This checklist is intended to help libraries of all capacities take practical steps to implement the principles that are laid out in the Library Privacy Guidelines. It is an overview checklist that highlights general actions that are applicable across multiple guidelines. There are also specific checklists that libraries can consult for each guideline.
Priority 1 are actions that hopefully all libraries can take to improve privacy practices. Priority 2 and Priority 3 actions may be more difficult for libraries to implement depending on their technical expertise, available resources, and organizational structure.
Priority 1 Actions
- Create a policy that addresses the collection of user information. Such a policy should specify that the library is not collecting more user information than what it needs and that it is not keeping the personally identifiable information of users longer than what is necessary.
- Destroy all paper records with user data, such as computer sign-in sheets.
- Ensure all existing security certificates for HTTPS/SSL are valid and create a procedure for revalidating them annually.
- Designate a Library Privacy Officer to handle requests for personally identifiable information of users from law enforcement officials and other third parties.
Priority 2 Actions
- Ensure there is a formal process in place to address breaches of user data directly under library control or maintained by third parties. The library should notify affected users when they become aware of a breach.
- Encrypt all user data with secure algorithms in all network and application communications.
- Purge search history records regularly, ideally when the individual computer session ends.
- Purge circulation and interlibrary loan records when they are no longer needed for library operations. Any user data that is kept for analysis should be anonymized or de-identified and have access restricted to authorized staff.
- Utilize HTTPS wherever possible.
Priority 3 Actions
- Publish and distribute flyers and/or web content for users that includes information on how to protect personally identifiable information and other data.
- Publish and distribute flyers and/or web content for users about available software and alternative browsers and plugins to protect their privacy online and can be used in the library.
- Publish and distribute flyers and/or web content about VPN services and/or Tor and users’ ability to use these systems on the library network.
- Test compliance with these standards through a trusted third party service or individual.
- How to Geek’s 5 Alternative Search Engine’s That Respect Your Privacy.
- ALA’s Library Bill of Rights.
- ALA’s Privacy Toolkit.
- EFF Surveillance Self Defense – Choosing the VPN That’s Right for You.
- EFF Surveillance Self Defense – Introduction to Threat Modeling.
- EFF Surveillance Self Defense – Keeping your Data Safe.
- EFF Surveillance Self Defense – Seven Steps to Digital Security.
- NIST’S Policy on Hash Functions.