Privacy and the library patron: an ongoing ethical challenge

Slides:



Advertisements
Similar presentations
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
Advertisements

Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
The Nuffield Council on Bioethics Report : The collection, linking and use of data in biomedical research and health care: ethical issues. Martin Richards.
COPYRIGHT, LEGAL ISSUES & TAKEDOWN. 2 Work priorities Orphan Works ALRC review Copyright and the Digital Economy Creative Commons licenses Legal.
Building Strong Library Associations | Regional Convenings DAY 1 Session 3 Role of Library Associations: Slides.
CDU – School of Information Technology HIT241 Professional Practice… - Slide 1 IT Project Management ACS - Core Body of Knowledge In Australia in November.
Recap on Day 1 Key Issues. Setting the Scene Creating a responsive and caring government Our collective focus on addressing the triple challenges of unemployment,
Implementation of Personal Data Protection Strategy Kick-off Event Expert Workshop Presentation by Christof Tschohl Legal Researcher Ludwig Boltzmann.
KNR 273: Ethics. What are ethics?  Statements of what is right or wrong, which usually are presented as systems of valued behaviors & beliefs  Serve.
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Research Services Research Services Presentation to Department of Paediatrics Gill Rowe Head, Research Services, Medical Sciences 23 September 2015.
TRUE PATIENT & PARTNER ENGAGEMENT HOW IS IT DONE?.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
Ethical Guidelines in Research Ethics refers to doing what is morally and legally right in conducting research. Research ethics deals primarily with the.
Why an Intellectual Property Policy? Sofia, November 24 and 25, 2015 Mr. Evgeniy Sesitsky, Department for Transition and Developed Countries, World Intellectual.
What factors do we use in weighing the order of priorities in a dilemma that pits a professional code of ethics against a societal moral code of ethics?
Preparing for ABET visit Prof. Dr. Lerzan Özkale Management Engineering Head of Department November 2010.
Business Continuity Regional Resumption Coordinator Building effective and responsive institutions … an Australian perspective Sue Taylor, Australian Bureau.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
The Ethics of Privacy in the Digital Society Ethical issues of emerging information and communication technologies Professor Bernd Carsten Stahl.
Building Strong Library Associations | Library Associations in Society: An Overview DAY 1 Session 3 What is the context of Library Associations in your.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Theory and Practice of Counseling and Psychotherapy TENTH EDITION
Principles of Good Governance
James Palmer, HBRC The Future of Our Water; Community Symposium
Kids' legal rights in medical care, your obligations and risk minimisation 27 April 2017.
An Introduction to Software Engineering
MISY 301 Mr.Mohammed Rafeeque.
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Presenter: Nancy Freeman Date ©2016 Society of American Archivists
OLA’S VISION AND VALUES FRAMEWORK
General Data Protection Regulations: what you really need to know
HEALTH IN POLICIES TRAINING
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
Department of Computer Science and Computer Engineering
DIGITAL BUSINESS APPLICATIONS
Meeting LIS Competences to Serve Inclusive Community through Curriculum: Case Study in LIS Study Program UIN Sunan Kalijaga Yogyakarta Indonesia Marwiyah.
EOSCpilot Skills Landscape & Framework
Data protection in the Education Sector - understanding the impact of GDPR Tuesday 23rd January 2018.
Prof. Dr. Natali Helberger
From DPA to GDPR: the key elements
Governance and Service delivery
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
Governance and Service delivery
LO2 - Be Able to Design IT Systems to Meet Business Needs
Smart Learning concepts to enhance SMART Universities in Africa
BETTER AND PROPER ACCESS TO PACIFIC MICRODATA
Presentation 31 / 01 / 18.
How Law is related to Engineering
The new CILIP ethics framework
The Freedom of Information and Data Protection Legislation An Overview
Office of Research Integrity and Protections
History and Archives: just another marketing tool
Data Privacy by Design Expanding Security for bepress Users
Quality, Risk Management, and the Future of Higher Education
KS5 Curriculum Overview Politics
National data opt-out - Preparing for implementation
Ethics and Politics of Computational Social Science
Why Do People Need Information?
Working with actors in healthcare simulation
Towards a frictionless social security
Presentation transcript:

Privacy and the library patron: an ongoing ethical challenge David McMenemy Computer and Information Sciences University of Strathclyde (@d_mcmenemy) Slides available on: https://www.slideshare.net/dmcmenemy

Overview Why privacy is our problem Emerging murky waters Scoping the ethical space Tensions inherent in our societal responsibilities Emerging murky waters Challenging our practice

Gorman’s Enduring Values of Librarianship Stewardship Service Intellectual Freedom Equity of Access Privacy Literacy and Learning Rationalism Democracy Gorman, Michael (2015) Our Enduring Values: Revisited. ALA Publishing

Privacy & the information profession Crucial elements of privacy are in our professional space Informational privacy: information about citizens, how it is shared, how it should be protected, what rights citizens have. Privacy and access: what rights should citizens have when accessing knowledge, and what limits should be placed on such access

Surveillance – a modern trial? Balancing national security versus the right of privacy is an ongoing challenge As a profession we must be mindful of the “chilling effect” of laws, actions or activities, from both state and non-state actors, that can modify the actions of others Governments can chill the rights of citizens through sloppy legislation, but professionals can also do so through sloppy practice and procedure Columbia Law Review. 1969. “The Chilling Effect in Constitutional Law.” Columbia Law Review 69 (5): 808-842. http://www.jstor.org/stable/1121147.

