SlideShare a Scribd company logo
1 of 77
Download to read offline
Ain’t Nobody’s Business
IF I DO
Dorothea Salo
the iSchool at UW-Madison
NASIG 2015
(read serials)
Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions changed
Good morning, folks, and thanks for being here. My name is Dorothea Salo, and I teach technology as well as scholarly communication at the iSchool at the University of Wisconsin Madison,
after spending several years in academic libraries working on open access and research-data stewardship. When I was asked here to NASIG, the organizers told me I was slotted into a
“Vision Session,” that I needed to offer a vision relevant to this excellent and distinguished conference, something that’s not happening on the ground right now that I think should be. I
pitched the organizers several ideas — which may not surprise you if you know me; I am never short of opinions — and the one that caught fire with them was the question of reader privacy
with respect to electronic serials and ebooks, e-resources generally.
Lady Day
Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection
And that immediately brought to mind for me the unforgettable Billie Holiday singing the nineteen-twenties Grainger and Robbins blues classic “Ain’t Nobody’s Business if I Do.” Which, the
version of the song that Holiday sings starts out, “There ain’t nothin’ I can do nor nothin’ I can say, that folks don’t criticize me. But I’m gonna do just as I want to anyway, I don’t care if they
all despise me.”
Love that. LOVE. IT. Because in my head it completely captures what’s going on with collection and exploitation of reader behavioral data. There’s a whole lotta libraries and a whole lotta
content providers in the Big Data or even small-data game doing whatever they want no matter what readers think. Might as well, right? Because whether you do or you don’t, somebody’ll
hate you.
If you DON’T collect and exploit user data, your accountants and Big Data nerds will hate you, because you’re missing revenue opportunities — or so they think; I’m not always convinced the
financial upside is what they think it is. Your usability wonks might hate you too, because they can learn useful things from snooping on how readers dink around with e-resources. And, I
mean, I’m laying it on the line here: that’s snooping, y’all, I don’t care how holy the reason is. But the uproar if you tell them not to do it, well, I’m seeing some of it, and wow. Some usability
wonks HATE privacy wonks like me right now.
Image: erokism, “Nope in Manchester,” https://www.flickr.com/photos/10295270@N05/3858329955/ CC-BY, cropped
Now, if you DO collect and exploit user data in the way it’s usually done today, I tell you what, I HATE YOU RIGHT BACK. Well, okay, “hate” might be a little strong. But I am definitely NOPEing
you, because if I as a reader of serials know you’re doing that, I trust you less, and I trust your systems less.
And you know who else trusts you less? The American Library Association.
—American Library Association
Code of Ethics
Article III
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
See, ALA has this Code of Ethics thing that first got written in nineteen-thirty-nine and has been revised a few times since then, and Article Three says that libraries will “protect each library
user’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted.”
Why?
Why does this matter?
Well, okay, so what? So ALA thinks reader privacy is important, so what? Hey, Facebook’s Mark Zuckerberg says we should all get over the privacy thing already! So who gives a flying flip
about a nearly century-old ethics code from some hysterical century-old librarians?
Did she just go there? YES, I WENT THERE, I said the h-word! I did so fully cognizant of the resonance that word has for librarians, as Section 215 of the Patriot Act teeters on the sunset
bubble, and I did so because it’s a pretty salient — and recent! — example of librarians taking the high road despite being called every name in the book. Which is not entirely dissimilar to
what’s happening to some library privacy advocates now, really!
Now, I could pound the podium at this point about abstractions like intellectual freedom, civil society, surveillance society, panopticons, blah blah blah. I could pound the podium, but there
are ethicists and philosophers and legal scholars and others who are a lot better at all that abstraction than I am. I’d rather keep it concrete. Plus, the hotel probably doesn’t want me to
damage the podium, right?
Internet of
Things
So, concretely, let’s talk for a second about what’s being called the Internet of Things. I mean, things, how much more concrete can you get, right? The basic idea here, for anyone not familiar
with it, is that gizmos we own that have ticked right along for ages without Internet connections can now be connected to the Internet. That lets us operate them remotely, like a thermostat in
my house that I can set from my office if I happen to be coming home early that day. They can also get information from the internet, like a TV automatically knowing what’s on. Networked
gizmos can give us insight into how they work and how to use them more efficiently, again like the thermostat. They can also give us insights into our own behavior, as with all the fitness
trackers out there, and make suggestions at least nominally aimed at helping us.
And one of the things that’s happening now with the Internet of Things is that the Federal Trade Commission is scrutinizing it pretty closely — this image here is from the opening page of
their January report on it, it’s a good report, not too long, and I recommend reading it — because as it turns out, it is SUPER easy to cause people real tangible harm based on data coming
from mundane items like a television or a fitness tracker or a thermostat.
A thermostat? Really?
Image: Ian Burt, “Empty Room—Shining Wallpaper,” https://www.flickr.com/photos/oddsock/2256899211/ CC-BY
Kind of the paradigm case here: my spouse is home at the moment, but if that weren’t so, imagine what the thermostat data would be telling a home burglar. Oh, hey, house is empty, come
