patron privacy in a surveillance state. revised. adam chandler
DESCRIPTION
Patron Privacy in a Surveillance State. Revised. Adam Chandler. Metadata Working Group May 1, 2014. July 5, 1993. “They are intent on making every conversation and every form of behaviour in the world known to them” - July 2, 2013. Post-Snowden reality. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/1.jpg)
Patron Privacy in a Surveillance State. Revised.
Adam Chandler
Metadata Working GroupMay 1, 2014
![Page 2: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/2.jpg)
2
July 5, 1993
![Page 3: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/3.jpg)
3
“They are intent on making every conversation and every form of behaviour in the world known to them” - July 2, 2013
![Page 4: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/4.jpg)
Post-Snowden reality
4
![Page 5: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/5.jpg)
5
![Page 6: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/6.jpg)
6
![Page 7: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/7.jpg)
7
![Page 8: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/8.jpg)
8
Gellman, Barton, and Ashkan Soltani. “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” The Washington Post, November 1, 2013,
![Page 9: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/9.jpg)
9
![Page 10: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/10.jpg)
10
![Page 11: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/11.jpg)
11
![Page 12: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/12.jpg)
12
![Page 13: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/13.jpg)
13
![Page 14: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/14.jpg)
“First half of 2013, American authorities made 12,444 requests of 40,322 accounts. Yahoo handed over content in 37 percent of cases, whereas in 55 percent of the cases, the company handed over only ‘non-content data’ (NCD).”*
*Basic subscriber information including the information captured at the time of registration such as an alternate e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., “to,” “from,” and “date” fields from e-mail headers).
14
![Page 15: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/15.jpg)
321,000 legal orders for user data in 2013. Of those, over 6,000 were court orders to provide metadata in real time.”
15
![Page 16: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/16.jpg)
16
“State and federal agencies made 301,816 separate demands for data from AT&T in 2013.
“Governments asked for location-related data 37,839 times”
![Page 17: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/17.jpg)
17
“Sprint Accused of Overcharging US for Spying Assistance.” Network World, March 4, 2014. http://www.networkworld.com/news/2014/030414-sprint-accused-of-overcharging-us-279362.html.
![Page 18: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/18.jpg)
“What eludes Mr. Snowden – along with most of his detractors and supporters – is that we might be living through a transformation in how capitalism works, with personal data emerging as an alternative payment regime. The benefits to consumers are already obvious; the potential costs to citizens are not. As markets in personal information proliferate, so do the externalities – with democracy the main victim.”
18
Evgeny Morozov
![Page 19: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/19.jpg)
19
![Page 20: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/20.jpg)
20
![Page 21: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/21.jpg)
21
![Page 22: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/22.jpg)
“When the government collects metadata on people, the government puts them under surveillance. When the government collects metadata on the entire country, they put everyone under surveillance. When Google does it, they do the same thing. Metadata equals surveillance; it's that simple.”
22
Bruce Schneier
![Page 23: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/23.jpg)
“Surveillance is the business model of the
Internet.”
23
Bruce Schneier
![Page 24: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/24.jpg)
“With little or no revenue from its users, Google still manages to turn a healthy profit by selling advertisements within its products that rely in substantial part on users’ personal identification information … in this model, the users are the real product.“
- after dismissing a class action lawsuit brought by Google users who claimed the search giant broke the law when it combined the privacy policies of Gmail, YouTube and a variety of other services. 24
US Magistrate Judge Paul Grewal
![Page 25: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/25.jpg)
25
"We have a stalker
economy."
![Page 26: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/26.jpg)
Um. Since we work in libraries… what does all this mean for patron privacy?
26
![Page 27: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/27.jpg)
Statement on Access to Personally Identifiable Information in Historical Records
Librarians should recognize an obligation to monitor their governments’ legislation in regard to confidentiality of data records. In particular, librarians should support the need for privacy laws to protect library users from such abuses as government agencies monitoring their reading and research habits. - IFLA Governing Board
27
![Page 28: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/28.jpg)
ALA Code of Ethics
III. We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted. - American Library Association
28
![Page 29: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/29.jpg)
29
![Page 30: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/30.jpg)
30
![Page 31: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/31.jpg)
31
![Page 32: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/32.jpg)
32
![Page 33: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/33.jpg)
33
![Page 34: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/34.jpg)
David Weinberger, co-director of the Harvard Library Innovation Lab.
"The privacy that libraries traditionally have been preserving is not always valued by their patrons, especially in an age of social networking."
![Page 35: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/35.jpg)
Library 2.0
35
![Page 36: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/36.jpg)
36
“Librarian 2.0 is the guru of the information age.”
Stephen Abram
![Page 37: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/37.jpg)
37
![Page 38: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/38.jpg)
38
![Page 39: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/39.jpg)
39
![Page 40: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/40.jpg)
40
Zimmer, Michael. “Patron Privacy in the ‘2.0’ Era: Avoiding the Faustian Bargain of Library 2.0.” Journal of Information Ethics 22, no. 1 (April 1, 2013): 44–59. doi:10.3172/JIE.22.1.44.
7.5%
![Page 41: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/41.jpg)
41
Zimmer, Michael. “Patron Privacy in the ‘2.0’ Era: Avoiding the Faustian Bargain of Library 2.0.” Journal of Information Ethics 22, no. 1 (April 1, 2013): 44–59. doi:10.3172/JIE.22.1.44.
