A Few Thoughts on Privacy GARY PRICE, MLIS EDITOR, INFODOCKET.COM GP CONSULTING.

Slides:



Advertisements
Similar presentations
Servicekoncept LM Information Delivery and EBL co-operation LM and EBL co-operation since April 2011 Local awareness Local support LibNet- integration.
Advertisements

FP6/FP-7 IT System 1 FORCE: WEB BASED EDITOR OF FORMS C FOR FP-6 AND FP-7.
1 Working with Social Media in Research Settings Victoria Wade Careers Consultant.
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Dashboard Company Settings Controlled Online Accounting.
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Content Management, the Catalog, and the Library or: How I Learned to Stop Worrying and Love our OPAC.
Self Service Connection Users Guide
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Why Get an M & M Direct Access Website? ONLY Direct Access Gives You These Important Features Turnkey website pre-loaded with our entire range of products.
Listen to Welcome Message Strategic design and delivery of the message. Clearly identifying objectives. Listening, in order to understand the needs of.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Google Chrome Your Customized Google Buddy April 2012 John Riley and Denise Tate-Kuhler.
Overview and key features.  Each page will be embedded SEO friendly tag  Tags are editable for users.
CREATING THE ENTERPRISE SOCIAL MEDIA GAME PLAN September 2013.
Robert Crawford, MBA West Middle School.  Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique.
Portal User Group Meeting September 14, Agenda Welcome Updates Reminders.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Mobile Payments & Alert Communications: Changing Your Bottom Line Art Coutcher Utility Sales Manager direct:
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
LET’S WORK TOGETHER: Integrating Social Media, Online Marketing, and Outreach ALA Annual 2012 June 25, 2012 Marshall Breeding Independent Consultant, Author,
Impact: Cloud Computing Theresa Rowe Educause Live.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
City eHealth Research Centre (CeRC) NRIC Web Server Logs Gawesh Jawaheer, CeRC.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
9/12/2006 TPTF MIS portal Update Pat Harris A portal is a web site or service that offers a broad array of resources and services such as , forums,
Hidden Surveillance by Consumer Health Information Websites Jacquelyn Burkell and Alexandre Fortier Faculty of Information and Media Studies University.
CensorNet Ltd An introduction to CensorNet Professional On-premise web filtering & management An introduction to CensorNet Professional On-premise web.
Josh Schmoldt The Data Mining Experts. My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004.
© Copyright 2008 STI INNSBRUCK Collusion Discover who is tracking you online.
Saving State on the WWW. The Issue  Connections on the WWW are stateless  Every time a link is followed is like the first time to the server — it has.
Sears Privacy Policy & Security information Shaina Lacher.
Respecting People's Privacy in Ministry 1. Context 2. Why should we bother? 3. APP Summary 4. Information Pathway.
A Tour of Google Apps learn.cssd.ab.ca. Google Apps provide tools for creating, learning and sharing. Signing into your learn account gives you access.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Community Pharmacy Summary Care Record (SCR) Privacy Officer End-user.
 Download SRC 2016 via the Apple or Google Play Stores and for all other devices please go to src2016.mobi from your web browser  Enter your that.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Documentation Requirements for Hospital Accreditation -By Global Manager Group.
WELCOME! Communication Camp NDSU Agriculture Communication WiFi Connect to NDSU Limited Open browser Enter Full name Password is 7n7K4X6g.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Ideal in addition to fast VPN Service Provider using Secure VPN Access.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Accessing the Intranet
Facebook privacy policy
Agenda Learn about the new TJ Ministry Application & Registration System Mixture of PowerPoint Slides, Demo’s and Hands-on Goals: Learn Concepts Play.
Web Application Development
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
Technology: Legal and Ethical Issues
Search Engine comparison
Release Highlights Last Updated for September Monthly Release.
iCIMS 17.1 Release: Highlights
eBay Basics Phillip Schneider Information Services Librarian
Google Privacy Policy Karen Tao.
marketing can accomplish many different marketing goals.
A Professional Team Approach
UPDATE: DRSi MERRecorder (ALERT MODULE)
Product Update January 2019.
Presentation transcript:

A Few Thoughts on Privacy GARY PRICE, MLIS EDITOR, INFODOCKET.COM GP CONSULTING

Bottom Line at the Top Knowledge Transparency Discussion

User Privacy is a Key Concept in Librarianship Privacy Directly Mentioned in Most Ethic Statements of National Library Organizations But Are We Doing Enough to Protect and Inform Users as Technology Continues to Develop and Change? An Important Role: Library/Librarian as Educator Being Reactive (vs. Proactive/Transparent) is Not Effective National Ethics Codes/Statements (via IFLA)

Many Issues and Users Best Interests Library Website Privacy Local Library Data (Circ, Transaction Logs, Addresses, Scrubbing ) Third Parties (Policies, Ideas on Privacy, Integrity of Systems, Data Retention Policies, Notification Procedure, Hiring Policies) Opt-In Services Vendors Offer (Save Results, Sharing, Alerts) Is Technology Configured Correctly? Packet Sniffing and Data Leakage

Cookie Cadger "Cookie Cadger helps identify information leakage from applications that utilize insecure HTTP GET requests." "Web providers have started stepping up to the plate since Firesheep was released in Today, most major websites can provide SSL/TLS during all transactions, preventing cookie data from leaking over wired Ethernet or insecure Wi-Fi. But the fact remains that Firesheep was more of a toy than a tool. Cookie Cadger is the first open-source pen-testing tool ever made for intercepting and replaying specific insecure HTTP GET requests into a browser." Cookie Cadger

The Privacy Policy Is It Enough? Is It Looked At? Who is it Being Written For? Does It Provide Options, Links ? Is it Reviewed Regularly? Things Change Frequently Do Users Really Care? Should We Care? Should We Modify Ethics Statements?

Transparency Example After Delivery to a Third Party, Does This Relieve Us of All Issues? Legally? Ethically? Example: OverDrive and Amazon

Library as Privacy Educator, Clearinghouse This is Important, Practical, and Marketable Knowledge Right Thing To Do, Marketing Opportunity Spotlight on Privacy in 2014 and Beyond The Library/Librarian as Trustworthy Educate About What? Examples: Google Dashboard, Google Web Search History, SnapChat/SnapHack Tracking VPN's Future Privacy Issues Ghostery Disconnect.me FaceBlock

What's Needed New or Renewed Focus on Privacy By ENTIRE Community Best Practices Understandable Language Professional Education Putting the Info in the Hands of Users Where/When It's Needed "Certification" of Local Systems "Certification" of Third Parties

Thank You! Please Visit infoDOCKET.com Updated Daily