SlideShare a Scribd company logo
1 of 32
Rights to privacy and freedom of
expression in public libraries:
squaring the circle
David McMenemy
Computer and Information Sciences,
University of Strathclyde, Glasgow,
Scotland
• Considers privacy and freedom of
expression as ethical concepts
• Discusses the tensions that exist between
respecting these rights, and modern library
practice
• Highlights some real issues from the UK
• Poses some questions for future
Overview
• Privacy is the “right to be free from
unwarranted intrusion and to keep certain
matters from public view” (Law, 2015)
• It is a crucial aspect of personal autonomy
and a vital component of individual
fulfilment
Importance of privacy
• “frank communication… needs the shield of
privacy; it needs the restraint of peeping
Toms and eavesdroppers, of phone taps
and bugging devices in one’s house, of
tampering with one’s mail or seizure of
one’s correspondence” (Griffin, 2008,
p.225).
Direct link to freedom of expression
• “restrictions on what we are allowed to say
and write, or…to hear and read, inhibit our
personality and its growth” (Barendt, 2006,
p.13).
• “Underpins other important rights such as
“rights to freedom of religion, thought and
conscience” (Barendt, 2006, p.13).
Freedom of expression
• Privacy can pose significant challenges to
security
• Privacy affords a person more opportunity
to undertake activities that can harm
others
• It is within this space that the debates
around privacy take place
The challenges…
• Both privacy and freedom of expression
are qualified rights
• This means that other rights may take
priority over both
• If we are to successfully advocate for
privacy, we must be in the debate where
the qualifications are discussed and
formed
Qualified rights
• Under the ECHR privacy is recognised as
a human right based around “the respect
for private and family life”
• The qualification made to this is that
governments can only interfere “in
accordance with the law and is necessary
in a democratic society”
The qualification..
• ..in the interests of national security,
• public safety or the economic wellbeing of
the country,
• for the prevention of disorder or crime,
• for the protection of health or morals,
• or for the protection of the rights and
freedoms of others.”
The qualification (con’t)
• How do these qualifications impact on
library services?
• Do we debate them and their impact on
services enough?
• Do we often err too much on the safe
side?
Key questions…
• “Access [to information] should not be
restricted on any grounds except that of the
law” (CILIP, 2005).
• CILIP supports Council of Europe: services
providing “Public Access Points should
respect the privacy of users and treat
knowledge of what they have accessed or
wish to access as confidential.”
Our professional values
• C of E says “use by managers of Public
Access Points of software filtering systems
to block access to certain content is an
unwarranted interference with the
individual’s freedom of access to
information”
And on filtering….
• “If filtering and blocking systems are to be
made available, it should only be as an
option that individuals can choose and
calibrate at their own preferred levels”
• Some discussion now of some Scottish/UK
issues…
On filtering (con’t)
• Brown, G.T. and McMenemy, D. (2013), “The implementation of internet
filtering in Scottish public libraries”, Aslib Proceedings, 65 (2), pp.182-202.
Justifications for filtering..
• Can we be consistent how we define that?
• “grossly offensive” (LA2); “indecent” (LA2,
7, 10, 20, 27 and 28); “disturbing” (LA5,
11, 13, 24 and 26); “depraved” (LA9);
“offensive, indecent or menacing” (LA10);
“any way that offends decency” (LA3) and
“offensive, immoral or distressing” (LA11)
• Gallagher, C., McMenemy, D., Poulter, A. (2015) "Management of acceptable use of
computing facilities in the public library: avoiding a panoptic gaze?", Journal of
Documentation, 71(3), pp.572 – 590.
What is inappropriate?
• “When it comes to material deemed
“inappropriate” rather than unlawful, this can
be a very subjective judgement. For formally
published material, professional publishers
have acted as arbiters of quality or taste and
librarians have decided what to include in
library collections. When it comes to the
internet, it appears that filtering software
vendors have a prominent role”
• Muir, A., Spacey, R., Cooke, L., and Creaser , C. (2016) "Regulating internet access in UK
public libraries: legal compliance and ethical dilemmas", Journal of Information,