and get it! More subtly, though — and this became a prominent public concern when Google bought Internet of Things thermostat maker Nest — what can this thermostat tell advertisers or
even law enforcement about me that actually ain’t nobody’s business? It ain’t nobody’s business when my house has people in it and when it doesn’t. For one thing, that starts to indicate
whether there’s a stay-at-home parent, or somebody unemployed, or somebody with a disability, or somebody who works at home. And that ain’t nobody’s business! And it starts to be
information that can be used against me, especially when correlated with all the other data coming from every corner of our lives. It could totally be used unfairly in credit and loan
deliberations, rental decisions, and so on. And we’re already starting to see horror stories like that, data used for redlining as well as extremely dubiously-ethical marketing.
Image:Mike Licht, “Creepy ‘Hello Barbie’ Doll Will Spy On Your Kids,” https://www.flickr.com/photos/notionscapital/16828864532/ CC-
BY
There have already been some publicized cases of stunning Internet of Things creepery, too, like the Barbie doll that recorded whatever a kid said to it and streamed that to Mattel, where it
piles up into a dossier on the kid. Yeah, totally no potential for abuse THERE.
But yeah, fine, thermostats and Barbie don’t reflect what anybody’s READING, so it’s NOT an intellectual-freedom issue, so why is Internet of Things-style creepery an issue for NASIG?
Well, thanks to our good friends at Adobe, we actually KNOW e-resource use is being snooped on and collected into dossiers, just like what kids say to Barbie. No possibility of doubt. I don’t
think anybody here has been living under a rock, so we all know about this, but just a recap: Adobe’s collecting reader-behavior information from Adobe Digital Editions, including when it’s
used on library-provided e-resources. Adobe got caught because they were transmitting the information in the clear, and they’ve stopped doing that — but they have NOT stopped collecting
the information, as far as anybody knows.
So I’m sorry, content providers, I really am, but there’s NO benefit of the doubt possible here. Readers can’t trust you. Librarians can’t trust you. Adobe shoved its foot in it right up to the thigh
for all y’all. We have to believe you’re all behaving like Adobe until and unless you state — and ideally prove — otherwise.
So what I’m ultimately saying here is, it actually makes a lot of sense to think of electronic resources as part of the Internet of Things. What’s an ebook? What’s an e-journal article? It’s a
mundane item you use for your own purposes that back in the day wasn’t even Internet-connected but now is. It communicates with the Internet and leaves data about you and your behavior
behind, data that can be used to dish the dirt on you, to cause you real tangible harm, individually or because your behavior happens to cluster with the behavior of others in a way that
somebody with power doesn’t approve of. The same privacy issues the F-T-C cares about with Internet of Things gadgetry are entirely salient to electronic resources.
*pause* Hey, F-T-C, c’mon over here and let’s talk, okay? I mean, we’re in Washington DC, right? If privacy’s gonna be a thing for dolls and thermostats, I’d love it to be a thing for ebooks and
electronic journals too. If that takes F-T-C intervention, I’m cool with that.
—American Library Association
Code of Ethics
Article III
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
Because I could go into the horror scenarios here, the real ones and the what-ifs, but I don’t see a need, they’re not all that different from what libraries have guarded against in the print era,
and anyway we’ve seen examples already. Aaron Swartz, Georgia State, e-textbook and e-testing platforms collecting data about minors, you all know the score. It’s because libraries were
aware of all these risks — had experience with a lot of them! — all the way back in nineteen thirty-nine that ALA took such a strong stance in favor of privacy and confidentiality. Amazingly
prescient stuff. I respect ALA a lot for this.
That’s libraries.
What about
publishers?
So that’s libraries’ ethical stance on reader privacy… what about publishers? I mean, since y’all are here and all.
That’s libraries.
What about
aggregators?
That’s libraries.
What about
A&I services?
That’s libraries.
What about
content providers?
Content providers generally? What’s y’all’s ethical stance on reader privacy?
So I went looking…
So I went looking for trade-level reader-privacy ethics statements, because hey, I started in publishing, I totally didn’t want to leave out all the people at NASIG who aren’t librarians, and
actually I discovered something pretty interesting. For “disturbing” values of “interesting.”
Committee on
Publication Ethics
I started in the obvious place, the Committee on Publication Ethics, because this is an ethical question, right?
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
Crickets. COPE says NOTHING about reader privacy. Jack. Diddly. Squat.
Society for
Scholarly Publishing
SSP, the next likely source, plus they’re right here with us — hi y’all! — so I couldn’t possibly ignore them.
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
STM Association
Huh. Okay, how about the STM Association?
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
Open Access
Scholarly Publishers
Association
And of course the question of reader privacy is just as salient for open-access journals as for anything else, if not more so, so I checked out OASPA too. I actually think it’s pretty cool that to
the best of my knowledge and belief, open-access journals don’t seem to have turned to exploiting or selling reader data as a major revenue stream. Maybe that’s because of OASPA, I
thought to myself!
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
Directory of
Open Access Journals
Well, so, okay, maybe OASPA left it to D-O-A-J, since they’re coming up with quality criteria for inclusion and certification of open-access journals these days.
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
(look uncomfortable, shuffle feet, let the moment go on too long…) Yeah, so, as you know I’m a long-time open-access advocate, and I gotta say to my fellow open-access folks, I’m seriously