Corporate surveillance Cambridge Analytica/Facebook controversy is likely to raise stakes for all professions engaging in data analytics and other non-standard uses of data Are we ready, and prepared, to defend our potential invasions of patron privacy? Are we sure users understand what we do with data? https://imgur.com/gallery/uZ8pp

Privacy and library and information services

Privacy and LIS Use of 3rd parties in service delivery: Our commitment to patron privacy is potentially challenged by some of our own activities, e.g. : Use of 3rd parties in service delivery: are we open about who, why, and what they will do with user data? Learner analytics: are we in effect spying on our users’ activities? We should be mindful of the differences between informed consent (essential under GDPR), and the engineering of consent

Service development vs rights? The following DP statement was sent to members of a UK public library service

What are the issues? Not agreeing to the new statement meant membership would have to be revoked Public libraries are a legal right Blanket 3rd party exemptions Why should the public have to trust we will not use 3rd parties they would not approve of? Such changes to practice play on our trusted, societal, role, and arguably corrupt it

An extreme example? Oral Roberts University’s “Whole Person Education” allows students to have Fitbit devices recording their physical activity and loaded into the university’s learning management system Jones, Kyle M. L. and Salo, Dorothea (2018), Learning Analytics and the Academic Library: Professional Ethics Commitments at a Crossroads, College & Research Libraries, 79 (3) pp.303- 323. Available at :  https://crl.acrl.org/index.php/crl/article/view/16603

The reality… Our patrons rely on us to protect their interests Their interests should never be conflated solely with our service innovation and/or improving our efficiency, or our bottom line CA/Facebook controversy highlights our ethical responsibility to be mindful of privacy rights in practice and the need to advocate for them

One approach… Nissenbaum, Helen. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.

The real dilemma? “…what bothers people, what we see as dangerous, threatening, disturbing, and annoying, what makes us indignant, resistant, unsettled, and outraged in our experience of contemporary systems and practices of information gathering, aggregation, analysis, and dissemination is not that they diminish our control and pierce our secrecy, but that they transgress context-relative informational norms.” (p.186)

Framework of contextual integrity Contexts: structured social settings characterized by canonical activities, roles, relationships, power structures, norms (or rules), and internal values (goals, ends, purposes) Informational norms: “breaches of context-relative informational norms” is the key component in breaching privacy (p.140). Actors: senders of information, recipients of information, and information subjects

Framework of contextual integrity Attributes e.g. who is data for? who should have access to borrowing histories? Who should access a student’s grades in a school or university? Transmission principles “a constraint on the flow (distribution, dissemination, transmission) of information from party to party in a context” (p.145) Crucially, novel systems and practices can sometimes challenge traditional norms enough to justify changing them

Nissenbaum case study: CASSIE Computer Access Software Solution Managed access to PCs in libraries Also allowed viewing of patron browsing Using the FCI, CASSIE presented a significant prima facie violation of contextual integrity The tension: “between patrons’ freedom and autonomy, on the one hand, and institutional efficiency, on the other” (p.183).

CASSIE: the questions to ask? 1. Public library purpose Q> Does the ability to watch what patrons are browsing impact on purpose? A > Yes, if purpose is to provide access to knowledge, the “chilling effect” of being aware of surveillance may restrict what patrons do 2. Types of data held Previously libraries would store borrowing records, but not what patrons had looked for

FCI and moving patron data to cloud 1. Library purpose Is purpose challenged if patrons are aware 3rd parties (unknown) have access to their data 2. Citizens’ rights Should a legal right be as arbitrary as to be able to be removed based on an organisational efficiency decision? A legal right transforms into a citizen placing blind faith in service that 3rd parties they deal with will not abuse their data?

FCI and learner analytics 1. Purpose Educational role could justify learner analytics if it enhances outcomes of students? But, could knowledge of potential surveillance cause “chilling effect” on students? 2. Attributes Should my lecturers be able to know how often I visit library? How long I spend there? Even anonymization of such data poses challenges

P is privacy….and purpose.. Tools like Nissenbaum’s Framework, help us consider challenges to privacy more fully We may not like the answers, but that only means the question had to be asked The purpose of our services, their mission, should be the key driver in all decisions CA/Facebook may change rules of game as public more aware of what is being done with their data Informed consent, not engineered consent!

Reminder, slides available on: https://www.slideshare.net/dmcmenemy Thank you! Reminder, slides available on: https://www.slideshare.net/dmcmenemy