Syndicate content

IFC Privacy Subcommittee (Intellectual Freedom Committee) Committee

In: ALA Council, Intellectual Freedom, Privacy, Technology
View:   Faces | List

Event IFC Privacy Subcommittee Meeting at the 2016 ALA Annual Conference in Orlando

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 08:11 am

The IFC Privacy Subcommittee will meet during the ALA Annual Conference in Orlando, Florida on Sunday, June 26, 2016 from 8:30 a.m. – 10:00 a.m. in Room W310, Orange County Convention Center, 9800 International Drive, Orlando, FL 32819.

The IFC Privacy Subcommittee will meet during the ALA Annual Conference in Orlando, Florida on Sunday, June 26, 2016 from 8:30 a.m. – 10:00 a.m. in Room W310, Orange County Convention Center, 9800 International Drive, Orlando, FL 32819.

PDF copies of the meeting agenda, the Midwinter 2016 action items, and the final drafts and/or approved copies of the library privacy guidelines are available via ALA Connect:http://connect.ala.org/file-manager/group/64527/Documents%20for%202016%20Annual%20Conference%20in%20Orlando

Everyone is encouraged to print out and bring their own copies of these documents with them to the meeting.

More...

File dataexchange_privacy_v4_final

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 23.7 KB

File FINALDRAFTPACsNetworksPrivacyGuidelines_v4

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 104.15 KB

File Finalwebsites_privacy_guidelinesv4

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 102.67 KB

File systems_privacy_v5--2-

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 29.5 KB

File ebook_vendors_privacyFINAL

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 112.7 KB

File StudentPrivacyGuidelinesFINAL

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 45 KB

File PrivacyAgendaAC16FinalREVISED

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 80.13 KB

File Privacy2016MWActionItems

by Deborah Caldwell-Stone (staff) on Tue, Jun 21, 2016 at 07:57 am

PDF File, 40.35 KB

Online Doc DRAFT - Library Privacy Guidelines for E-book Lending and Digital Content Vendors

by Deborah Caldwell-Stone (staff) on Tue, Jun 16, 2015 at 09:45 am

Library Privacy Guidelines for E-book Lending and Digital Content Vendors

[Proposed draft guidelines for adoption by the ALA Intellectual Freedom Committee, the Digital Content Working Group, and other ALA bodies.]

Introduction

Library Privacy Guidelines for E-book Lending and Digital Content Vendors

[Proposed draft guidelines for adoption by the ALA Intellectual Freedom Committee, the Digital Content Working Group, and other ALA bodies.]

Introduction

Protecting user privacy and confidentiality has long been an integral part of the intellectual freedom mission of libraries. The right to free inquiry as assured by the First Amendment depends upon the ability to read and access information free from scrutiny by the government or other third parties.  In their provision of services to library users, librarians have an ethical obligation, expressed in the ALA Code of Ethics, to preserve users' right to privacy and to prevent any unauthorized use of personally identifiable information.  Librarians and libraries may also have a legal obligation to protect library users' data from unauthorized disclosure.

Libraries enter into licenses or agreements with commercial vendors in order to provide library users access to digital information, including e-books, journals, and databases.  Access to these resources is most often provided via networks and the internet.  In the course of providing these services, most e-book and digital content vendors collect and use library patrons' personally identifiable information and use data for a variety of reasons, including digital rights management, consumer analytics, and user personalization.  Libraries and vendors must work together to ensure that the contracts and licenses governing the provision and use of digital information reflect library ethics, policies, and legal obligations concerning user privacy and confidentiality.

These guidelines are issued to provide vendors with information about appropriate data management and security practices in respect to library patrons' personally identifiable information and data about their use of digital content.

Agreements, Ownership of User Data, and Legal Requirements

Agreements between libraries and vendors should address appropriate restrictions on the use, aggregation, retention, and dissemination of users' personally identifiable information, particularly information about minors.  Agreements between libraries and vendors should also specify that libraries retain ownership of all data and that the vendor agrees to observe the library's privacy policies and data retention and security policies. 

Vendors are strongly encouraged to implement the principles of privacy by design, i.e. products and services should have privacy concerns “built in, not bolted on.”  In addition, agreements between libraries and vendors should reflect and incorporate restrictions on the potential dissemination and use of library patrons' records and data imposed by local, state, and federal law. 

Clear Privacy Policies

Library users should be notified about vendor privacy policies when accessing a product or service.  The privacy policies should be made easily available and understandable to users.  Safeguarding user privacy requires that individuals know what personally identifiable information is gathered about them, how long it is stored, who has access to it and under what conditions, and how it is used.  There should be a way to actively notify ongoing users of any changes to the vendor's privacy policies.