Communication and Ethics in Society, 14 (1), pp.87 - 104
As suggested by Muir et al..
• 1 of 31 Scottish libraries had ability to
unblock at point of access
• 27 services stated that although there was a
“release procedure” in place, the content
could not be released at the point of use. It
would rather be considered “appropriate”
retroactively and released at a later date:
• 2 stated that no procedure existed whereby
content blocked by the public access internet
filtering software could be released
• (Brown and McMenemy, 2013)
When the filtering blocks incorrectly
• Even when unblocking is an option, we
must consider the privacy of the patron
who may be embarrassed to ask
• We cannot place our service delivery
completely in the hands of blunt
instruments
• One view is “it is not our business to
mediate between users and the virtual
world” (Hauptman, 2002, p.65)
The ethical dilemma
• As Sturges states, “when people describe
internet content as harmful they tend to
lump together both legal and illegal
material” (Sturges, 2002, p. 21)
• Our profession needs more debate on
definitions of inappropriate with regards
Internet access
Legal vs inappropriate?
• Government programmes to tackle
radicalisation
• Movement of services to the cloud
Other issues impacting privacy?
• In a bid to tackle radicalisation of young
British people, successive UK governments
have adopted Prevent strategy
• The strategy’s goal is “to prevent
radicalisation and stop would-be terrorists
from committing mass murder” (HM
Government, 2011, p.1)
Tackling radicalisation
• “We remain absolutely committed to
protecting freedom of speech in this
country. But preventing terrorism will mean
challenging extremist (and non-violent)
ideas that are also part of a terrorist
ideology” (HM Government, 2011, p.13).
• Subtext here is that it might also impact on
materials that are legal but felt to inspire
radicalisation
Impact on freedom of expression?
• Should consider “whether IT equipment
available to the general public should use
filtering solutions that limit access to
terrorist and extremist material” (HM
Government, 2015)
• The majority do so already
Impact on public libraries?
• Libraries in the UK have had to answer
challenges on this issue in recent times
• The 2007 report, Hate on the State, found
that books were found in several libraries
that:
– Glorify acts of terrorism against followers of other
religions
– Incite violence against anyone who rejects
jihadist ideologies
– Endorse violence and discrimination against
women (Brandon & Murray, 2007, p.3).
Public libraries and extremism
• As we move services to the cloud, we
must be aware of the impact on core
values
• For example, the alteration of data
protection procedures when we do so can
have significant impact
The Cloud
• The following DP statement was sent to
members of a Scottish public library
Challenge of cloud data storage?
• Not agreeing to the new statement meant
membership would have to be revoked
– Public libraries in the UK are a legal right
• Blanket 3rd party exemptions
– Why should the public have to trust we will not
use 3rd parties they would not approve of?
• Such changes to practice play on our
trusted role, and arguably abuse it
What are the issues?
• Cloud storage of patron data risks building
databases of immense value on patron
preferences and behaviour
• Use of ebook lending data runs similar risks
• Again, we must debate these developments
more for their long term impact
More globally….
Points to consider:
1. We must be very careful not to hold up
our ethical standards as badges of
honour, if we simply ignore them when
convenient
2. We need to dictate standards for any
tools we use based on our values
3. And we must be clear on why we use
them, and more reflective when we do
Squaring the circle?
• We need to be careful of how many of our
values we cede to software vendors to
manage for us
• We equally need to be aware that when
we do so, we commercialise those values
• If we cannot debate important issues such
as privacy and FoE within our profession,
we will lose our moral authority on them
In summary
• Be at the heart of societal debate about
qualifications of all rights. Our voice must
be heard.
• Call for more debate within profession re
privacy and freedom of expression and
policies from within that challenge them
• Always be aware of our core values
Conclusions
More details/discussion and
references in full paper, available on
IFLA Digital Library (soon, if not
already!)
Thank you!
d.mcmenemy@strath.ac.uk
@d_mcmenemy (Twitter)