not cool with this, y’all. Can open access please take the high road here?
So, maybe looking at trade associations was the wrong route, I said to myself, maybe the privacy statements are happening at the individual-journal level. Turns out that’s been looked at, in a
twenty-twelve study published in College and Research Libraries.
*crickets*
Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
Pretty much crickets, folks. Pret-ty much crickets. Yeah, there were privacy policies, but they were basically terrible.
And unfortunately, we know there are ugly issues here on both sides of the business-model fence. Eric Hellman checked twenty major research journal websites for evidence of ad-network
trackers, who in case you haven’t checked lately have been spreading malware as well as being generally creepy. He found trackers. Lots of trackers. In both toll-access and open-access
journal websites. And yeah, this was a really tiny sample, but be my guest, expand it, do you really think the results will be MORE in favor of reader privacy? Because I don’t.
This is a technology-infrastructure point, and tech infrastructure isn’t really what I want to talk about today, but just this one thing, librarians: the instant we put some third-party resource on
our website or in our LibGuides or in our catalog or refer patrons to it some other way, WE BECOME RESPONSIBLE for its privacy implications. If it takes some kind of systematic ethics review
of content-provider websites to call out this kind of thing, hopefully make some noise toward stopping it, well, I’m in favor.
Image: Will, “Conspiracy Nut” https://www.flickr.com/photos/emigh/57420134/ CC-BY, cropped
And to be fair, I’m not saying there’s a conspiracy theory here, okay? No tinfoil hats, I totally don’t believe that. It’s historical accident, this absence of ethical-responsibility statements from
content providers. It happened because in the days of print, reader privacy wasn’t the content-provider’s problem; aside from the venial sin of selling subscriber lists, content providers pretty
much couldn’t compromise reader privacy even if they wanted to! There was basically no way to monitor the use of a print journal or a print index or a print anything. Either it got mailed to
an individual subscriber and the subscriber did whatever they wanted with it —
Image: kait jarbeau, “oh, boy, let’s not do that again,” https://www.flickr.com/photos/esquire/52176612/ CC-BY
doodle wildly all over the pages
Image: Bibliotheek Kortrijk, “Boekenkerstboom,” https://www.flickr.com/photos/bibliotheekkortrijk/6553190505/ CC-BY
make an art installation for their favorite holiday
Image: LearningLark, “The House of Leaves-Burning 8,” https://www.flickr.com/photos/44282411@N04/4140306649/ CC-BY
light it on fire, whatever —
Image: Shannon Hauser, “Shelves and Book Cart” https://www.flickr.com/photos/shauser/9556678137/ CC-BY
— or the publication got mailed to a library, and maybe the library keeps track of how often that chunk of print leaves the shelf, but the library CERTAINLY doesn’t know who picked it up,
much less in what context, so it can’t tell the content provider anything about that. Not that it would anyway. So content providers didn’t have to think about reader privacy.
But times have changed, folks. Times. Have. Changed. The library isn’t always in the middle of the publisher-reader transaction any more, and even when we ARE, today’s content provider has
a lot more ways to compromise reader privacy available, so yes, content providers NEED to come up with an ethical position on reader privacy, okay?
And there’s an effort underway to maybe get a handle on this, NISO is working on this thing they call a Consensus Framework to Support Patron Privacy in Digital Library and Information
Systems. And I am BEGGING the NASIG community — I am begging each and every one of you here — to watch this, and to comment on it, and to make all participants in it VERY VERY CLEAR
that you’re watching. You are the right people, the people NISO needs to hear from!
Because I generally dig the word “consensus,” but I confess I’m a little worried that in the NISO context it’ll mean what it seems to mean in Trade Pacific Partnership negotiations, which is
something like “the rich content owners are gonna set the rules in a secret smoke-filled room and the rest of the world can just lump it.” That’s not consensus, that’s railroading, and it
NEEDS not to happen. So let’s not let it, okay?
—American Library Association
Code of Ethics
Article III
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
Until that or something like it happens, though, I’ll have to rely on the ALA Code of Ethics here, which actually doesn’t bother me a bit. One thing I want you to notice about this statement is
that it has ZERO qualifiers. None. Do you see an asterisk or a dagger or a footnote here? I do not.
*
* except when that’s inconvenient
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
It doesn’t say “libraries protect privacy — except when that’s inconvenient.”
Image: Gaby Av, “Indeed.” https://www.flickr.com/photos/photogaby/5090553158/ CC-BY, cropped/enlarged
Because sure, it’s super-convenient to do usability testing or market research silently, it’s super-convenient for librarians who need tenure to trawl those data, I get it, I do! And I’m not
unilaterally against those things, I’m just unilaterally against doing them in the thoughtless, careless way they’re often being done now. And, librarians, you get NO SMUG POINTS here, okay? I
am seeing articles in the library literature right now, today, that HORRIFY me, they’re so careless about reader data.
* except when we’re improving
our services
*
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
Another non-footnote goes “libraries protect reader privacy except when we’re improving our services,” which, what even IS that, that is one of the most amazing weasel phrases I have ever
heard. You can hide ANYTHING behind that, no matter how creepy.
Image: Mike Fernwood, “Jessy makes a movie” https://www.flickr.com/photos/ultimateslug/67568147/ CC-BY
I mean, imagine that in the physical library. “We’re going to follow you around the library and record what you’re reading with cameras and video, and we’ll keep that data indefinitely, but
