We sometimes forget about the data we collect and how we store it. There are many places where we collect data that we may not always think about. We need to be aware of our data storage practices and make it easy for patrons to know how we use & store their data.
By Galen Charlton Earlier this week Mathy Vanhoef of the imec-DistriNet research group at the Katholieke Universiteit Leuven announced his discovery of a set of related vulnerabilities in WPA2, a protocol used to encrypt communications over wireless networks. KRACK, as Vanhoef
By Galen Charlton One trope of data security discussions envisions a perfectly secure database as one that exists on a computer that is turned off, encased in concrete underground, and under the supervision of a very cranky cat who refuses
Choose Privacy Week, May 1 – 7, 2017 Let’s Get Practical for Choose Privacy Week Join the librarians who are getting practical for #ChoosePrivacy Week to improve #privacy protections for their users. Libraries and Privacy Literacy How to protect patrons’
Defending patron privacy in the library means more than advocating against the PATRIOT Act; it also requires a commitment to utilizing practical privacy tools and tactics that secure patron data and help counter unwanted online data collection. Learn more about
by Deborah Caldwell-Stone and Michael Robinson This week Congress, voting along party lines, passed a resolution that repealed the groundbreaking privacy rules adopted by the Federal Communications Commission last October under the Obama administration. The new rules would have required
by Adam Eisgrau Managing Director, ALA Office of Government Relations Cross-posted from District Dispatch Loyal District Dispatch readers know that, literally for years, ALA and a strong coalition of groups and companies from across the political spectrum have been fighting
crossposted from the ALA Washington Office The FBI and its powerful backers in Congress have been pushing relentlessly for years for access to all of our electronic communications, even the ones we think we’ve protected. They want to require by