SlideShare a Scribd company logo
1 of 10
Frameworks & Current
Issues in Library Privacy
NISO Privacy - June 19, 2015 



Laura Quilter, MLS, JD

UMass Amherst
aka



Where we’ve been, 

where we are,

where we might go
broad approaches to date
privacy against governmental intrusion: 4th Amendment. 1st
Amendment connections to anonymous speech. (late 18th c.)
privacy torts (late 19th/early mid 20th c.)
Fair Information Practice Principles [FIPPs] (late 20th c.)
sectoral implementation in US : FCRA, FERPA, HIPAA,
library privacy statutes, data breach notification statutes, etc.
more comprehensive implementation in EU: EU Data
Protection Directive, etc.
Fair Information Practice Principles
HEW, 1973 - attempting to establish a framework for
the use of information in the modern age; followed by
OECD, EU, and other organizations
fundamental premise underlying much modern privacy
regulation, but not usually implemented holistically
components: notice, choice/consent, access, integrity,
security, enforcement
FIPP implementations
EU Data Protection Directive among the fullest
implementations.
US FCRA, Fair Credit Reporting Act — typical in US for
providing consumers some modest implementations of access
and integrity, but very little notice, choice, or enforcement.
Gramm Leach Bliley (financial data)
HIPAA (health data)
Data Breach Statutes provide an implementation of security.
FIPP implementations
Library privacy statutes: Waivers from FOIA; sometimes
protection from government intrusion; sometimes fuller
implementations of FIPPs
Reader privacy statutes:
AZ - expanded to ebooks
CA - booksellers & electronic booksellers records
protected; notice to users; reporting; exceptions
MO - ebooks added; 3rd party vendor records added
Are these issues manageable
through existing approaches?
Library Privacy Laws - revisions to cover ebooks; “readers”, 3rd party holders of records; vendors
Nationally:
USA PATRIOT Act & Freedom Act reforms (limits on bulk collection of data); legal challenges
to mass warrantless surveillance.
ECPA reform and the 3rd party business records doctrine.
Federal attacks on strong cryptography, demanding weak crypto, backdoors/keys.
Ubiquitous surveillance and record collection (e.g., RFID; video footage; logging).
Data mining.
Internationally: Varying approaches in UK & Europe already only increasing. In Europe, the new
“Right to be Forgotten”, and efforts by EU and most recently Canada to enforce law
extraterritorially.
new approaches
FIPPs: Enforcement has been least-applied aspect;
expansion of regulatory enforcement or tort approaches
(negligence, duties owed to subjects of information
gathering).

Q: How to implement as a general duty? 

Q: How to handle distributed data (joint & several liability?)
Autonomy: Autonomy as a justification for privacy has been
a basis for US reproductive rights law since late 20th
century, but rarely applied to informational privacy; 1st
Amendment protections for anonymous speech make a
potential nexus. 

Q: Value of privacy as “seclusion” lost?
new approaches
Contextual privacy [Helen Nissenbaum] - Suggests
regulatory approach of notice & consent over migration
of data; strong controls around re-purposing. 

Q: Erosion of privacy as a norm.

Q: Creation of new information (via data mining &
algorithmic control) may lead to lack of awareness, so
how to regulate?
Give up “privacy” and instead regulate misuse / harms.

Q: Value of privacy as “seclusion” utterly lost

Q: How to define misuse / harm? Is “price
discrimination” a harm to the consumer?
questions for Privacy Working Group
why do we care about privacy? autonomy? “intellectual privacy”? seclusion? modesty?
relation to other values, such as consumer rights, control of time?
what interests are we trading off? privacy, accessibility, cost, options, user-friendliness,
security, freedom of speech, others?
who is in charge of “networked” data? what are the responsibilities for putting in a little data
into a larger pool? e.g., RFID; data mined & combined with other data; leading to targeted
advertising & price discrimination
are commercial uses qualitatively different from noncommercial uses of other people’s data?
ought libraries be granted more scope because they are trusted, or less scope? for the
librarians: public & nonprofit institutions’ engagements with private commercial entities is
subject to scrutiny; if data is commercial, what can be fairly shared with commercial entities?
do the differing roles of academic libraries (supporting the most privileged users) and public
libraries (supporting the least privileged) suggest different duties and perspectives?
what are effective enforcement mechanisms? Because without enforcement, principles are
nearly meaningless.

More Related Content

What's hot

LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
VALLOYD
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
Micah Altman
 

What's hot (20)

Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Internet
InternetInternet
Internet
 
June2014 brownbag privacy
June2014 brownbag privacyJune2014 brownbag privacy
June2014 brownbag privacy
 
Librarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research dataLibrarian RDM Training: Ethics and copyright for research data
Librarian RDM Training: Ethics and copyright for research data
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataHBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
HBS seminar 3/26/14: Dark Markets, Bad Patents, No Data
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Comments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data PrivacyComments to FTC on Mobile Data Privacy
Comments to FTC on Mobile Data Privacy
 
Big Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTPBig Data & Privacy -- Response to White House OSTP
Big Data & Privacy -- Response to White House OSTP
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social Machine
 
Polinter09
Polinter09Polinter09
Polinter09
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Isa12b
Isa12bIsa12b
Isa12b
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...
 

Similar to Laura Quilter NISO Privacy Meeting #4 - June 19, 2015

Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
mpcislides
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
smile790243
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
Mercatus Center
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard
 

Similar to Laura Quilter NISO Privacy Meeting #4 - June 19, 2015 (20)

Dan l. Burk on privacy.
Dan l. Burk on privacy.Dan l. Burk on privacy.
Dan l. Burk on privacy.
 