don’t worry, we totally won’t ask you your name, and we’re only following you around in order to Improve Our Services!” In what world would that not be creepy? How is it any LESS creepy
watching my e-resource reading trail? Just because it’s immensely harder for me to figure out you’re doing it, much less stop you? That’s not less creepy, it’s MORE creepy! We are talking
sparkly vampire zombie werewolf Evil Overlord’s One Ring levels of creepy here, people!
I actually think “would we do this in the physical library, the physical bookstore, the NASIG exhibit floor?” is a fairly decent heuristic for assessing something’s creep factor. It’s not perfect,
absolutely not, but it’s useful, because our sense of what we will and won’t do in physical spaces is pretty strong, pretty sophisticated, pretty well thought through. It also keeps our patron
base from being divided into physical-library users and digital-library users, and one group having better privacy protections than the other, which, that just ain’t right. Throwing that out
there for people to take home.
* except when we’re sharing data with
our partners
*
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
Here’s another one, there’s no asterisk in Article Three saying that libraries protect privacy except when sharing data with partners — whoever THEY are. And librarians, “partners” doesn’t
just mean “content providers,” so some of us need to be way more nervous about what we’ve got on our websites than we are. We saw that with Hellman’s quick look at research journals.
Google Analytics, anybody? Facebook Like button? Yeah. Yeah. We need to be nervous about that.
—Ars Technica
http://arstechnica.com/tech-policy/2014/04/google-ends-
creepy-practice-of-scanning-gmail-education-apps/
Our good buddy Google? Totally shoved its foot in it up to the thigh on privacy. If you’re not in K-twelve circles you might have missed this, so the story is that schools using Google Apps for
Education suddenly found out that Google was assembling data and profiling students based on their email to use for advertising, despite many public protestations that Apps for Education
respected privacy!
What can I even say about that? Except that I don’t trust Google with behavior data as far as I could THROW Google. I don’t think any of us should. Yeah, I know Google Analytics’ terms of
service says it respects privacy. I just don’t believe what Google says about that. Why should I? Why should you? Why should anybody?
* except learning analytics
*
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
Speaking of education, Article Three has no exception for learning analytics either, whatever THOSE even are. Librarians generally don’t rat out our students to their professors, even when
students are being stunningly unwise. They’re learning, right? We know we have to leave them a private space for the various kinds of unwisdom that happen during the learning process.
Digital doesn’t change that! It’s not any more okay to rat students out now just because we have lots more detailed ways to do it.
Image: istolethetv, “oops, a memory” https://www.flickr.com/photos/istolethetv/2436193339/i CC-BY, cropped
And I’ll tell a story on myself for this one. Our course-management system at U-W Madison, like many, tracks what students do on their course websites and how long they spend doing it. So
for one online course I taught, I noticed that students weren’t spending hardly any time on the main lesson pages where the video content was, and they weren’t clicking on links to readings.
And I got pretty upset about that, and I made a huge angry fuss — only to find out that students were downloading video rather than streaming it because the streaming didn’t work real
great, and they were clicking on links from the PDF syllabus instead of the course pages.
They were doing the work. They were! They just weren’t doing the work in the way that the course-management system was able to capture. And my poor students were sincerely hurt and
scared, and they had every right to be, and I’m sorry about it to this day. And since then, I’ve been super-skeptical of whether learning analytics tell us much that’s useful, and super-aware
that they break trust bonds between student and instructor that I for one absolutely need to do effective work in the classroom. So I’ve learned my lesson — I don’t want to surveil my
students. I don’t want anybody ELSE surveilling them either — and that absolutely includes the library and e-resource content providers.
But at this point it doesn’t even look like I can say no! How do I say no, people? How? How do I tell all y’all to leave my students alone? Speaking of Georgia State, I want publishers OUT OUT
OUT of course-management systems, ‘cos y’all creepy.
* except when the patron doesn’t care
*
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
And finally, there isn’t an exception to library protection of privacy based on whether the patron knows or cares about what’s going on. Libraries pretty much assume that patrons usually
don’t know or care. Safe assumption, right? But not enough to let us do whatever we want, not ever. We also know, for example, that some privacy violators go to great lengths to KEEP people
from knowing their privacy is being systematically trashed, cough-cough-Patriot-Act, cough-cough-Snowden.
We also know that some of our patrons absolutely vitally need their privacy respected to be safe and to feel safe. Even if some of our patrons don’t particularly have to care about privacy,
others absolutely DO based on their research interests, their life circumstances, whatever — and y’all, I gotta say here, I do NOT think it coincidence that practically all the librarians and
other pundits I’ve seen saying libraries go too far in protecting privacy have been white men. Check yourself before you wreck yourself like Google Buzz and Google Plus, folks.
Look. if libraries don’t respect privacy, patrons who desperately need privacy won’t trust libraries, and sometimes these are the very patrons who need libraries the most. So libraries default
to privacy, and I believe with all my heart and soul that’s the correct default.
