As always, libraries try to follow the law, preserving the right of individuals to have access to constitutionally protected material. People have honest disagreements about just what that entails – including Supreme Court Justices. But librarians don’t have to apologize for standing up for the First Amendment.
Lately, a number of libraries have offered programs in which drag queens read to children, or share make-up or fashion tips … Men dressing as women for the purposes of entertainment isn’t new at all.
The Florida legislature is well on its way to approving a bill that could have dramatic consequences for Florida students’ and teachers’ intellectual freedom. Proponents of HB 989 / SB 1210 claim that the bill improves transparency and gives parents a stronger voice in their children’s education. But we have to ask questions about these claims.
These seven checklists can help libraries conduct a comprehensive audit of library user data collection, retention, submission, and security.
Privacy Tech: Actions that libraries can take to improve the security of data exchanges between ILSs, discovery interfaces and networks.
Assuring patron privacy requires working with vendors to implement key privacy safeguards and using contracts to assure practices that protect user privacy.
When using library patrons’ data, the privacy of the patron must be protected. Tools like data de-identification will help achieve this.
New guidelines offer a perfect opportunity for libraries to revisit and update their existing privacy and confidentiality policies and practices
Libraries are looking for ways to improve privacy protections for their users, and in light of this change, we have designated Practical Privacy Practices as the theme for this year’s Choose Privacy Week, taking place May 1- 7, 2017. Blog posts planned for this week explore and promote technologies and practices that libraries can employ to enhance their patrons’ privacy protections.