeCommerce homepage pop-up
eCommerce homepage pop-up
 
DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015DEFINITIVE_PROGRAM_IWBBIO_2015
DEFINITIVE_PROGRAM_IWBBIO_2015
 
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
Cascando design accessoires voor thuis en op kantoor, bij HAGELE kantoormeubi...
 
Paseo en velero
Paseo en veleroPaseo en velero
Paseo en velero
 
Mundo Plano 2
Mundo Plano 2Mundo Plano 2
Mundo Plano 2
 
Enjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DEEnjoy Istra, spring 2014: EN_DE
Enjoy Istra, spring 2014: EN_DE
 
Eyetouch
Eyetouch Eyetouch
Eyetouch
 
Soporteusuario
SoporteusuarioSoporteusuario
Soporteusuario
 
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
Geometrical DCC-Algorithm for Merging Polygonal Geospatial Data - Silvija Sta...
 
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - EstrattoSYS-DAT per il Fashion - SAP Business One In One Day - Estratto
SYS-DAT per il Fashion - SAP Business One In One Day - Estratto
 
Trabajo de español
Trabajo de españolTrabajo de español
Trabajo de español
 

Similar to Privacy Audits in Law Libraries

Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
Columbia Unviersity Scholarly Communication Program
 
Levine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal ConsiderationsLevine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal Considerations
National Information Standards Organization (NISO)
 
Niso library law
Niso library lawNiso library law
Niso library law
Micah Altman
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
urvashipundir04
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
Saide OER Africa
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
ARDC
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
London School of Hygiene and Tropical Medicine
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
AsefaAdimasu2
 
Data Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesData Management Lab: Session 4 Slides
Data Management Lab: Session 4 Slides
IUPUI
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
StephenGwadi
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
Renaine Julian
 
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxPR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
ChristopherMaldicas
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Project
 
Data Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsData Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructions
IUPUI
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
Kathryn Houk
 
Research data life cycle
Research data life cycleResearch data life cycle
Research data life cycle
University of Arizona
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
Brad Houston
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
Brad Houston
 
RDM: a briefing for Health Sciences
RDM: a briefing for Health SciencesRDM: a briefing for Health Sciences
RDM: a briefing for Health Sciences
University of York Library
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
AmirKhan811717
 

Similar to Privacy Audits in Law Libraries (20)

Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
 
Levine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal ConsiderationsLevine - Data Curation; Ethics and Legal Considerations
Levine - Data Curation; Ethics and Legal Considerations
 
Niso library law
Niso library lawNiso library law
Niso library law
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
FSCI Sharing sensitive data
FSCI Sharing sensitive dataFSCI Sharing sensitive data
FSCI Sharing sensitive data
 
Preparing Research Data for Sharing
Preparing Research Data for SharingPreparing Research Data for Sharing
Preparing Research Data for Sharing
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Data Management Lab: Session 4 Slides
Data Management Lab: Session 4 SlidesData Management Lab: Session 4 Slides
Data Management Lab: Session 4 Slides
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
You down with dmp yeah you know me!
You down with dmp  yeah you know me!You down with dmp  yeah you know me!
You down with dmp yeah you know me!
 
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptxPR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
PR1 UNIT 1-NATURE AND INQUIRY OF RESEARCH.pptx
 
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM PolicyLEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
LEARN Final Conference: Tutorial Group | Using the LEARN Model RDM Policy
 
Data Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructionsData Management Lab: Data management plan instructions
Data Management Lab: Data management plan instructions
 
Conquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data ManagementConquering Chaos in the Age of Networked Science: Research Data Management
Conquering Chaos in the Age of Networked Science: Research Data Management
 
Research data life cycle
Research data life cycleResearch data life cycle
Research data life cycle
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
Data management plans (dmp) for nsf
Data management plans (dmp) for nsfData management plans (dmp) for nsf
Data management plans (dmp) for nsf
 
RDM: a briefing for Health Sciences
RDM: a briefing for Health SciencesRDM: a briefing for Health Sciences
RDM: a briefing for Health Sciences
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Privacy Audits in Law Libraries

