Privacy in Libraries, a LITA webinar series

Wednesday, 3/28/2018
  • 1:00 PM (Eastern)
  • 12:00 PM (Central)
  • 11:00 AM (Mountain)
  • 10:00 AM (Pacific)
Wednesday, 4/11/2018
  • 12:00 PM (Eastern)
  • 11:00 AM (Central)
  • 10:00 AM (Mountain)
  • 9:00 AM (Pacific)
Wednesday, 4/25/2018
  • 1:00 PM (Eastern)
  • 12:00 PM (Central)
  • 11:00 AM (Mountain)
  • 10:00 AM (Pacific)
Wednesday, 5/9/2018
  • 1:00 PM (Eastern)
  • 12:00 PM (Central)
  • 11:00 AM (Mountain)
  • 10:00 AM (Pacific)
Wednesday, 5/23/2018
  • 1:00 PM (Eastern)
  • 12:00 PM (Central)
  • 11:00 AM (Mountain)
  • 10:00 AM (Pacific)

Privacy in Libraries icons from Flaticon by Icon Pond and FreepikThis spring, LITA’s Patron Privacy Interest Group will offer a webinar/training series on privacy issues for libraries! Targeted at “advanced newcomers,” this series is for you if you’re interested in privacy issues; have ever wondered how to protect the data you use; and read through the Patron Privacy Checklists and wondered what else was out there. Led by member-experts of the Patron Privacy Interest Group, this series will tackle privacy policies and staff training, strategies to manage the lifecycle of personally identifiable information (PII), tips for adopting encrypted technologies, defending the privacy of library patrons, and communicating about and advocating for privacy to library stakeholders. And the first webinar is free!

Developing Good Privacy Policies: and Incorporating Them into Staff Training

Wednesday March 28, 2018, Noon - 1:30 pm Central Time

The introductory first webinar: "Developing Good Privacy Policies" is free, use this link to reserve your spot (required)

Presenter: Sarah Houghton

Writing policies can be exciting when it's something you care about--and librarians care about privacy. Many libraries have a privacy policy but when was the last time your library revised it? Are you aware of your third party vendors' privacy policies and how are those incorporated into your policy? This webinar will help you write (or revise) a privacy policy to include critical issues like privacy law, professional ethics surrounding privacy, how you handle personally identifiable information, what section should be covered in a solid privacy policy, and making it all comprehensible to a layperson. We will also discuss how to ensure that the privacy policy is understood and adhered to by all library stakeholders--from library staff to supervisors and governance bodies.

Thank you to the Library Leadership & Management Association (LLAMA) for co-sponsoring this session.

Wrangling Library Patron Data

Wednesday April 11, 2018, 11:00 am - 12:30 pm Central Time

Presenter: Becky Yoose

Learning outcomes and takeaways:
  • Learn what Personally Identifiable Information [PII] is and where it can live in your organization (and beyond) 
  • Analyze your organization’s data lifecycle in the context of the Library Privacy Checklists, including:
    • Collection - what, where, how much, when, and why
    • Storage and Retention - what data to keep for how long based on organizational needs 
    • Access - who has access to what, including physical hardware and database
    • Reporting - what level of data should be used/published for internal and external reports
    • Deletion - making sure that your data is gone, and not living on in unexpected places
  • Gain a basic understanding of de-identification and anonymization strategies and how they fit into the data lifecycle

Adopting Encryption Technologies

Wednesday April 25, 2018, Noon - 1:30 pm Central Time

Presenter: Matt Beckstrom

This session will cover the basics of what encryption technologies are including HTTPS, VPN's and SSH.  It will cover how they are used, and how they can be implemented in a library.  Some basic uses will also be discussed.
 
By the end of the session, attendees will:
  • Understand the basics of encryption technologies
  • Know the basics of implementing encryption
  • Know a few ways that encryption can benefit a library

Analytics and Assessment: Privacy vs. Surveillance

Wednesday May 9, 2018, Noon - 1:30 pm Central Time

Presenters: T.J. Lamanna and Eric Hellman

Use analytics are of vital important to libraries, at its core it helps us develop methods to help us best serve our patrons. In understanding how crucial good analytics are, it’s important to understand what is being collected and why. We’ll be discussing criterion on how to evaluate what data you need and protect your patrons privacy at the same time. We’ll focus on best practices as well as offer some helpful suggestions to help you responsibly obtain and evaluate analytic data.

Take Back Researcher Privacy

Wednesday May 23, 2018, Noon - 1:00 pm Central Time

Presenter: Sam Kome

What will be covered:
  • A review of ethics and challenges to them including laws
  • What’s at stake: researcher vulnerability
  • Mitigations: Easy actions to take immediately, and more robust actions that could take more time.
Learning outcomes and takeaways;
  • Clarity on the topic
  • Related ALA and industry ethics statements, federal laws and policies
  • Scope of the problem: degree and types of researcher exposure via library and vendor systems
  • Who and what are the enablers:
  • Conversation starters for different stakeholders
  • Example privacy policies and other mitigations

Takeaways

A good understanding of the full range of privacy issues facing libraries today.