More Related Content

What's hot

Media and information literacy
Media and information literacyMedia and information literacy
Media and information literacyDayanaraOrtiz2
 
Liking violence: A study of hate speech on Facebook in Sri Lanka
Liking violence: A study of hate speech on Facebook in Sri LankaLiking violence: A study of hate speech on Facebook in Sri Lanka
Liking violence: A study of hate speech on Facebook in Sri LankaSanjana Hattotuwa
 
Vermette - PP - Chapter 3 - Culture and society
Vermette - PP - Chapter 3 - Culture and societyVermette - PP - Chapter 3 - Culture and society
Vermette - PP - Chapter 3 - Culture and societyLinda Vermette
 
Understanding knowledge as a commons
Understanding knowledge as a commonsUnderstanding knowledge as a commons
Understanding knowledge as a commonsawillway
 
Thriving in the Knowledge Economy
Thriving in the Knowledge Economy Thriving in the Knowledge Economy
Thriving in the Knowledge Economy Jen Reiner - Align
 
Revise case studies
Revise case studiesRevise case studies
Revise case studiesCHSGmedia
 
Whatissociology 141111174421-conversion-gate01
Whatissociology 141111174421-conversion-gate01Whatissociology 141111174421-conversion-gate01
Whatissociology 141111174421-conversion-gate01Cleophas Rwemera
 
Media and Information Literacy: strength through diversity
Media and Information Literacy: strength through diversityMedia and Information Literacy: strength through diversity
Media and Information Literacy: strength through diversitySheila Webber
 
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)Debra M. Amidon
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Oral book report american ideas about adult education 1710-1951
Oral book report   american ideas about adult education 1710-1951Oral book report   american ideas about adult education 1710-1951
Oral book report american ideas about adult education 1710-1951Doreen D'Amico
 

What's hot (14)

Media and information literacy
Media and information literacyMedia and information literacy
Media and information literacy
 
Liking violence: A study of hate speech on Facebook in Sri Lanka
Liking violence: A study of hate speech on Facebook in Sri LankaLiking violence: A study of hate speech on Facebook in Sri Lanka
Liking violence: A study of hate speech on Facebook in Sri Lanka
 
Vermette - PP - Chapter 3 - Culture and society
Vermette - PP - Chapter 3 - Culture and societyVermette - PP - Chapter 3 - Culture and society
Vermette - PP - Chapter 3 - Culture and society
 
Understanding knowledge as a commons
Understanding knowledge as a commonsUnderstanding knowledge as a commons
Understanding knowledge as a commons
 
Thriving in the Knowledge Economy
Thriving in the Knowledge Economy Thriving in the Knowledge Economy
Thriving in the Knowledge Economy
 
Revise case studies
Revise case studiesRevise case studies
Revise case studies
 
Whatissociology 141111174421-conversion-gate01
Whatissociology 141111174421-conversion-gate01Whatissociology 141111174421-conversion-gate01
Whatissociology 141111174421-conversion-gate01
 
Media and Information Literacy: strength through diversity
Media and Information Literacy: strength through diversityMedia and Information Literacy: strength through diversity
Media and Information Literacy: strength through diversity
 
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)
Bretton Woods of the Knowledge Economy - IFKAD Keynote 2009 (Scotland)
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Knowledge society
Knowledge societyKnowledge society
Knowledge society
 
Oral book report american ideas about adult education 1710-1951
Oral book report   american ideas about adult education 1710-1951Oral book report   american ideas about adult education 1710-1951
Oral book report american ideas about adult education 1710-1951
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
 
5 Tech Trends for Libraries
5 Tech Trends for Libraries5 Tech Trends for Libraries
5 Tech Trends for Libraries
 

Similar to Rights to privacy and freedom of expression in public libraries: squaring the circle

UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG: connecting the knowledge community
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...alldesign
 
The ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThe ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThirumaniPoovalingam
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkXanat V. Meza
 
From Network Revolutions and Trends in Information to a National Public Polic...
From Network Revolutions and Trends in Information to a National Public Polic...From Network Revolutions and Trends in Information to a National Public Polic...
From Network Revolutions and Trends in Information to a National Public Polic...WiLS
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentationreporter1120
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...Micah Altman
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project DIPRC2019
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile networkDr Lendy Spires
 
Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...LIBER Europe
 
Big Data and Research Ethics
Big Data and Research EthicsBig Data and Research Ethics
Big Data and Research EthicsJan Schmidt
 
Online Identity and the Fragmentation of the Internet - Tobias Matzner
 	Online Identity and the Fragmentation of the Internet - Tobias Matzner 	Online Identity and the Fragmentation of the Internet - Tobias Matzner
Online Identity and the Fragmentation of the Internet - Tobias Matznercyborgology
 
IFLA trends report - Segametsi Molawa
IFLA trends report - Segametsi MolawaIFLA trends report - Segametsi Molawa
IFLA trends report - Segametsi MolawaHELIGLIASA
 

Similar to Rights to privacy and freedom of expression in public libraries: squaring the circle (20)

Using social media to address professional issues in LIS
Using social media to address professional issues in LISUsing social media to address professional issues in LIS
Using social media to address professional issues in LIS
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
 
The ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThe ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptx
 
Digital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van DijkDigital culture - a book chapter by Jan Van Dijk
Digital culture - a book chapter by Jan Van Dijk
 
From Network Revolutions and Trends in Information to a National Public Polic...
From Network Revolutions and Trends in Information to a National Public Polic...From Network Revolutions and Trends in Information to a National Public Polic...
From Network Revolutions and Trends in Information to a National Public Polic...
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Right to be forgotten presentation
Right to be forgotten presentationRight to be forgotten presentation
Right to be forgotten presentation
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
A human rights approach to the mobile network
A human rights approach to the mobile networkA human rights approach to the mobile network
A human rights approach to the mobile network
 
Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...
 
