国产视频

In Short

Taking the Fight for Digital Rights to Our Libraries

Library digital rights
Shutterstock

In a political climate where privacy 聽enough to our government鈥攂ut where millions of people fall victim to scams like the recent 鈥攚here might we look to learn how to defend digital rights? Chances are, the library鈥攖hat quaint bastion of books鈥攊sn鈥檛 at the top of your list. But when it comes to investigating how to update existing institutions for the digital age, the library provides a glimmer of hope鈥攁nd deserves a close read.

Unlike many civic institutions, Americans libraries. They trust in them deeply: It鈥檚 the place where people go to ask for help in order find information about personal matters like sexual health, bankruptcy, citizenship requirements, or unemployment insurance. And it鈥檚 also the place where people feel safe when posing such potentially revealing questions to an absolute stranger鈥攖he librarian sitting at the help desk.

Increasingly, though, the library is the place where people trust鈥攁nd use鈥攏ot just the librarian at the help desk, but also the search engine, online catalogs, digital archives, and electronic databases. So when patrons come into the library to find out about a sexually transmitted disease, for example, they will likely find themselves interacting with the online library鈥攁 messy mixture of library-specific digital tools and broader Internet resources that create all sorts of privacy risks for patrons.

Here鈥檚 how the library encounters privacy risks.

Increasingly, the library contracts with a number of third parties to run various services, for example, for e-book services, for interactive catalogs, and for electronic and magazine databases. Companies like these have the power to set their terms of service. That includes protecting the details of what patrons do when they use such tools or not. , library professionals caught Adobe Digital Editions transmitting patrons鈥 e-reading information in an unencrypted manner. Designed to seamlessly integrate with a library鈥檚 website, most services don鈥檛 make it obvious to a patron that a private company makes choices about her user data.

Management of computers and internet access at the library is tricky, too. Most Americans that libraries provide a vital service in offering free public computer and internet access. To keep patrons coming back, it needs to guarantee optimal performance of its network. And like every good IT manager knows, collecting web traffic data on the library network facilitates quality of service. But unfortunately, these records can be exploited. With the right digital forensic tools, someone with access to web traffic and computer reservation logs can unmask a patron鈥檚 web preferences and target them.

As well, if the library receives certain kinds of federal support for the provision of internet access, the library might implement filtering software to prevent young patrons from accessing harmful content. Such tools require tracking what devices on the library network do, much to the of privacy advocates. Meanwhile, unsecured library websites (http versus https) leak data about patrons and their web behavior to entities like analytics companies.

On top of all this, a whole host of typical consumer privacy threats awaits the patron as she logs on to the library network and uses the internet. For example, like most people, she might use and stay logged into Gmail, Outlook, or Facebook while surfing the Web. This kind of behavior facilitates , such as when patrons visit sites with widgets owned and operated by those services鈥 respective companies, like a 鈥淟ike鈥 button. Patrons鈥攁nd the library, more generally鈥攆ace menaces related to virus attacks, which make it easy for cyberthieves to steal user data. Recently, the public library system in St. Louis shut down for a system-wide wipe after cybercriminals held its network hostage with ransomware. Though the library said no theft of patron data occurred, a security researcher vulnerabilities in the institution鈥檚 information practices.

If this sounds complicated and scary, that鈥檚 because it is. But confronted with this matrix of vulnerabilities, the library鈥攚ith its longstanding to patron privacy鈥攁lso offers an impressive plan of action.

Some of the most comprehensive efforts come from large public library systems. In New York City, the Brooklyn Public Library leads the 鈥攁 project I鈥檝e been involved with鈥攚hich teaches library professionals about data flow to and through the library, privacy risks, and potential solutions. Between 2015 and 2016, nearly 250 library professionals from the Brooklyn Public Library steeped themselves in 6 hours of intensive learning on foundational privacy knowledge and hands-on, privacy-protecting skills. A small corps of participants volunteered to become trainers and co-facilitate workshops for library professionals from all walks, held at METRO, the New York Public Library, and the Queens Library. Altogether, approximately 450 library professionals from across the New York metropolitan area have taken part in the training.

BPL also routinely offers on topics of commercial and government surveillance, as well as workshops on advanced privacy and security practices. Its computer and internet classes, which predominantly serve members of historically marginalized groups, have begun to introduce privacy skills into their core digital literacy offerings. Some of these are taught by staff who served as volunteer trainers on the Data Privacy Project. The project has served as to New York City to expand privacy training and operate each of the 200-plus branches across the Brooklyn, Queens, and New York public library systems with at least one privacy-literate staff member.

Outside of education for staff and patrons, and as part of its strategic planning process, BPL recently in a top-to-bottom review of its digital assets and has since been formulating ways to keep its commitment to patron privacy, while offering new and innovating services. It has an internal FAQ (which inspired this publicly available ) that details patron privacy questions both sourced and answered by staff. It has an explicit that explains privacy practices for BPL and non-BPL services. Living up to the , the library鈥檚 new is secure by default.

This isn鈥檛 to say that there isn鈥檛 more room to grow for libraries like BPL, or that conflicts aren鈥檛 on the horizon. For example, it seems only a matter of time until library confidentiality rules clash with ISPs鈥 new ability to use or sell broadband usage data. New York State dictates that library records, digital or otherwise, must be kept confidential. Disclosure can happen only for the 鈥減roper operation鈥 of the library, upon request or consent of the user, or with a 鈥渟ubpoena, court order or where otherwise required by statute.鈥 At the very least, libraries could with ISPs to prevent user tracking or data resale.

Even so, as civil society worries about of targeted surveillance and weighs to provide a digital sanctuary to vulnerable populations, the library provides a critical blueprint. It has its work cut out for it, but it鈥檚 a convincing example of what other institutions might follow.

More 国产视频 the Authors

Seeta Pe帽a Gangadharan
Taking the Fight for Digital Rights to Our Libraries