Notice that Article Three doesn’t say “when the patron KNOWINGLY CONSENTED,” which, yes, I agree that’s a whole different ball game. What I’m seeing — again, pretty much from white men
— is some kind of sense that the library can do whatever it wants with patron web-behavior and reading-behavior data because supposedly patrons don’t care. And I don’t know where that
sense comes from, but it sure ain’t the ALA Code of Ethics.
Well, I CARE.
And I do not
consent to this.
Oh, and nobody cares, you say? WELL, I CARE. Y’all don’t get to just say “patrons don’t care, readers don’t care.” I AM a library patron, as well as a reader of e-journals and other electronic
resources, and I care a WHOLE LOT about my personal privacy. If your whiz-bang technology rig, whatever it is, doesn’t account for me, and for other people with the smarts and the grit to
believe in privacy and to WANT privacy, there is something pretty seriously wrong with your technology rig, and you might want to check your ethics too.
Lady Day
Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection
And this is where I get back to the song made famous by Bessie Smith and Lady Day, because if you listen to it — and I honestly didn’t remember this until I’d already chosen my talk title —
if you listen to the song Ain’t Nobody’s Business If I Do, you find out that it’s about the singer allowing other people to walk all over her, to hurt her and exploit her — and I’m being a little
vague here, because the song is really painful and hard-hitting, so I’m warning people, only look at the lyrics if you’re okay with that. And the song insists that it’s her right to let those awful
things happen and nobody should interfere with that. And the way Lady Day sings it, it’s really clear to me that for her the song comes from a place of deep despair and helplessness. Don’t
interfere with my self-destruction, she sings, because if I can’t even do myself any good here, what good do you think you can do me?
Lady Day
Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection
And I’m guessing that sounds familiar to some folks here, who feel helpless faced with ubiquitous incessant onslaughts on reader privacy. It’s super-easy for any information seeker to throw
their privacy down the drain, it’s super-easy for any library to enable that, it’s super-easy for any web service that libraries use or that uses library interfaces to enable that, it’s super-easy for
any content provider to enable that, and yes, patrons do sometimes tell us “screw privacy, I want what I want!”
And what I’m saying here is, just because it’s easy and convenient to screw privacy doesn’t make it right, and it doesn’t mean we have to lie down and take it. Especially at Internet of Things,
Big Data scale.
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
NO EXCEPTIONS.
library user
reader
I’m supposed to give you a vision in this talk, and I haven’t done that yet, so here it is, here’s my vision. It’s super-simple really. I want libraries AND content providers to live up to Article III of
the ALA Code of Ethics, to protect each library user’s right *CLICK* — really each READER’s right, to include those of us in the room who are content providers rather than librarians — each
reader’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired, or transmitted.
*CLICK* No exceptions. And yes, I know that’s a radical position, but it ain’t the first radical position I’ve espoused in my career, and I sure hope it won’t be the last. This is my vision and I’m
sticking to it: NO EXCEPTIONS.
Ain’t Nobody’s Business
IF I DO
(read serials)
Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions
changed
Because seriously, it ain’t nobody’s business — it ain’t the webmistress’s business, it ain’t my wonderful departmental librarians’ business, it ain’t no publisher’s or aggregator’s or A-and-I
provider’s business, it ain’t the NSA’s business, it ain’t YOUR business — it ain’t NOBODY’S business if I do read serials!
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
NO EXCEPTIONS.
library user
reader
So what can we do, besides providing input to the NISO process I mentioned earlier, which I totally hope y’all will all do, to bring this vision closer to reality?
Wow. I wish I knew. I wish to the bottom of my heart I had a pat answer for you today. All this is enormously complicated, right? I’ve just scratched the surface here today. But I think I know
where to start. I do. It’s practically my classroom go-to for all kinds of situations, from privacy considerations in donor agreements to copyright and digitization to digital preservation
planning.
the risks.Understand
First we understand the risks, as best we can.
the risks.Mitigate
Then we mitigate the risks, again as best we can, certainly acknowledging that there are some things, like organizations obsessed enough to dive to the bottom of the ocean in order to copy
traffic off fiber optic cable, that we just don’t control.
I mean, how is this the world I live in, I don’t even know.
Which info is risky?
The first question I think we need to get a handle on is exactly what kind of information about our patrons causes risks to them.
Personally Identifiable Information
Behavior Trails
Long Tail Information
And for convenience, I’m dividing that into three buckets of information: P-I-I, what I call “long-tail information,” and behavior-trail information.
Personally Identifiable Information
Behavior Trails
Long Tail Information
☞
And, I mean, I think we’re all clear on personally-identifying information being really scary, so I don’t need to elaborate much on that. All I want to say is that it is NOT the only category of
data we need to be concerned about, and that sometimes privacy policies use P-I-I as a smokescreen for abuse of other classes of data — they proclaim very loudly that P-I-I is either not
collected at all or very carefully protected, and don’t say ANYTHING about anything else. Not okay, people. Any ethical framework we build around data needs to consider more than just P-I-I.
Personally Identifiable Information
Behavior Trails
Long Tail Information
☞
