Choose Privacy Week 2015: Creating a Digital Privacy Literacy Game to Create Safe and Secure Online Personas

Choose Privacy Week 2015: Creating a Digital Privacy Literacy Game to Create Safe and Secure Online Personas

by Erin Berman and Jon Worona Ready player one? Click “Start” to begin your quest. You will venture deep into the realm of online privacy where you’ll have to navigate through an ever shifting landscape, into pools of murky policies, and across tangled webs of surveillance networks. As you begin your journey you are filled with trepidation, anxiety, and fear. You think, “How can anyone live in peace and harmony here?” So much is...

Read More

Choose Privacy Week 2015: Toward A Set of Best Practices to Protect Patron Privacy in Library 2.0

Choose Privacy Week 2015: Toward A Set of Best Practices to Protect Patron Privacy in Library 2.0

by Michael Zimmer In today’s information ecosystem, libraries increasingly incorporate interactive, collaborative, and user-centered features of the so-called “Web 2.0” world into traditional library services, thereby creating “Library 2.0”. Examples include: providing patrons the ability to evaluate and comment on particular items in a library’s collection through discussion forums or comment threads; creating dynamic and...

Read More

Choose Privacy Week Brief: Let’s Encrypt / HTTPS Everywhere

Choose Privacy Week Brief:  Let’s Encrypt / HTTPS Everywhere

IT specialists like Marshall Breeding and privacy advocates like Alison Macrina of the Library Freedom Project are urging libraries and vendors to encrypt their websites and online automation and discovery systems to better protect patron privacy. Encrypting websites and networked communications requires the installation of Transport Layer Security (TLS) / Secure Sockets Layer (SSL) identity certificates and then use of the HTTPS protocol by...

Read More

Choose Privacy Week 2015: Patron Privacy in Online Catalogs and Discovery Services

Choose Privacy Week 2015: Patron Privacy in Online Catalogs and Discovery Services

By Marshall Breeding Concern for keeping records related to the details and borrowing activity of patrons has been a longstanding priority for libraries. We expect integrated library systems and related applications to include features to handle any data that specifically identifies a patron securely. As with any computer application, security features should be in place to prevent unauthorized intrusion. Beyond industry-standard security...

Read More

Choose Privacy Week 2015: Strong Passphrases for Privacy and Security

By Alison Macrina I’m sorry to be the one to tell you this, but your password sucks. I know you use the same one for everything, and it probably contains some personally identifiable information – your dad’s birthday, your pet’s name, the year of your anniversary. Even if you think you’ve got a good password strategy, if it contains any kind of pattern – a famous quote, a song lyric – it’s can very easily be...

Read More

Choose Privacy Week 2015: Ranganathan and the Five Blind Librarians

Choose Privacy Week 2015: Ranganathan and the Five Blind Librarians

By Eric Hellman I’ve heard it told that after formulating his famous “Five Laws of Library Science“, the great Indian librarian S. R Ranganathan set about thinking about privacy. Here’s what I remember of the tale. It turns out that in India at the time, there were five librarians renowned throughout the land for their tremendous organizational skills, formidable bibliographic canny, and the coincidental fact that each of...

Read More