Big Data and Research Ethics
Big Data and Research EthicsBig Data and Research Ethics
Big Data and Research Ethics
 
Online Identity and the Fragmentation of the Internet - Tobias Matzner
 	Online Identity and the Fragmentation of the Internet - Tobias Matzner 	Online Identity and the Fragmentation of the Internet - Tobias Matzner
Online Identity and the Fragmentation of the Internet - Tobias Matzner
 
IFLA trends report - Segametsi Molawa
IFLA trends report - Segametsi MolawaIFLA trends report - Segametsi Molawa
IFLA trends report - Segametsi Molawa
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 

Rights to privacy and freedom of expression in public libraries: squaring the circle

  • 1. Rights to privacy and freedom of expression in public libraries: squaring the circle David McMenemy Computer and Information Sciences, University of Strathclyde, Glasgow, Scotland
  • 2. • Considers privacy and freedom of expression as ethical concepts • Discusses the tensions that exist between respecting these rights, and modern library practice • Highlights some real issues from the UK • Poses some questions for future Overview
  • 3. • Privacy is the “right to be free from unwarranted intrusion and to keep certain matters from public view” (Law, 2015) • It is a crucial aspect of personal autonomy and a vital component of individual fulfilment Importance of privacy
  • 4. • “frank communication… needs the shield of privacy; it needs the restraint of peeping Toms and eavesdroppers, of phone taps and bugging devices in one’s house, of tampering with one’s mail or seizure of one’s correspondence” (Griffin, 2008, p.225). Direct link to freedom of expression
  • 5. • “restrictions on what we are allowed to say and write, or…to hear and read, inhibit our personality and its growth” (Barendt, 2006, p.13). • “Underpins other important rights such as “rights to freedom of religion, thought and conscience” (Barendt, 2006, p.13). Freedom of expression
  • 6. • Privacy can pose significant challenges to security • Privacy affords a person more opportunity to undertake activities that can harm others • It is within this space that the debates around privacy take place The challenges…
  • 7. • Both privacy and freedom of expression are qualified rights • This means that other rights may take priority over both • If we are to successfully advocate for privacy, we must be in the debate where the qualifications are discussed and formed Qualified rights
  • 8. • Under the ECHR privacy is recognised as a human right based around “the respect for private and family life” • The qualification made to this is that governments can only interfere “in accordance with the law and is necessary in a democratic society” The qualification..
  • 9. • ..in the interests of national security, • public safety or the economic wellbeing of the country, • for the prevention of disorder or crime, • for the protection of health or morals, • or for the protection of the rights and freedoms of others.” The qualification (con’t)
  • 10. • How do these qualifications impact on library services? • Do we debate them and their impact on services enough? • Do we often err too much on the safe side? Key questions…
  • 11. • “Access [to information] should not be restricted on any grounds except that of the law” (CILIP, 2005). • CILIP supports Council of Europe: services providing “Public Access Points should respect the privacy of users and treat knowledge of what they have accessed or wish to access as confidential.” Our professional values
  • 12. • C of E says “use by managers of Public Access Points of software filtering systems to block access to certain content is an unwarranted interference with the individual’s freedom of access to information” And on filtering….
  • 13. • “If filtering and blocking systems are to be made available, it should only be as an option that individuals can choose and calibrate at their own preferred levels” • Some discussion now of some Scottish/UK issues… On filtering (con’t)
  • 14. • Brown, G.T. and McMenemy, D. (2013), “The implementation of internet filtering in Scottish public libraries”, Aslib Proceedings, 65 (2), pp.182-202. Justifications for filtering..
  • 15. • Can we be consistent how we define that? • “grossly offensive” (LA2); “indecent” (LA2, 7, 10, 20, 27 and 28); “disturbing” (LA5, 11, 13, 24 and 26); “depraved” (LA9); “offensive, indecent or menacing” (LA10); “any way that offends decency” (LA3) and “offensive, immoral or distressing” (LA11) • Gallagher, C., McMenemy, D., Poulter, A. (2015) "Management of acceptable use of computing facilities in the public library: avoiding a panoptic gaze?", Journal of Documentation, 71(3), pp.572 – 590. What is inappropriate?