The next class of information I want us to be concerned about is what I’m calling “long tail information,” by which I mean data collected about patrons that’s a serious outlier in privacy-
problematic ways. There’s data about people, for example, that isn’t strictly speaking P-I-I but is still uncommon enough to identify specific individuals — this happened in the A-O-L search-
log release fiasco, it happened with the Netflix prize fiasco, it happened with the Hauser Facebook case, it’s how browser fingerprinting works, it’s really pretty common! What’s more, classic
anonymization techniques don’t fix this.
And the thing is, we’re all outliers in some way or other. So even if somebody doesn’t stick out in one dataset, combine a bunch of datasets that contain information about them — and this is
exactly what data brokers and web trackers and ad networks DO — and more and more people become individually identifiable, P-I-I or no P-I-I.
What people read? Totally long-tail information that can be tracked back to us. For some of us even more than others. I mean, if y’all could get your hands on journal-reading data from U-W
Madison, you could correlate my reading with my public Pinboard bookmarks in like two point five SECONDS and know it was me, because believe you me, I regularly read stuff nobody else
on my campus does. And anything in my journal reading that’s unexpected, an outlier? You’d know I read it and you’d be able to start guessing why. And just as another paradigm example,
four years ago? When my mother was dying of cancer of unknown origin? My outlier journal reading would have been EXTREMELY sensitive information, you get me?
Personally Identifiable Information
Behavior Trails
Long Tail Information
☞
That leads me to behavior trails. Just one reading transaction probably isn’t super-re-identifiable, unless what’s being read is a serious, serious outlier. An individual visit to an individual web
page, likewise. Where it starts being problematic is where you track a whole bunch of reads and a whole bunch of visits from the same person, even when you supposedly de-identify them.
Or even just when you keep highly specific timestamps along with the interactions; that’s sometimes enough to let somebody reconstruct a behavior trail. And the more behavior trail data
you have and the longer you keep it, the worse the privacy problem gets, because the easier it is to correlate interactions, and the more likely it is that you capture outlier reads that patrons
would rather you didn’t associate with them.
Image: Shannon Hauser, “Shelves and Book Cart” https://www.flickr.com/photos/shauser/9556678137/ CC-BY
And one great way libraries totally bypass this problem is by tracking uses of stuff without tracking people, and without trying to chain together or even correlate uses. Going back to the
physical library, again, you see a bunch of stuff on the cart, you scan the barcodes and it goes into a database, and who the heck knows who used it? And correlating use is dubious at best
because you don’t have any idea how many people put stuff on that cart, so nobody tries it. As data-collection practices go, this is pretty respectful of reader privacy.
Libraries also watch out for proxy server logs, because those are FULL of behavior-trail information. We do have to collect them, unfortunately, to deal with the would-be data miners
appropriately, but we don’t usually keep them very long because we understand there’s a privacy issue there. More of that, please, more intentional discarding of data. Data is a hot potato!
Drop it whenever you can! This is records-manager wisdom, y’all, LISTEN to your records managers, okay?
Who wants to know?
The next question we need to get a grip on is “who wants to know?” And a lot of times people answer this question by occupation, you know? You got your spooks, your marketers, your
academic researchers, your usability wonks, your black-hat hackers, and so on.
Omnivores
Paparazzi
Opportunists
I’m actually going to divvy it up a different way, by how and why people approach data about other people, and the techniques they’re likely to use to get hold of it and analyze it. Because I
think that gets at the risks better, and is more helpful at suggesting ways to mitigate those risks.
So this is only a first approximation, don’t hold me to it, but I think there are data omnivores, data opportunists, and data paparazzi.
Omnivores
Paparazzi
Opportunists
☞
The N-S-A is an omnivore. Google, Facebook, Amazon, commercial data brokers, they’re omnivores. Black-hat hackers are omnivores, typically. If there’s data, they want it, and they want to
match your data TO you. The only way to prevent that is to keep data out of their greedy paws, even when they’re actively lying to you and trying to subvert any effort you make to kick them
out of your systems. How to do that is a bit beyond the scope of this talk, but for what it’s worth most of the fixes I know of are partial at best, and they’re technical in nature.
Omnivores
Paparazzi
Opportunists
☞
Opportunists are trying to do cool and useful things with data. They’re academic researchers, and data collectors trying to be nice to academic researchers. They’re web and social-media
developers, usability wonks. They’re hackathonners. They’re open-data advocates and assessment experts. They’re what Ann Arbor District Library used to call “superpatrons.” They’re
people with their hearts in the right place — but that doesn’t mean they’ve thought things through. Data opportunists have made some pretty big privacy messes!
This is actually also where I’d place patrons who want to reuse their own data, or who want access to a family member’s data for reasonable reasons, things like that. There’s nothing wrong
with what they want to do necessarily, they just don’t understand the broader implications or are lucky enough not to have to care.
The thing about data opportunists is, they generally don’t want to hurt anybody, and they absolutely don’t want the backlash that happens if they mess up on privacy. We can, I believe, help
teach them how not to, not to mention WHY not to, and we should — they’re often good privacy allies once they understand the issues.
Omnivores
Paparazzi
Opportunists
☞
