Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Protecting Patron Privacy

Safe Practices for Public Computers

ebook
1 of 1 copy available
1 of 1 copy available
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.
In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.
Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • Library Journal

      October 15, 2015

      This is a helpful little volume for practicing public librarians looking to beef up their patron privacy knowledge or practice. Beckstrom (systems manager, Lewis & Clark Lib., Helena, MT) covers the subject from start to finish, discussing issues such as the technical aspects of how patron information data is collected by websites to suggestions for how librarians can actively educate their patrons on protecting their privacy. There are often step-by-step instructions, allowing even those with little prior experience to implement Beckstrom's advice. Another useful addition is policy examples for administrators looking to improve their procedures. VERDICT This guide will be extremely beneficial to librarians working without the benefit of robust technology support departments, as it contains clear direction that can be implemented by nonspecialists. It will also be beneficial for librarians who are interested in increasing their patrons' understanding of Internet privacy, and certain chapters will be directly valuable to patrons themselves.--John Helling, Johnson Cty. Lib., KS

      Copyright 2015 Library Journal, LLC Used with permission.

Formats

  • Kindle Book
  • OverDrive Read
  • EPUB ebook

Languages

  • English

Loading