Skip to main content

Understanding Privacy, Part Two: Understanding Privacy Policies

Webinar

About This Webinar

In our current information ecosystem, respect for user privacy is a key distinguishing characteristic of libraries. Few communities have been as vehement and long-standing in their support of people’s right to intellectual freedom and privacy protections as librarians have been.  There are core elements of library services that are now provided by third parties, providing user services on behalf of the library.  These vendors might not have the same respect for patron privacy as librarians do and in order to ensure consistency in library services, librarians providing access to digital services and content to patrons need a thorough understanding of privacy in a library context.

This two-part webinar series will provide the community with a deeper understanding of the privacy implications of the services they are contracting for. Part one of this series will cover, what types of data is being collected about user behavior.  Understanding what can and is being collected, for what purpose, and with whom these data are shared is a critical first component of being able to exert privacy controls on behalf of patrons.  This session will discuss the technical side of data collection of personal information by providers.  Some of this data collection is acknowledged by the user, such as for the purpose of personal information management, while others is processed without the awareness of users, or potentially even the library.   

The second part of this series will cover the privacy policies that govern engagement with user services.  Some of these policies are dense and full of legal terminology, which few have the time or expertise to comprehend fully.   During this session, presenters will break down key components of privacy policies and describe the ramifications of agreeing to these policy terms. This session will provide an overview of privacy policy terminology, and a grounding of some of the relevant legal underpinnings of these policies.

Event Sessions

Ask “how *should* we use that data?", not merely “how *could* we use that data?"

Speaker

A brief overview of the types of questions that we ask ourselves internally about the ways that data should be used, to align with the needs and expectations of the Information industry and the users we serve. We will cover the methods we are using to evaluate the risks and benefits of using (or not using) data to help users further their own research, to help libraries better support their patrons and the copyright holders to provide content that aligns with user and library demand, and using these considerations in determining how best to protect the related data and ensure it is used appropriately.

Principles, Policies, and Procedures: From Values to Organizational Practice

Speaker

Lisa Janicke Hinchliffe

Professor & Coordinator for Research Professional Development, University Library Affiliate Faculty, School of Information Sciences, European Union Center, & Center for Global Studies
University of Illinois at Urbana-Champaign

The networked environment has transformed information seeking, access, and use and, with the conveniences of the digital age and improvements to service quality have also come technologies that track and monitor use of information resources and tools. Librarians are – by both their professional values and ethics as well as often by state law – committed to protecting user privacy and intellectual freedom. This session presents a strategy based on principles, policies, and procedures for putting these values and obligations into organizational practice.

Updating Privacy

Speaker

Peter Brantley

Director, Online Strategy
University of California - Davis

Additional Information

  • Cancellations made by Day, Date, Year will receive a refund, less a $35 cancellation. After that date, there are no refunds.

  • Registrants will receive detailed instructions about accessing the virtual conference via e-mail the Friday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.

  • If you have not received your Login Instruction e-mail by 10 a.m. (ET) on the day before the virtual conference, please contact the NISO office at nisohq@niso.org for immediate assistance.

  • Registration is per site (access for one computer) and includes access to the online recorded archive of the conference. You may have as many people as you like from the registrant's organization view the conference from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.

  • If you are registering someone else from your organization, either use that person's e-mail address when registering or contact nisohq@niso.org to provide alternate contact information.

  • Conference presentation slides and Q&A will be posted to this event webpage following the live conference.

  • Registrants will receive an e-mail message containing access information to the archived conference recording within 48 hours after the event. This recording access is only to be used by the registrant's organization.

For Online Events

  • NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
  • You will need a computer for the presentation and Q&A.

  • Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.

Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.