So, data paparazzi. Data paparazzi have a TARGET, a specific person they want to track, and they are gonna pursue that specific target through whatever data they can find. They are people
on political crusades, speaking of Washington DC. They are doxxers. They are kidnappers, perpetrators of violence, other people who hate and who harm. And paparazzi are terrifying, because
they are obsessed, they are amoral, and they stop at NOTHING — they will social-engineer you, they will hack your systems and try to use them against their target, they will take over a
target’s account to impersonate them or ruin them, they will correlate whatever they find out from you about their target with anything else they can find anywhere. Don’t be thinking “well,
they don’t want the data WE have” — yes, yes they do!
Some people, even some security researchers, will tell you “don’t worry, be happy” about behavior trails and other non-P-I-I data, because reidentification attacks don’t have a real high
success probability. Ed Felten and his research crew argue — and I agree with them — that this notion is based on the assumption that the attackers are data omnivores or opportunists, not
data paparazzi. Attacks carried out by paparazzi, because they’re so tightly targeted and so relentless, have a much higher chance of being successful and of causing somebody harm.
So I’m telling you, yes, worry about privacy. Worry about the patrons you have, the readers you have, who have paparazzi on their trail. I am absolutely sure you have at least one such patron
or reader, and probably you have lots more.
What ought we (not) do?
The last question is the big one, right? What should we do? What should we not do?
Image: Brad.K, “Ostrich Butt And American Flag” https://www.flickr.com/photos/stopbits/3584145338/ CC-BY
First thing is, NO OSTRICHING, okay? Heads OUT of the sand.
And to that end, I want you to know about the Library Freedom Project if you don’t already. This is Knight Foundation funded, it’s run by the amazingly badass Alison Macrina (ma-KREE-na),
and it is all about libraries protecting reader privacy in all the ways we can find to do that. It’s at libraryfreedomproject dot org.
Image: Ray Dumas, “Cat Fight” https://www.flickr.com/photos/rtdphotography/2822978477/ CC-BY, brightened/sharpened
And on that same theme, profession-level and industry-level advocacy and policy work are super-important here. Without them, librarians don’t know what to do, what to negotiate for, or
even what to hope for, and content providers get stuck in a nasty prisoner’s-dilemma cat fight because anybody who takes the high road on privacy has to be afraid they’ll be outcompeted by
somebody else taking the road to hell. Trade associations, this is your job; please do it. No more crickets, okay?
Lady Day
Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection
Next thing is, DON’T GIVE UP. Forget the song. We are NOT helpless, we CAN take concrete action to protect reader privacy, and it’s ABSOLUTELY worth doing.
Photo: Andrew Magill, “$5700” https://www.flickr.com/photos/amagill/362201147/ CC-BY
Next, librarians, let us use our benjamins wisely. License-negotiation time is the time we can ask the hard questions about privacy, and nail content providers down to real concrete answers.
I know, I know, world plus dog is trying to use e-resource licensing as a policy tool, but I’m asking you to consider doing it one more time, okay? Because as I said earlier, once we add
something to our website or our catalog, once we’re pointing patrons at it, WE ARE RESPONSIBLE if it compromises their privacy.
Content providers, give us privacy policies we can feel good about, please. I can’t put it any more simply than that.
Photo: Shannan Muskopf, “Standardized Test” https://www.flickr.com/photos/40964293@N07/4728093020/ CC-BY, cropped
And I know assessment is a thing and it’s not going away, but can we please, please assess mindfully, conscious of potential data leakage and data abuse scenarios? Right now in too many
libraries and at too many content providers, assessment is so compelling that it’s utterly obliterating privacy considerations. That’s NOT OKAY. It’s actually really scary, I mean, I-R-Bs exist
because scientists decided their work was too important to bother about whether they were harming people or lying to them about what was happening to them. Are we gonna revisit those
days now? Please let’s not.
When we see this, we need to call it out, refuse to participate, refuse to publish or otherwise countenance this kind of work, insist on confronting the privacy issues openly and
conscientiously.
Image: Everett, “404” https://www.flickr.com/photos/everdred/58794161/ CC-BY, cropped/enlarged
One final thought to take home with you: not even the greediest data omnivore, the most clueless data opportunist, or the most evil of data paparazzi can misuse data that isn’t there. Right
now, collectively, our reader-data default is “collect it! unless there’s a reason not to!” That’s backwards. The correct default is “don’t collect reader data unless there’s a CLEAR reason we
should. Just don’t.” The shoe needs to be on the foot of reasonable and transparent — not just transparent to us, but transparent to our readers — justification for any data we collect and
use.
Because that’s another useful decision heuristic, right? If you dread explaining your data collection and use to your readers, if you start weasel-wording all over it because you fear backlash,
maybe-just-maybe whatever you’re doing doesn’t pass the sniff test.
“protect each library user's right
to privacy and confidentiality
with respect to information sought or received
and resources consulted, borrowed,
acquired or transmitted”
NO EXCEPTIONS.
library user
reader
Article III. ALA Code of Ethics. That’s my vision of where we need to be.
Please help me make this vision real.
Ain’t Nobody’s Business
IF I DO
(read serials)
Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions
changed
Because one more time, say it with me — it ain’t NOBODY’S business if I do read serials!
Thank you!
This presentation is available under a
Creative Commons Attribution 4.0 International
license. Please respect licenses on included images.
Dorothea Salo
the iSchool at UW-Madison
salo@wisc.edu
http://dsalo.info/