1.6%
![Page 42: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/42.jpg)
Contextual integrity
42
Nissenbaum, Helen Fay. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif.: Stanford Law Books, 2010.
![Page 43: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/43.jpg)
Case study: How are these competing paradigms playing out
in Cornell University Library?
43
![Page 44: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/44.jpg)
Library systems that collect patron usage data inside Cornell campus
![Page 45: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/45.jpg)
45
![Page 46: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/46.jpg)
46
![Page 47: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/47.jpg)
47
![Page 48: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/48.jpg)
48
![Page 49: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/49.jpg)
49
![Page 50: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/50.jpg)
50
![Page 51: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/51.jpg)
51
![Page 52: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/52.jpg)
Library systems that collect patron usage data outside Cornell campus
![Page 53: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/53.jpg)
53
![Page 54: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/54.jpg)
54
![Page 55: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/55.jpg)
55
![Page 56: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/56.jpg)
56
![Page 57: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/57.jpg)
57
![Page 58: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/58.jpg)
58
![Page 59: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/59.jpg)
59
![Page 60: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/60.jpg)
60
4. Postings to Question Point Services
You acknowledge and agree that OCLC may store all electronic transactions carried out between you and the library on this service and any information provided by you on this web form, as described in the Privacy Statement, for an indefinite period, with this exception: your name and all but the domain of your e-mail address will be deleted after 90 days. As such, OCLC may disclose the data in its possession only as described in the Privacy Statement and if required to do so by law.
You hereby grant to OCLC the perpetual, nonexclusive, world-wide right to edit, compile, and make searchable by libraries and the public all completed question-and-answer pairs
![Page 61: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/61.jpg)
61
“This study used content analysis to determine the degree to which the privacy policies of 27 major vendors meet standards articulated by the library profession and information technology industry. While most vendors have privacy policies, the policy provisions fall short on many library profession standards and show little support for the library Code of Ethics” (Magi, 2010).
Magi, Trina J. “A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?” College & Research Libraries 71, no. 3 (May 1, 2010): 254–272.
![Page 62: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/62.jpg)
62
![Page 63: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/63.jpg)
63
![Page 64: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/64.jpg)
Percentage polled who trust the following organizations “not at all”
64
“For Privacy, Americans Trust Facebook Less Than The NSA.” BuzzFeed. Accessed October 9, 2013. http://www.buzzfeed.com/charliewarzel/survey-for-privacy-americans-trust-facebook-less-than-the-ns.
![Page 65: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/65.jpg)
Is privacy online valued?
65
![Page 66: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/66.jpg)
66
"There is a big myth out there that young people don't care about privacy, and that is about as inaccurate as you can get… Just because young people want to participate in a public doesn't mean that they want to be public.“
- Danah Boyd, Microsoft Research
![Page 67: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/67.jpg)
67
They try to assert a form of social norms, an online “Keep out of Room” sign. This is difficult [in services like Facebook] they quickly learn.
![Page 68: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/68.jpg)
68
Social steganography ("hiding in plain site")
![Page 69: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/69.jpg)
69
![Page 70: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/70.jpg)
70
![Page 71: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/71.jpg)
71
![Page 72: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/72.jpg)
86%72
Rainie, Lee, Sara Kiesler, Ruogu Kang, and Mary Madden. Anonymity, Privacy, and Security Online. Pew Research Center’s Internet & American Life Project, September 5, 2013. http://pewinternet.org/Reports/2013/Anonymity-online.aspx.
![Page 73: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/73.jpg)
73
Rainie, Lee, Sara Kiesler, Ruogu Kang, and Mary Madden. Anonymity, Privacy, and Security Online. Pew Research Center’s Internet & American Life Project, September 5, 2013. http://pewinternet.org/Reports/2013/Anonymity-online.aspx.
55%
![Page 74: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/74.jpg)
74
Kiss, Jemima. “Privacy Tools Used by 28% of the Online World, Research Finds.” The Guardian, January 21, 2014, sec. Technology. http://www.theguardian.com/technology/2014/jan/21/privacy-tools-censorship-online-anonymity-tools.
56% say Internet is eroding their personal privacy
![Page 75: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/75.jpg)
75
Kiss, Jemima. “Privacy Tools Used by 28% of the Online World, Research Finds.” The Guardian, January 21, 2014, sec. Technology. http://www.theguardian.com/technology/2014/jan/21/privacy-tools-censorship-online-anonymity-tools.
28% (415 million) use tools to disguise their identity or location
![Page 76: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/76.jpg)
76
![Page 77: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/77.jpg)
77
![Page 78: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/78.jpg)
Recommendations
• Conduct a privacy audit, then repeat it at regular intervals
• Educate library technologists and marketing staff about patron privacy
• Weigh the pros and cons of adding social network features
• Use alternative to Google Analytics: http://piwik.org/privacy/
• Pressure vendors to implement SSL encryption
• Implement SSL for our ezproxy service
• Advocate for a log file/usage data anonymization best practice for library eresource vendors (i.e., LIPAA)
• Learn then teach data encryption as library service?
• Reorient ourselves to privacy by design
![Page 79: Patron Privacy in a Surveillance State. Revised. Adam Chandler](https://reader036.vdocument.in/reader036/viewer/2022062720/56813587550346895d9ce639/html5/thumbnails/79.jpg)
79Is patron privacy a value or a service?