Who Should Attend

Any library worker interested in learning about privacy in libraries issues.

Presenters

Sarah Houghton

Sarah Houghton headshot

 

Sarah Houghton worked for a decade in library technology and for the past seven years has worked as the Director at the San Rafael Public Library. She focuses her "off work time work" on library ethics, privacy, surveillance, censorship, and intellectual freedom.

 

 

Becky Yoose

Becky Yoose headshot

Becky Yoose is the Library Applications and Systems Manager at the Seattle Public Library. She was previously Assistant Professor and Discovery and Integrated Systems Librarian at Grinnell College and Bibliographic Systems Librarian at Miami University of Ohio. Becky received her MA-LIS at the University of Wisconsin – Madison in 2008. Her library community work includes code4lib, LibTechWomen, and Troublesome Catalogers and Magical Metadata Fairies. Becky works for tea and chocolate, and prefers to use lard for her pie crust.

 

 

Matt Beckstrom

Matt Beckstrom headshot

Matt Beckstrom was born and raised in Montana.  He has been with the Lewis & Clark Library in Helena Montana since 1999 as the Systems Manager/Librarian.  He received his undergraduate degree in computer science from Montana State University Billings in 2010, and graduated with his Masters of Information Science in information systems degree, with two graduate academic certificates: Advanced management of Libraries and Information Agencies, and digital content management from the University of North Texas in 2012.  He currently serves on the Montana Library Association board, the ACLU Montana Board, and is a councilor for the American Library Association.  His first book, titled Protecting Patron Privacy, was published in 2015 by ABC-CLIO.  He also was a contributor for another book titled Protecting Patron Privacy published by LITA Press in 2016.  He is a frequent speaker on technology, security, and library topics at conferences.

T.J. Lamanna

tj lamanna headshot

T.J. Lamanna in the Emerging Technologies Librarian at the Cherry Hill Public Library in Cherry Hill, New Jersey. His work focuses primarily on evaluating and implementing new technologies in the library with a focus on institutional and patron privacy. Outside of that, he’s the current Chair of the Intellectual Freedom Committee of the New Jersey Library Association as well as working with ALA’s Office of Intellectual Freedom and LITA’s diversity and inclusion committee. One of his main focuses currently is helping libraries implement HTTPS on all domains, both website and catalog.

 

Eric Hellman

eric hellman headshot

After 10 years doing physics research at Bell Labs, Eric got interested in electronic publishing, started an e-journal, started a company, built linking technology for libraries, sold that company to OCLC and worked there a few years, started blogging (at Go To Hellman), and finally decided that the important thing to do would be to make free ebooks work for libraries and everyone else (at Unglue.it, GITenberg, and the Free Ebook Foundation). For the past few years, Eric has been raising awareness about "privacy leakage" in the internet services of libraries and scholarly publishers and has volunteered with the Library Freedom Project to promote encryption for library and publishing websites.

 

Sam Kome

Sam Kome headshot

Sam builds and works with information technology systems on behalf of people. In a previous job he designed a privacy rubric to protect millions of internet users. His current role in academic library administration: Director, Strategic Initiatives & Information Technology at Claremont University Consortium, is at the intersection of Strategy, IT, and Assessment.

Registration

Cost

Register for any of the single webinars.

Register for all four as a package deal at a discounted rate.

The introductory first webinar: "Developing Good Privacy Policies" was free, with it's own unique registration link.

Cost per single webinar

  • LITA Member: $45
  • Non-Member: $105
  • Group: $196

Cost for the 4 webinar bundle

  • LITA Member: $120
  • Non-Member: $240
  • Group: $400

Adobe Connect login info will be sent to registrants just prior to the start date.

How to Register

Register Online for each single webinar -  page arranged by series starting date (login required)

Register Online for the series -  page arranged by series starting date (login required)

OR

Mail or fax form to ALA Registration

OR call 1-800-545-2433 and press 5

OR email registration@ala.org

Tech Requirements

Live, synchronous lectures will require attendee participation via internet audio. Attendees will need a wired, high-speed internet connection, and a headset or speakers. It is recommended that attendees use headsets connected to their computers (VOIP) during an Adobe Connect session. All attendees are muted and should use the built in chat function to communicate with presenters. The use of computer speakers with a mic is not recommended, as it may cause echo. The recommended browser is Mozilla Foxfire although other browsers should work adequately for attending

Contact

For questions about registration, contact ALA Registration:  call 1-800-545-2433 and press 5 or email registration@ala.org.

For all other questions or comments related to the course, contact LITA at (312) 280-4268 or Mark Beatty, mbeatty@ala.org.

Note: 

Icons made by Icon Pond from www.flaticon.com is licensed by CC 3.0 BY
Icons made by Freepik from www.flaticon.com is licensed by CC 3.0 BY