  • 1. Privacy Audits in the Law Library What is a privacy audit?  Review existing privacy policies  Evaluate practices to ensure compliance with goals/policies  Protect from liability Federal Laws  1st Amendment: right to not have the subject of your interest scruti- nized  Video Privacy Protection Act: video borrowing data protected  Freedom of Information Act: certain libraries may have to disclose certain information  Family Educational Rights and Privacy Act (FERPA) State Laws  Privacy: look for statutes governing privacy of business records  Library privacy: most states have statutes (2 have AG Opinions)  Records retention/destruction: timeframe for retention/destruction may be set by statute for certain data in certain libraries  Open records: libraries receiving public funds may have to disclose certain information Definitions: Privacy: the right to open inquiry without having the subject of one’s interest examined or scrutinized by others. (ALA) Confidentiality: exists when a library is in possession of personally identifiable information about users and keeps that information private on their behalf. (ALA) Personally Identifiable Information (PII): Information that alone or in conjunction with other data points can identify a specific individual. See diagram below for examples. Audit—Step 1: Determine what data is being collected, whether it needs to be collected, and how long it should be retained Areas to audit  Circulation data (what is collected?, who can see data on screen?, what happens to inadvertent prints?, how are histories managed?)  Payments received (do you keep copies of checks/credit card receipts?)  Reference logs (keep general statistics but nothing that identifies an individual)  Public computer settings and logs (level of tracking, filter settings)  Holds (cover names if shown on materials)  Fines & notices (paper records should be secured if retained) Components of a good privacy policy  Notice of rights and applicable laws: definitions and standards set  Choice and consent: opt-in for contact not related to library activities  Access and updating: provide users access to own data  Data integrity and security: state what is retained and for how long  Data aggregation: PII not included, aggregate data may be disclosed  Required disclosures: law enforcement compliance Initial Considerations/Questions  What laws apply in your state?  Does your library have an existing privacy policy?  Who is/will be responsible for the policies?  Will the policies apply to one library or several across an institution? Audit—Step 2: Categorize the data based on degree of security needed Sample categories  Public: can be disclosed freely  Confidential: may be subject to disclosure under open records laws  Sensitive: includes PII , cannot be disclosed by law, policy, or contractual obligation Audit—Step 4: Train staff & test your security measures  Engage staff during audit process to gain buy-in  Student workers may handle some privacy-related requests, so include privacy issues in their initial training and provide refresher training periodically to keep knowledge fresh.  Use scenarios to develop a deeper understanding of the reasoning behind a policy.  Spend time observing interactions at the reference and circulation desks to ensure that practice matches goals/policies. Audit—Step 3: Assess sensitivity, security risks, and public percep- tions of collected information  Assure that access is restricted to staff who need the information.  Only collect what is reasonably necessary to library functions.  Assess how information is stored and ensure security  Identify staff members responsible for ongoing data privacy/audits Audit—Step 5: Destroy data at correct time in the correct manner  Check for statutes governing time of retention/destruction (even if they apply to different types of data/organizations they can be valuable as guidelines).  Check for statutes governing manner of destruction (GA options are erase, shred, redact).  Don’t retain things indefinitely because you don’t know what to do with them. Examine the process and determine why you’re keeping something in order to determine how long you reasonably need to keep it. Resources Audit Checklist Rachel Gordon For a copy of this poster: Mercer University School of Law Macon, Georgia gordon_r@law.mercer.edu ALA Materials  Privacy: An Interpretation of the Library Bill of Rights: www.ala.org/Template.cfm? Section=interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=34182  Questions & Answers on Privacy and Confidentiality: www.ala.org/Template.cfm? Section=Interpretations&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=15347  Policy Concerning Confidentiality of Personally Identifiable Information About Library Users: www.ala.org/Template.cfm? Section=otherpolicies&Template=/ContentManagement/ ContentDisplay.cfm&ContentID=13087  Privacy Tool Kit: www.ala.org/advocacy/ privacyconfidentiality/toolkitsprivacy/privacy  Office for Intellectual Freedom, State Privacy Laws: www.ala.org/offices/oif/ifgroups/stateifcchairs/ stateifcinaction/stateprivacy Books and Articles  THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR LIBRARIES AND THEIR LAWYERS (2009). Very detailed information on how to handle various types of law enforcement requests.  PAUL D. HEALEY, PROFESSIONAL LIABILITY ISSUES FOR LIBRARIANS AND INFORMATION PROFESSIONALS (2008). Explains privacy-related causes of action in tort.  Anne Klinefelter, First Amendment Limits on Library Collection Management, 102 L. LIBRARY J. 343 (Summer, 2010).  Anne Klinefelter, Privacy and Library Public Services: Or, I Know What You Read Last Summer, 26 LEGAL REFERENCE SER- VICES Q. 253 (2007).  Ann Mackay Snowman, Privacy and Confidentiality: Using Scenarios to Teach Your Staff about Patron’s Rights, 10 J. ACCESS SERVICES 120 (Mar. 2013). Contains sample scenarios to reinforce staff training on patron privacy.  Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477 (2006). Good overview of privacy law. Selected Library Privacy Policies  library.law.unc.edu/about/policies/privacy  www.lib.wayne.edu/info/policies/privacy.php  briefs.lalawlibrary.org/about/privacy.aspx 1. When do we collect information? (Identify the process) 2. What information is being collected? o Name o Mailing Address o Email Address o Phone/Fax Number o ID Number (Student ID, Driver’s License, or Bar Number) o Age/DOB o Ethnicity o Marital Status o Gender o Medical Information o Mother’s Maiden Name o Spouse Information o Financial Information o Educational Information o IP Address o Signature 3. Why is the information being collected? 4. Who is collecting this information? 5. Who else uses or has access to the information? 6. How is this information being kept, and for how long? 7. Where is this information being kept? 8. How is the information being used? 9. How is the information secured? 10. How and when is the information destroyed?