Privacy and Library Systems Karen Coyle for InfoPeople November, 2004.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Student Induction 9 October BLDS: British Library for Development Studies Services for IDS fellows and Students Services for external users, e.g:
Using SD K12 SharePoint®.
Services Course Windows Live SkyDrive Participant Guide.
GEtServices Services Training For Suppliers Requests/Proposals.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
RefWorks: The Basics October 12, What is RefWorks? A personal bibliographic software manager –Manages citations –Creates bibliogaphies Accessible.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Ordering Textbooks Using the KIMRC On-Line Ordering System Reminder: The KIMRC is unable to purchase workbooks.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Communicating Information: Web Design. It’s a big net HTTP FTP TCP/IP SMTP protocols The Internet The Internet is a network of networks… It connects millions.
1 CS 502: Computing Methods for Digital Libraries Lecture 2 The Nomadic Computing Experiment Object Models.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Use the VHA in Wilson: PRACTICALITIES This Powerpoint is viewable at
Searching and Researching the World Wide: Emphasis on Christian Websites Developed from the book: Searching and Researching on the Internet and World Wide.
Library & Information Services Using the Library Catalogue Part 2: My Account Reserving Items Reading lists Rachael Hartiss 2008.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
Spying and security on the Internet Some tricks to know.
Library Privacy Audits and Search Warrants: Preparing for Inquiries into User Records Karen Coyle and Mary Minow Infopeople Webcast November 4, 2004.
University of Kentucky Proxy Service Presentation By Kelly Vickery
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
Introducing the Internet Source: Learning to Use the Internet.
HOW ACCESS TO WWW Student Name : Hussein Alkhaldi.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Protecting Patron Information in a Consortial Environment Issues and Strategies Jennifer Kuntz
University Health Care Computer Systems Fellows, Residents, & Interns.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
Patron Privacy Issues Cindy Cunningham – OHSU. Overview Balancing demands (academic environment) Privacy in Libraries System Privacy  Vendor  Institution/Library.
1 Patron Data Management and Library Systems: A Vendor Perspective ALA Conference Summer, 2004.
1 Visalia Unified School District SRTS User Training November 21, 2005 By SRTS Support
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
XP Browser and Basics COM111 Introduction to Computer Applications.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Re-thinking Resource Sharing Dare to Share Gail Wanner (SirsiDynix) & Clare MacKeigan (Relais International) October 12, 2006.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Web Measurement. The Web is Different from other Commuication Media More precise measurement of activity on Web sites is available More precise measurement.
The Method and the Madness: Introducing Request Delivery to IUCAT Julie Hardesty Senior Systems Analyst/Programmer, UITS January 14,
CDLC E-Form Use the CDLC e-form to request from libraries outside Questar III SLS or if Questar III libraries do not have what you are looking for.
PYP002 Intro.to Computer Science Brwosing the Web1 Browsing the Web Chapter 19.
Activating user account and Introduction of IT services at Omnia Omnia IT-Services.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
EZAccess User Guide. EZAccess is a web proxy server that allows authorized users to access IP-restricted electronic resources subscribed by UiTM library.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Anonymizing Web Transaction Logs to Ensure Privacy and Increase Usability Paul A. Soderdahl University of Iowa Libraries ILA/ACRL Spring 2003, Dubuque,
Web Development Web Servers.
PEPPERDINE UNIVERSITY LIBRARIES
New Features in Fulfillment
TYPES OF SERVER. TYPES OF SERVER What is a server.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
REDCap and Data Governance
Unit# 5: Internet and Worldwide Web
Browsing the Web Chapter 19 PYP002 Intro.to Computer Science
Designing IIS Security (IIS – Internet Information Service)
Personal Privacy and the Public Internet
Presentation transcript:

Privacy and Library Systems Karen Coyle for InfoPeople November, 2004

Privacy Today

Data Mining SSN zip code date of birth public records

Privacy Today – in Libraries Computer systems create records where none existed before Library services go beyond library walls Library network is part of a larger networked world

Privacy Today – in Libraries Computer systems create records where none existed before Library services go beyond library walls Library network is part of a larger networked world Any library data is in the context of the data soup

What libraries can do.... Be responsible keepers of information about our patrons and library use Be honest and informative

Service and Privacy More service can require more user information Personalization is... personal

Security and Privacy An insecure system cannot protect the privacy of users Desire for security can lead to monitoring and logging of use

