Selected Bibliography

ALA Taskforce on Privacy and Confidentiality in the Electronic Environment

(Items identified/consulted during Task Force review)


Office for Intellectual Freedom - Privacy and Confidentiality

  • ALA Policies and Statements on Privacy
  • Other Documents on Privacy and Confidentiality
  • First Amendment Basics
  • International Intellectual Freedom Basics
  • American Library Basics
  • From the Intellectual Freedom Manual
  • Court Decisions on Privacy
  • Books on Privacy and Confidentiality
  • Other Privacy and Confidentiality Advocates and Resources  (ALA's Public Information Office) 
  • Libraries and the Internet Toolkit. ALA, 2000.


Bryan, Sarah. "Socially responsible librarianship champions privacy," American Libraries, 31(1):48, Jan 2000

Abstract: The declining state of privacy is an issue about which librarians, as self-proclaimed champions of intellectual freedom, should be most concerned. Librarians aren't guarding their privacy, so they're losing it. Bryan discusses what librarians can do to teach the public the importance of not selling their privacy, their freedom for a number on a card.

Heckart, Ronald J. "Imagining the digital library in a commercialized Internet," Journal of Academic Librarianship, 25(4):274-280, July 1999.

Abstract: Internet commerce is fueling technological innovation in marketing and customer relations, and transforming user expectations about Web sites that offer products and services. Digital library planning must address these trends in ways that effectively use changing technology, but also respect professional values of privacy, fairness and disinterestedness.

Huff, James. "Patron confidentiality, millennium style," American Libraries, 30(6):86-88, June/July 1999.

Lynch, Clifford. "Authentication and trust in a networked world," Educom Review, 34(4):60, Jul/Aug 1999.

Abstract: In the networked information age, there is an emergence of a web of interorganizational trust relationships in support of commerce and information access, implemented and expedited through new authentication and access management systems. Today this is perhaps most visible as libraries begin to offer extensive electronic resources that are used throughout the campus community.

Quick, Rebecca. "Technology (A Special Report): Pieces of the Puzzle --- Not-So-PrivateLives: Will we have any secrets in the future?" Wall Street Journal, Nov 13, 1998, R27.

Rezmerski, Virginia & Aline Soules. "Security vs. anonymity : the debate over user authentication and information access." Educause Review, v. 35, no. 2 (March/April 2000), p. 22-

Rogers, Michael & Norman Oder. " ALA unveils Internet tool kit on net policies," Library Journal, 125(3):107-110, Feb. 15, 2000.

Rosen, Jeffrey. "The eroded self," New York Times Magazine, April 30, 2000, pp.47 following.

Schneider, Karen G. "Privacy: The next challenge," American Libraries, 30(7):98, August 1999.

Streitfeld, David. " Who's Reading What? Using Powerful `Data Mining' Technology, Stirs an Internet Controversy," Washington Post, August 27, 1999, A1.

Switzer, Erwin O. "Net laws: Privacy or disclosure?" Library Journal, NetConnect Suppl.:10-12, October 15, 1999.


Bielefield, Arlene and Lawrence Cheeseman. Library patrons and the law. New York: Neal-Schuman Publishers, 1995.

Bielefield, Arlene and Lawrence Cheeseman. Maintaining the Privacy of Library Records. New York: Neal-Schuman, 1994.

Brin, David. The Transparent Society: Will Technology Force Us To Choose Between Privacy and Freedom? Addison-Wesley. 378p. index. ISBN 0201-32801-X.

DeCew, Judith Wagner. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology,

Henderson, Harry. Privacy in the Information Age. Facts on File. (Library in a Book). Nov. 1999. c.240p. bibliog. index. ISBN 0-8160-3870-8. $39.95.

Henderson, Harry. Issues in the Information Age. (Contemporary Issues Series). chart. illus. photos. bibliog. further reading. glossary. index.notes. Web sites. CIP. Lucent. 1999.

Hubbartt, William S. The New Battle Over Workplace Privacy: Safe Practices to Minimize Conflict, Confusion, and Litigation. AMACOM: American Management Assn. 270p. index. ISBN 0-81440357-3. $27.95.

McKeown, Kevin with Dave Stem. Your Secrets Are My Business. Longstreet. Oct. 1999. c. 272p. bibliog. ISBN 1-56352-577-1. $24. LAW

Peters, Thomas A. Computerized monitoring and online privacy. Jefferson, N.C. : McFarland & Co. 1999.

Swire, Peter P. and Robert E. Litan. None of your business : world data flows, electronic commerce, and the European privacy directive. Washington, D.C. : Brookings Institution Press, c1998.

Sykes, Charles J. The End of Privacy. St. Martin's. Oct. 1999. ISBN 0-312-20350-0. $24.95.

Watts, Tim J. Confidentiality in the use of library materials : a bibliography. Monticello, Ill., USA : Vance Bibliographies, [1989]


Humphreys, Betsy L. "Electronic health record meets digital library [videorecording]: simplifying assumptions, complicating factors." Nashville, Tenn. , 1999. Series Title: Eileen Cunningham lecture; 1.

Additional websites for specific topic areas



Sample products

Library practices

  • Purdue Libraries - Use of Public Access Work Stations
  • Monroe County Public Library Internet and Computer Use Policy (
  • ALA Documents:
    • ALA Office of Intellectual Freedom - Privacy and Confidentiality Resources
    • ALA Office of Intellectual Freedom - Ethics Resources: "We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted."
    • ALA Office of Intellectual Freedom - Freedom to View Statement: "To protect the confidentiality of all individuals and institutions using film, video, and other audiovisual materials."
    • ALA Office of Intellectual Freedom - Policy Concerning Confidentiality of Personally Identifiable Information about Library Users (1991)
    • ALA Office of Intellectual Freedom - Policy on Confidentiality of Library Records (rev. 1986)