How do educators create a society of readers? It’s not by restricting reading to an accepted range of Lexile levels or only books that have a quiz attached to them. Reading levels can be a useful tool to assist in guiding a child to the right book for them, but when those numbers become the only determining factor of what is acceptable to read, we have a problem.
One of the wonderful things about librarians is that they are driven to improve their communities. And one of the wonderful side effects of that is it also ends up improving the librarians as individuals and professionals as we adopt more and more of the principles, good habits, and thought processes that get encouraged to the library’s users.
More than 500 librarians and library supporters attended Library Legislative Day in Washington D.C. on May 1-2. With the Institute of Library and Museum Services threatened for elimination with President Trump’s ‘skinny budget,’ this year’s event saw more attendees at Library Legislative Day than any previous year. This year, I was fortunate to attend as a member of the New Mexico delegation.
The way I jumped head first into Google Apps for Education as a teacher and school librarian exemplifies my problematic ask-privacy-questions-later approach to student data security. When I read “How Google Took Over the Classroom” in the New York Times last week, I saw myself and my role in Google’s ascension to the K-12 tech throne in a new, more problematic light.
Libraries can uphold the tradition of protecting patron privacy by considering alternative web analytics tools instead of using Google Analytics.
Use these tools and tips to assure patron privacy on public computers.
These seven checklists can help libraries conduct a comprehensive audit of library user data collection, retention, submission, and security.
Privacy Tech: Actions that libraries can take to improve the security of data exchanges between ILSs, discovery interfaces and networks.
Assuring patron privacy requires working with vendors to implement key privacy safeguards and using contracts to assure practices that protect user privacy.
When using library patrons’ data, the privacy of the patron must be protected. Tools like data de-identification will help achieve this.