Systems & Privacy Library application systems Web site and servers Public workstations Remote services

Rules for data collection Only gather data that is absolutely necessary to perform the function Do not keep data longer than is needed to perform the function Limit access to those persons who must work with the data

Library Application Systems Patron database Circulation records Fines and payments Document delivery ILL requests and fulfillments Electronic reserves OPAC logs Circulation and Borrower Records

Library Application Systems Saved searches or bibliographies Automated search profiles (SDI) Virtual reference my library personal view services Personalized Services

Library Web Site Web server logs Proxy server logs Cookies Forms and

Sample web log [23/Jun/2002:02:21: ] "GET /reach.html HTTP/1.0" "-" "Mercator-2.0" [23/Jun/2002:02:21: ] "GET /htdig/search.html HTTP/1.0" "-" "Mercator- 2.0" [23/Jun/2002:02:21: ] "GET /privacy-policy.html HTTP/1.0" "-" "Mercator-2.0" [23/Jun/2002:02:21: ] "GET /best.html HTTP/1.0" "-" "Mercator-2.0" [23/Jun/2002:02:22: ] "GET /upto.html HTTP/1.0" "-" "Mercator-2.0" [23/Jun/2002:02:22: ] "GET /cfp2002.html HTTP/1.0" "-" "Mercator- 2.0"

Sample web log Internet address of user: Date and time: [23/Jun/2002:02:21: ] Requested document: "GET /topiclist.html " [23/Jun/2002:02:21: ] "GET /topiclist.html HTTP/1.0" "-" "Mozilla/3.01-C- MACOS8 (Macintosh; I; PPC)"" Browser: " Mozilla/3.01-C-MACOS8 (Macintosh; I; PPC)"

Sample web log Internet address of user: Date and time: [23/Jun/2002:02:21: ] Requested document: "GET /topiclist.html " [23/Jun/2002:02:21: ] "GET /topiclist.html HTTP/1.0" "-" "Mozilla/3.01-C- MACOS8 (Macintosh; I; PPC)"" Browser: " Mozilla/3.01-C-MACOS8 (Macintosh; I; PPC)"

Sample web log Internet address of user: Date and time: [23/Jun/2002:02:21: ] Requested document: "GET /topiclist.html " [23/Jun/2002:02:21: ] "GET /topiclist.html HTTP/1.0" "-" "Mozilla/3.01-C- MACOS8 (Macintosh; I; PPC)"" Browser: " Mozilla/3.01-C-MACOS8 (Macintosh; I; PPC)"

Sample web log Internet address of user: Date and time: [23/Jun/2002:02:21: ] Requested document: "GET /topiclist.html " [23/Jun/2002:02:21: ] "GET /topiclist.html HTTP/1.0" "-" "Mozilla/3.01-C- MACOS8 (Macintosh; I; PPC)"" Browser: " Mozilla/3.01-C-MACOS8 (Macintosh; I; PPC)"

Sample Web Log en&ie=UTF-8 &oe=UTF8&q=library+not+safe +place" Can include searches

Public Workstations Browser cache and history Cookies Saved data Login records Sign-up sheets or systems

Remote Services Logons (in library or from home) Personalization Statistics Databases and licensed services

Remote Services User education Internet use The Internet is outside of the library

Privacy audit materials

For each: What data exists? Where is it located? Who has access? How long is the data kept?

For each: What data exists? Where is it located? Who has access? How long is the data kept? What is gathered and what does reveal? Who must have access to do their job ? How long is this data really needed? Is it within the librarys control?

Example: Saved bibliography What?Who?How long? List of record IDs + Patron ID + Date created. Saved on server Patron has access to their own; system admin has access to all; no other staff access Purged at the end of each academic year; patrons can delete

Example: Saved bibliography Remind users to delete saved bibliographies they are no longer using Remove bibliographies for user accounts that are no longer active Inform users that although the library wishes to provide a secure environment, it cannot guarantee the privacy of these files.

Example: Web logs What?Who?How long? Each request sent to library web server; includes: IP address of sender; item requested; browser... Only systems staff have access Stay on server until log file fills up; about 6 weeks

Example: Web logs If using web logs for statistics, gather statistics immediately and then purge the logs If logs must be kept, anonymize the users identity by removing all or part of the users incoming Internet address

Summary Identify system areas where data is stored Determine how long it is needed, and who should have access Educate staff and educate users

Thank You. Karen Coyle