These seven checklists can help libraries conduct a comprehensive audit of library user data collection, retention, submission, and security.
By Galen Charlton One trope of data security discussions envisions a perfectly secure database as one that exists on a computer that is turned off, encased in concrete underground, and under the supervision of a very cranky cat who refuses
by Eric Stroshane Library Development Manager North Dakota State Library In the wake of the 2013 Snowden revelations and the March 2017 Congressional resolution to eschew the FCC’s privacy rules, we’ve seen online privacy initiatives gain significant traction while garnering
by Becky Yoose Library Applications and Systems Manager The Seattle Public Library Libraries and library vendors contain multitudes of data1 : item circulation, patron information, computer sessions, program attendance, website logs, and searches, just to name a few. Data plays
By William Marden Director of Privacy and Compliance, New York Public Library Every library has (or should have) one but, ironically, it is probably the least-read document in any library’s collections. I am referring to library privacy policies, which have