Lessons Learned, Now and Later

Slides:



Advertisements
Similar presentations
I Choose Privacy! Intellectual Freedom: Addressing the Privacy Issue in the Academic Library.
Advertisements

ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
LIS 600: Foundations of Library and Information Studies Week Six Kevin Rioux, PhD.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Copyright © 2014 by The University of Kansas Acting as a Watchdog.
Privacy Issues in Libraries and Research Collections Eileen Brady Washington State University Libraries Margaret Schroeder The Oriental Institute.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
The Judicial Branch The Criminal Justice Process.
What have you known about cybercrime? What do you want to know about cybercrime?
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Conferences: Twitter. Twitter Whom do I follow? Librarians Techies Social media ‘experts’ News organizations Publishers Professional Associations.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Call to Order These three officers were accused of taking two Baltimore teens out to the county, taking their shoes and cellphone batteries, and leaving.
ALIVE: Module 4 ETHICS IN THE REAL WORLD Where does ethical behavior start/stop and legal requirements begin.
Discuss the following: 1. How far would you go to get a story? What would you do if you were told your life was in danger?
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
AP GOVERNMENT. CIVIL LIBERTIES  Civil Liberties are individual’s legal and constitutional protections against the government.  Although our civil liberties.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
The USA PATRIOT Act An Overstatement of ALA Concerns?
20 Oct., 1999 UAF Computing & Networking Policies1 Reasons for policies Who makes & enforces them Overview of issues based on common questions Your responsibilities.
Acting as a Watchdog. What is a watchdog? A watchdog is an individual or group (generally non-profit) that keeps an eye on a particular entity or a particular.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
Digital Citizenship Merlyne Kittrell Technology and Education ED SP2OL.
“ Welcome to Seminar 8: Civil Liberties and Civil Rights.
Introduction In order to prepare students to become informed decision makers, the high school librarian must advocate for the user’s right to all types.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
Legal and Ethical Issues in Computer Security Csilla Farkas
What is political socialization and how might it influence a citizen’s participation in the democratic process? Political socialization is the complex.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
INTERNET INVESTIGATIONS. GOAL:  Identify different people by using online tools / information  Gather information about different people  Gather information.
Social Media: The Do’s and Don’ts for Administrators Presented on August 5, 2014 By Laura L. Holmes of.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Freedom of Expression: Freedom of the Press Essential Questions: How have the courts defined citizens rights over time?
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
The History of Journalism Matters of Law Ethics in a Multimedia World History/Law and Ethics.
The Rights of Readers and the Threat of the Kindle
Creating your online identity
Courts System Search Warrants.
Information Security, Theory and Practice.
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
LIS Information Technologies and the Information Professions Introduction to Information Policy Philip Doty and R. E. Wyllys Copyright © 2001.
4. Intellectual Property and Ethics on the Web
Dealing with Difficult Situations and Setting Boundaries
The Mass Media Mass media – all the means for communicating any information to the general public. News media condense and clarify stories, alert the public.
Video: Digital citizenship is defined as the norms of appropriate,
Confidentiality October 14, 2005.
Bill of Rights.
E-Commerce: Regulatory, Ethical, and Social Environments
Preserving your privacy
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Developing Relationships with your Elected Officials
Presented (insert date) By (insert organization’s name)
My digital footprint By: Maddie Moody.
Legal, social & ethical issues
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Conference Title Name Date.
Presentation transcript:

Lessons Learned, Now and Later Identity theft a growing problem, but for now freedom of speech and expression are still the most threatened of our constitutionally-protected rights. Protection of library patrons’ rights remain a constant battle when it comes to seizing computer records to solve crimes. Despite these warrant laws, libraries still receive hundreds of requests for records without proper authorization from authorities. New technologies—helpful but also cause for vulnerability Internet and computer technologies are making identity theft a much bigger threat than ever before, but most of the threats today are still against intellectual freedom and all rights guaranteed by the First Amendment, especially under the name of National Security and the PATRIOT act. Examples were given earlier about police demanding records they felt pertained to particular crimes, but in no case did the police serve warrants or subpoenas. Although these incidents have caused laws to be passed that require police to present librarians with proper paperwork before seizing records, there is conflict in most of us who understand that the extra time it takes to obtain proper paperwork can mean the difference between life and death in some of these cases. But ultimately, all library patrons must know their records are being kept private and confidential unless the police find probable cause. It’s not only on all the drama shows these days where we see detectives sometimes bullying a citizen into giving up federally-protected information without first being given a warrant or subpoena, librarians in the local King County area contend with constant requests on a monthly basis from law enforcement who are on fishing expeditions without proper paperwork allowing them to do so. Unfortunately, the recent extension of the USA PATRIOT Act makes fighting warrants and requests that are broad and non-specific much more difficult from a librarian’s standpoint. As libraries move along with new technologies, such as RFID, self-checkout, no user info on library cards, etc., they clearly are working to continue to preserve the privacy of patrons. But new technologies come along so quickly that they present threats to confidentiality and privacy to patron records that are sometimes difficult to identify or to fix.

Patron Privacy in the Future Know your policies! Talk with others in your library or at work, especially if a challenge arises for which you can’t find a resolution. Always be polite and take the situation seriously, especially when dealing with law enforcement. For your own edification, browse the Web for stories dealing with intellectual freedom and privacy, join organizations and associations, subscribe to newsletters. ALA EFF Pew Internet Family & Life Project Google Alerts Wherever you work, even if it’s not in a library, you need to know about your organization’s policies on privacy and confidentiality. Any reputable website has a link that states its privacy policy; sometimes you as a patron of that site need to know whether or not you have to opt-out of newsletters, for instance, or make sure to uncheck all the boxes that ask if you want to receive promotional products from that site when you register as a user. If you encounter a situation as a librarian and are uncertain of the privacy policy, ask for help from a colleague or manager. Don’t be defensive if law enforcement comes in asking for records without proper paperwork. Be polite and cooperative while you explain the policies. Better yet, consider having one person be the de-facto privacy/confidentiality expert. Keep yourself informed at all times. Subscribe to the ALA’s weekly American Libraries Direct; subscribe to The Effector, which is the newsletter from the Electronic Freedom Foundation, the Pew Internet web site, which does extensive research on the digital effects of media and web technologies on privacy and confidentiality (not to mention interesting research in just about everything Internet-related). I also keep up on daily stories I don’t otherwise have the time to search for by setting up different Google alerts for “libraries”, “intellectual freedom”, etc. In fact some of what I’ve garnered from the alerts have been excellent LIS 551 blog material. The biggest lesson we can all learn from our research is that we, as librarians and information professionals, must always keep ourselves apprised of new technologies and how they might possibly affect privacy and confidentiality. We can’t do our jobs unless we know what we’re up against, so it’s crucial for us to know how things are changing in our own industry and in the industries around us that might have an impact on our own work.