User Consent

The vendor should give users options as to how much personally identifiable information is collected from them and how it may be used.  Users should be able to access content anonymously, and have a choice about whether or not to opt-in to features and services that require the collection of personal information.  Users should also have the ability to opt-out if they later change their minds.

Access to Personal Data 

Users should have the right to access their own personal information and contest its accuracy.  Verifying accuracy helps ensure that vendor services that rely on personally identifiable information can function properly.   Guidance on how the user can access their personal data should be clear and easy to find.

Access to personal information should be restricted to the user and conform to the applicable state laws addressing the confidentiality of library records as well as other applicable local, state, and federal law.

Data Integrity and Security

Whenever personally identifiable information is collected, the vendor must take reasonable steps to ensure integrity and security, including compliance with applicable statutory requirements.

Security: Security involves both managerial and technical measures to protect against loss and the unauthorized access, destruction, use, or disclosure of data.  Security measures should be integrated into the design, implementation, and day-to-day practices of the vendor's entire operating environment as part of its continuing commitment to risk management.  The vendor should seek compliance with published cybersecurity standards from organizations such as National Institute of Standards and Technology (NIST).

Encryption:The use of data encryption helps enhance privacy protection.  All online transactions between client applications (web browsers, mobile apps, etc.) and server applications should be encrypted.  In addition, any personally identifiable information and user data housed by the vendor off site (cloud-based infrastructure, tape backups, etc.) should use encrypted storage.

Anonymization: Data used for customer analytics and other types of analysis should be anonymized by removing or encrypting personally identifiable information.  While data anonymization is a good practice, it is not foolproof (re-identification analysis has been used to identify individuals from anonymized data sets); therefore access should still be restricted.

Retention:Personally identifiable information should not be retained in perpetuity.  The vendor should establish policies for how long to retain different types of data and methods for securely destroying data that is no longer needed.  For example, accounts that are expired or inactive for a certain amount of time should be purged.  Retention policies should also cover archival copies and backups.

Data Sharing:  It has become common practice for businesses to share data including personally identifiable information with cloud providers, third-party middleware vendors, and other business associates.  However, most state statutes on the confidentiality of library records do not permit release of library patrons' personally identifiable information or data about their use of library resources and services without user consent or a court order. In addition, ALA policy forbids sharing of library patron information with third parties absent a court order.

Government Requests:The vendor should develop and implement procedures for dealing with government and law enforcement requests for library patrons' personally identifiable information and use data. The vendor should consider a government or law enforcement request only if it is issued by a court of competent jurisdiction that shows good cause and is in proper form.  The vendor should inform and consult with the library when it believes is obligated to release library patrons' information unless prevented from doing so by the operation of law.  The vendor should also inform users through its privacy policies about the legal conditions under which it might be required to release personally identifiable information.

Company Sale, Merger, or Bankruptcy:In the event that the vendor is sold to another company, merges with another company, or is dissolved through bankruptcy, all personally identifiable information should be securely destroyed, or libraries and their end users must be notified and given the opportunity to request that their data be securely destroyed.

User Devices

Privacy protections for library patrons' personally identifiable information and use data should extend to the user's device, including the web browser or any applications provided by the vendor.  Communications between the user's device and the vendor's services that contain personally identifiable information and use data should be encrypted.  If the vendor wishes to employ personalization technology such as web browser cookies on its website or allow third-party web tracking, it should inform the user and provide the user the opportunity to opt-in before initiating these features for the user. If a vendor-provided application stores personally identifiable information or use data on the user's device, it should be encrypted.  The user should be able to remove a vendor-provided application and delete any data stored on the device.

Audit and Notification

Vendors should establish and maintain effective mechanisms to enforce their privacy policies.  They should conduct regular privacy audits to ensure that all operations and services comply with these policies.  The results of these audits should be made available upon request to libraries that are customers or potential customers.  A vendor that suffers a breach in its privacy policies through inadvertent dissemination or data theft must notify the effected libraries and users about this urgent matter as soon as the vendor is aware of the data breach.  

More...

Pages

The IFC Privacy subcommittee monitors ongoing privacy developments in technology (in cooperation with the Library & Information Technology Association), politics and legislation (in cooperation with the Committee on Legislation), and social trends; to identify needs and resources for librarians and library users; to propose action to IFC on resolutions, policies, and guidelines as well as on educational, informational, promotional and other projects; and to collaborate with other organizations (e.g., LITA and COL).

Subscribe to IFC Privacy Subcommittee (Intellectual Freedom Committee)