Introduction

Privacy Tool Kit 2 of 9

Home | Introduction | Privacy and Confidentiality: Library Core Values | Developing or Revising a Privacy Policy | Implementation of Privacy Policies and Procedures | Library Privacy Talking Points: Key Messages and Tough Questions | What is ALA Doing | Advocacy at the Local, State & National Levels | Appendix


The first Privacy Tool Kit was created by ALA in 2005, and many changes have occurred in the intervening years, most notably the explosion of technology and social media use which has impacted the privacy of users in all types of libraries. Technology is a blessing and a curse.  It has provided opportunities like user-created content and interactivity.  Library users are now not only consuming information, they are creating it. Many barriers to access have fallen, but others, like filters, have arisen.  Governments and corporations can now capture user information and use it for various purpose - often without the user’s knowledge.  The danger of invasion of personal privacy is a very real concern and often challenges existing library state privacy and confidentiality laws. In some cases, the existing Library Bill of Rights and Interpretations can be applied, but in others, they need to be amplified.  In too many cases, busy librarians are not making the connections between new technology and the threats to users in the form of invasion of privacy. This threat to privacy stifles intellectual freedom and the freedom to read. Despite technology, the desire to protect library users’ privacy is strong. The current issues and threats, potential solutions, and resources can be found in the Privacy Tool Kit.

Revised by the IFC Privacy Subcommittee and approved by the Intellectual Freedom Committee January 2014