  • 16. • “When it comes to material deemed “inappropriate” rather than unlawful, this can be a very subjective judgement. For formally published material, professional publishers have acted as arbiters of quality or taste and librarians have decided what to include in library collections. When it comes to the internet, it appears that filtering software vendors have a prominent role” • Muir, A., Spacey, R., Cooke, L., and Creaser , C. (2016) "Regulating internet access in UK public libraries: legal compliance and ethical dilemmas", Journal of Information, Communication and Ethics in Society, 14 (1), pp.87 - 104 As suggested by Muir et al..
  • 17. • 1 of 31 Scottish libraries had ability to unblock at point of access • 27 services stated that although there was a “release procedure” in place, the content could not be released at the point of use. It would rather be considered “appropriate” retroactively and released at a later date: • 2 stated that no procedure existed whereby content blocked by the public access internet filtering software could be released • (Brown and McMenemy, 2013) When the filtering blocks incorrectly
  • 18. • Even when unblocking is an option, we must consider the privacy of the patron who may be embarrassed to ask • We cannot place our service delivery completely in the hands of blunt instruments • One view is “it is not our business to mediate between users and the virtual world” (Hauptman, 2002, p.65) The ethical dilemma
  • 19. • As Sturges states, “when people describe internet content as harmful they tend to lump together both legal and illegal material” (Sturges, 2002, p. 21) • Our profession needs more debate on definitions of inappropriate with regards Internet access Legal vs inappropriate?
  • 20. • Government programmes to tackle radicalisation • Movement of services to the cloud Other issues impacting privacy?
  • 21. • In a bid to tackle radicalisation of young British people, successive UK governments have adopted Prevent strategy • The strategy’s goal is “to prevent radicalisation and stop would-be terrorists from committing mass murder” (HM Government, 2011, p.1) Tackling radicalisation
  • 22. • “We remain absolutely committed to protecting freedom of speech in this country. But preventing terrorism will mean challenging extremist (and non-violent) ideas that are also part of a terrorist ideology” (HM Government, 2011, p.13). • Subtext here is that it might also impact on materials that are legal but felt to inspire radicalisation Impact on freedom of expression?
  • 23. • Should consider “whether IT equipment available to the general public should use filtering solutions that limit access to terrorist and extremist material” (HM Government, 2015) • The majority do so already Impact on public libraries?
  • 24. • Libraries in the UK have had to answer challenges on this issue in recent times • The 2007 report, Hate on the State, found that books were found in several libraries that: – Glorify acts of terrorism against followers of other religions – Incite violence against anyone who rejects jihadist ideologies – Endorse violence and discrimination against women (Brandon & Murray, 2007, p.3). Public libraries and extremism
  • 25. • As we move services to the cloud, we must be aware of the impact on core values • For example, the alteration of data protection procedures when we do so can have significant impact The Cloud
  • 26. • The following DP statement was sent to members of a Scottish public library Challenge of cloud data storage?
  • 27. • Not agreeing to the new statement meant membership would have to be revoked – Public libraries in the UK are a legal right • Blanket 3rd party exemptions – Why should the public have to trust we will not use 3rd parties they would not approve of? • Such changes to practice play on our trusted role, and arguably abuse it What are the issues?
  • 28. • Cloud storage of patron data risks building databases of immense value on patron preferences and behaviour • Use of ebook lending data runs similar risks • Again, we must debate these developments more for their long term impact More globally….
  • 29. Points to consider: 1. We must be very careful not to hold up our ethical standards as badges of honour, if we simply ignore them when convenient 2. We need to dictate standards for any tools we use based on our values 3. And we must be clear on why we use them, and more reflective when we do Squaring the circle?
  • 30. • We need to be careful of how many of our values we cede to software vendors to manage for us • We equally need to be aware that when we do so, we commercialise those values • If we cannot debate important issues such as privacy and FoE within our profession, we will lose our moral authority on them In summary
  • 31. • Be at the heart of societal debate about qualifications of all rights. Our voice must be heard. • Call for more debate within profession re privacy and freedom of expression and policies from within that challenge them • Always be aware of our core values Conclusions
  • 32. More details/discussion and references in full paper, available on IFLA Digital Library (soon, if not already!) Thank you! d.mcmenemy@strath.ac.uk @d_mcmenemy (Twitter)