1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004.

Slides:



Advertisements
Similar presentations
Privacy and Library Systems Karen Coyle for InfoPeople November, 2004.
Advertisements

Everything You Always Wanted to Know About Electronic Journals but Were Afraid to Ask! NASIG Pre-Conference June 2002 Stefanie Wittenbach Head of Acquisitions,
Compliance storyboard: Classifying & controlling content at the input device.
Centralized Returns.
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Automated Recurring Payments Flexible Payment Solution.
Department of Children and Families Care Provider Background Screening Clearinghouse.
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Centralized Returns Significantly Reduce or even Eliminate Returned Check Fees.
Practice Insight Instructional Webinar Series Reporting
Automated Payment System. Benefits There is minimal training needed No expensive equipment necessary You can maintain your existing banking relationship.
1 Introducing Access ® Online Cardholder, Billing Official and Approving Official Training.
Early Documentation to “Assign PSU ID” This document is current as of November 15, Please consider this information to be preliminary. Check back.
Jewelry Inventory Management Software Your Logo Here Welcome to a demonstration of Del Mar Data Systems Jewelry Inventory Management.
3/5/2009Computer systems1 Analyzing System Using Data Dictionaries Computer System: 1. Data Dictionary 2. Data Dictionary Categories 3. Creating Data Dictionary.
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Billing for Departmental Users
Customer Service Module Course Contents Table of Contents Enter A Request Search A Request Create Invoice (Funeral home request) Search Invoice Manage.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
1 Cash Handling – It’s my job Whether you take in lots of money or … you collect “pennies”
Ch1: File Systems and Databases Hachim Haddouti
Copyright ©2014 Pearson Education, Inc. Chapter 3 Requirements and Business Rules Chapter3.1.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
CELTS Collection Exchange & Loan Tracking System Efficiency Tools, Inc. P.O. Box Carrollton, Texas Phone Let Efficiency.
Lytec Medical XE New Feature List. 2 What’s new with Lytec Medical XE? Features: –HIPAA features –Timesaving features –Miscellaneous features New product.
Evergreen Indiana Basic Circulation Class Professional Development Office.
Confidential and proprietary to U.S. Bank 1 Corporate Payment Systems Adwebportal Training.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Database Systems COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Database Design - Lecture 1
Product Name: Reporting to the Max. The following presentation demonstrates the features and benefits of an enhanced reports available for the Cougar.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Configuring Public Access Computers to Protect Patron Privacy To Save or Not to Save? Strategies for Protecting Patron Information Revisited Amy West,
1 MIFOS INTRODUCTION February, Core Technology  Centralized  Access data in real-time  Web-Based  Access Anywhere  AAA Security  Authentication.
Let VRS Work for You! ELUNA Conference 2008 Presenter: Kelly P. Robinson GIL Service Georgia State University
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Patron Privacy Issues Cindy Cunningham – OHSU. Overview Balancing demands (academic environment) Privacy in Libraries System Privacy  Vendor  Institution/Library.
Chapter No 4 Query optimization and Data Integrity & Security.
Krishna Technologies, Pune. 166/167, Dhanshree Apt, Opp. Kasba Ganpati Mandir, Kasba Peth, Pune – , Maharashtra. Phone :
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Computerization of a bank  Automatic Teller Machines  Net Banking  Phone Banking  Savings/ Current/ Fixed Deposit/ Recurring Deposit  Loans against.
Application  Drill  Down Using Batch Posting Concept.
IdentiTrip Key Features & Benefits All data imported from MIS system Quick MIS upload annually for new intake and class changes No manual input of pupil.
Chapter 3 Requirements and Business Rules Copyright © 2012 Pearson Education, Inc. Publishing as Prentice HallChapter3.1.
The UTS MODULES Following are the various modules in UTS project: 1. The Accounting Module 2. Ticketing ( also called client) module 3. Fare module 4.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Using the District Accounting System A District Governor’s View.
Chapter 1 Page ref. Chapter 1 Company File Setup and Maintenance 1.
Section 3: Banking Services
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
1 Introduction to MBProject. 2 Part I: MBProject and how it is used. Part II: What MBProject might do in the future. Also, as-built data collection and.
Enforcement via Policies and Procedures. Processes and Procedures These are boring, tedious, time consuming…… BUT THEY ARE ESSENTIAL They must be written.
Company File Setup and Maintenance Chapter 6. PAGE REF #CHAPTER 6: Company File Setup and Maintenance SLIDE # 2 2 Objectives Use the EasyStep Interview.
IT IS THE BEST SCHOOL SOFTWARE THAT HELP YOU IN MANAGING SCHOOL ADMINISTRATION WORK. Product of MACWILL.
Class Management Module Globo Soft Tech Solution Make It Simple.
Cash Handling – It’s my job
Yintran User Manual English Version Updated
Mobile App – For iOS and Android Devices
Electronic/Online Banking & Bill Pay
The First Steps To A Knowledge Management Database
University E-Commerce: A Balancing Act
Cash Handling – It’s my job
Dynamics GP Overview. Dynamics GP Overview.
HIPAA Security Standards Final Rule
MEANINGS SAP – Sales Application & Products. ECP – Enterprise Content Production. ECT – Enterprise Content Training. OEP – Object Repository Server PTM.
NextGen Payroll Demo Resource 2018
Footwear Planning and Production Process
iSecurity AP Journal Training
Presentation transcript:

1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004

2 Definitions  Privacy: “…isolated from the view of others”  Manage Access: “Supervise the right to make use of”

3 Policy Decisions  Collect And Secure  Protect Through Ignorance (having no knowledge of) Keep All Info Collect And Secure Protect Through Ignorance Keep No Info Our Focus

4 Privacy Protection Program  Affirmatively Eliminate Orphaned Data  Centralize Selective Data Repository  Secure Access to Data  Evaluate Backup Procedures  Develop Written Policy Lets See What This Means…

5 Types of Data (Managed Access)  Personal Information  Content  Activity  Transactional

6 Personal Data  Bar Code (or other unique identifier)  PIN / Password  Optional: –Name –Date of Birth –Status / Access Type –Fines / Fees Owed A Unique Identifier is Required to Manage Access CIPA Compliance

7 Content Data  Keystroke Recordings (Auto Saves)  Saved Documents  Document Names  Browser Utilities (Favorites, History, Bookmarks)  Cookies  Web Destinations  Profiles Content Data is Not Required to Manage Access

8 Activity Data  Device Identification  Date & Time Stamp  Elapsed Time  Print Documentation Activity Data is Not Required to Manage Access* Daily Time Enforcement

9 Transactional Data  Payments  Expenditures  Account Balance  Bank Records Transactional Data is Not Required to Manage Access* COD Payment

10 2 Alternative Approaches  Statistical –No Data Relationship –Entries Not Readable By Man or Machine –Entry Counts Allow Limited Analysis –Summary-Only, No User Reconciliation  Detail –Relational Data –Some Entries Readable By Machine –Entry Details Allow Ad Hoc Analysis –Summary, Detail & User Reconciliation

11 Different Potential Results  Statistical: –Aggregate Activity and Transaction Counts –No Uniqueness Reporting –By Name: Current Account Balance Current Account Balance, Last Access Date  Detail: –Separable Activity and Transaction Counts –Uniqueness Reporting –By Name: per above, plus Activity and Transactional Reconciliation by and combination of: Date / Time / Device / Print Document Header

12 Conclusion  Privacy & Access Management are Compatible  Careful Construction of Database is Key  Content Need Never be Recorded  Evaluate Date, Time Stamp & Device ID –Staff Burden vs. Supported Services –Patron Reconciliation