Library Patrons' Privacy by Sandra J. Valenti

Library Patrons' Privacy by Sandra J. Valenti

Author:Sandra J. Valenti
Language: eng
Format: epub
Publisher: ABC-CLIO


OUR GUIDANCE

Much of the guidance we would suggest for the basic computer security concerns discussed in this chapter is inspired by prior work.22 However, in this case, the guidance will be more general in order to avoid the information falling out of relevance within only a short few years. The most basic guidance we would offer is to set any browsers to delete browsing history on exit. Regardless of what browser you use (though we would recommend Brave or Tor, discussed in Chapter 9), the option to delete browser history on exit will be found in the browser settings, which is generally represented by a button on the left or right side of the top ribbon of the browser (the same menu where you can view bookmarks, print, etc.).

To reduce the extent to which IP address information can be collected, using a “dark web” network like Tor (again, discussed in Chapter 9) can be an excellent solution. However, in the absence of this solution, simply using care when sharing information online or when visiting suspicious websites can go a long way. This includes when participating in surveys—whether for academic research or otherwise. Look for the rationale for the survey—how do they say your data will be used?—and the practices the researchers will use to secure your data—does it say in the statement of informed consent? Anytime you share an email address or create an account on a website, ask yourself, “do I trust this site?” and “is this account really necessary/will I use it?” Do not create an account on sites just to create them—they are just another place where your data can potentially be compromised.

For the specific challenge faced by Rose, the best response may be to adjust the physical layout of the computer terminals within the library. Commonly, computers within a library are arranged in rows, with one computer next to another and/or one computer stationed in a row behind another, such that it makes it very easy to look over one’s shoulder. If the physical arrangement cannot be changed, another simple, but potentially pricey, solution is privacy screens designed for computer monitors. These are flexible, tinted screens that are attached to a computer monitor and allow light to pass through only straight-on (for the user viewing the screen) but not from an angle (as how someone would look over that user’s shoulder). These screens tend to cost a bit of money but are likely to be affordable given a small grant or other type of funding (as of 2020, they run about $35 each from most sources). Another option to lower costs (which seems to be supported in the ALA guidelines) is to make the privacy screens available for users but not required for every computer; this would mean that the library would not be on the hook for purchasing a privacy screen for every computer.

In the absence of a screen (which has some drawbacks, such as tinting the screen for the user) or physically rearranging computer



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.