Privacy, Drones, and IoT
Privacy, Drones, and IoTPrivacy, Drones, and IoT
Privacy, Drones, and IoT
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Privacy and missing persons
Privacy and missing personsPrivacy and missing persons
Privacy and missing persons
 
Chapter2
Chapter2Chapter2
Chapter2
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of data
 
Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916Electronic surveillance and privacy 130916
Electronic surveillance and privacy 130916
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Thierer Internet Privacy Regulation
Thierer Internet Privacy RegulationThierer Internet Privacy Regulation
Thierer Internet Privacy Regulation
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Regulating code
Regulating codeRegulating code
Regulating code
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 

More from National Information Standards Organization (NISO)

More from National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
Lippincott "Beyond access: Accelerating discovery and increasing trust throug...
 
Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"Kriegsman "Integrating Open and Equitable Research into Open Science"
Kriegsman "Integrating Open and Equitable Research into Open Science"
 
Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"Mattingly "Ethics and Cleaning Data"
Mattingly "Ethics and Cleaning Data"
 
Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"Mercado-Lara "Open & Equitable Program"
Mercado-Lara "Open & Equitable Program"
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Recently uploaded (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Laura Quilter NISO Privacy Meeting #4 - June 19, 2015

  • 1. Frameworks & Current Issues in Library Privacy NISO Privacy - June 19, 2015 
 
 Laura Quilter, MLS, JD
 UMass Amherst
  • 2. aka
 
 Where we’ve been, 
 where we are,
 where we might go
  • 3. broad approaches to date privacy against governmental intrusion: 4th Amendment. 1st Amendment connections to anonymous speech. (late 18th c.) privacy torts (late 19th/early mid 20th c.) Fair Information Practice Principles [FIPPs] (late 20th c.) sectoral implementation in US : FCRA, FERPA, HIPAA, library privacy statutes, data breach notification statutes, etc. more comprehensive implementation in EU: EU Data Protection Directive, etc.
  • 4. Fair Information Practice Principles HEW, 1973 - attempting to establish a framework for the use of information in the modern age; followed by OECD, EU, and other organizations fundamental premise underlying much modern privacy regulation, but not usually implemented holistically components: notice, choice/consent, access, integrity, security, enforcement
  • 5. FIPP implementations EU Data Protection Directive among the fullest implementations. US FCRA, Fair Credit Reporting Act — typical in US for providing consumers some modest implementations of access and integrity, but very little notice, choice, or enforcement. Gramm Leach Bliley (financial data) HIPAA (health data) Data Breach Statutes provide an implementation of security.
  • 6. FIPP implementations Library privacy statutes: Waivers from FOIA; sometimes protection from government intrusion; sometimes fuller implementations of FIPPs Reader privacy statutes: AZ - expanded to ebooks CA - booksellers & electronic booksellers records protected; notice to users; reporting; exceptions MO - ebooks added; 3rd party vendor records added
  • 7. Are these issues manageable through existing approaches? Library Privacy Laws - revisions to cover ebooks; “readers”, 3rd party holders of records; vendors Nationally: USA PATRIOT Act & Freedom Act reforms (limits on bulk collection of data); legal challenges to mass warrantless surveillance. ECPA reform and the 3rd party business records doctrine. Federal attacks on strong cryptography, demanding weak crypto, backdoors/keys. Ubiquitous surveillance and record collection (e.g., RFID; video footage; logging). Data mining. Internationally: Varying approaches in UK & Europe already only increasing. In Europe, the new “Right to be Forgotten”, and efforts by EU and most recently Canada to enforce law extraterritorially.
  • 8. new approaches FIPPs: Enforcement has been least-applied aspect; expansion of regulatory enforcement or tort approaches (negligence, duties owed to subjects of information gathering).
 Q: How to implement as a general duty? 
 Q: How to handle distributed data (joint & several liability?) Autonomy: Autonomy as a justification for privacy has been a basis for US reproductive rights law since late 20th century, but rarely applied to informational privacy; 1st Amendment protections for anonymous speech make a potential nexus. 
 Q: Value of privacy as “seclusion” lost?
  • 9. new approaches Contextual privacy [Helen Nissenbaum] - Suggests regulatory approach of notice & consent over migration of data; strong controls around re-purposing. 
 Q: Erosion of privacy as a norm.
 Q: Creation of new information (via data mining & algorithmic control) may lead to lack of awareness, so how to regulate? Give up “privacy” and instead regulate misuse / harms.
 Q: Value of privacy as “seclusion” utterly lost
 Q: How to define misuse / harm? Is “price discrimination” a harm to the consumer?
  • 10. questions for Privacy Working Group why do we care about privacy? autonomy? “intellectual privacy”? seclusion? modesty? relation to other values, such as consumer rights, control of time? what interests are we trading off? privacy, accessibility, cost, options, user-friendliness, security, freedom of speech, others? who is in charge of “networked” data? what are the responsibilities for putting in a little data into a larger pool? e.g., RFID; data mined & combined with other data; leading to targeted advertising & price discrimination are commercial uses qualitatively different from noncommercial uses of other people’s data? ought libraries be granted more scope because they are trusted, or less scope? for the librarians: public & nonprofit institutions’ engagements with private commercial entities is subject to scrutiny; if data is commercial, what can be fairly shared with commercial entities? do the differing roles of academic libraries (supporting the most privileged users) and public libraries (supporting the least privileged) suggest different duties and perspectives? what are effective enforcement mechanisms? Because without enforcement, principles are nearly meaningless.