More Related Content

What's hot

Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectjuliewltn
 
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009PDF: Live Free and Prosper: Metanomics Transcript October 8 2009
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009Doug Thompson
 
The surprising adventures of the mechanical curator
The surprising adventures of the mechanical curatorThe surprising adventures of the mechanical curator
The surprising adventures of the mechanical curatorbenosteen
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersJVGAJJAR
 
Marketing academic libraries in a web 2 world
Marketing academic libraries in a web 2 worldMarketing academic libraries in a web 2 world
Marketing academic libraries in a web 2 worldNed Potter
 
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...museums and the web
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethicallyLinda Long
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Web 2.0 And You!
Web 2.0 And You!Web 2.0 And You!
Web 2.0 And You!LeAnn
 
Estate Planning in the Digital Age
Estate Planning in the Digital AgeEstate Planning in the Digital Age
Estate Planning in the Digital Agegallowayandcollens
 
Estate Planning for the Digital Age
Estate Planning for the Digital AgeEstate Planning for the Digital Age
Estate Planning for the Digital Agegallowayandcollens
 
Copyright and our students 2
Copyright and our students 2Copyright and our students 2
Copyright and our students 2mholtkamp
 

What's hot (18)

Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
Internet Defamation
Internet DefamationInternet Defamation
Internet Defamation
 
Defamation on the Internet
Defamation on the InternetDefamation on the Internet
Defamation on the Internet
 
Cyborgs
CyborgsCyborgs
Cyborgs
 
Julie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically projectJulie walton integrating the internet safely and ethically project
Julie walton integrating the internet safely and ethically project
 
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009PDF: Live Free and Prosper: Metanomics Transcript October 8 2009
PDF: Live Free and Prosper: Metanomics Transcript October 8 2009
 
The surprising adventures of the mechanical curator
The surprising adventures of the mechanical curatorThe surprising adventures of the mechanical curator
The surprising adventures of the mechanical curator
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Marketing academic libraries in a web 2 world
Marketing academic libraries in a web 2 worldMarketing academic libraries in a web 2 world
Marketing academic libraries in a web 2 world
 
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...
MW2011: Cope, A., Authority Records, Future Computers and Other Unfinished Hi...
 
Integrating the internet safely and ethically
Integrating the internet safely and ethicallyIntegrating the internet safely and ethically
Integrating the internet safely and ethically
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Web 2.0 And You!
Web 2.0 And You!Web 2.0 And You!
Web 2.0 And You!
 
Metanomics Transcript Nov 18 2009
Metanomics Transcript Nov 18 2009Metanomics Transcript Nov 18 2009
Metanomics Transcript Nov 18 2009
 
Estate Planning in the Digital Age
Estate Planning in the Digital AgeEstate Planning in the Digital Age
Estate Planning in the Digital Age
 
Metanomics Transcript Nov 18 2009
Metanomics Transcript Nov 18 2009Metanomics Transcript Nov 18 2009
Metanomics Transcript Nov 18 2009
 
Estate Planning for the Digital Age
Estate Planning for the Digital AgeEstate Planning for the Digital Age
Estate Planning for the Digital Age
 
Copyright and our students 2
Copyright and our students 2Copyright and our students 2
Copyright and our students 2
 

Viewers also liked

Performing electrophysiological measurements in humans inside Magnetic Resona...
Performing electrophysiological measurements in humans inside Magnetic Resona...Performing electrophysiological measurements in humans inside Magnetic Resona...
Performing electrophysiological measurements in humans inside Magnetic Resona...Trinity College Dublin
 
Resume.2012
Resume.2012Resume.2012
Resume.2012Cappucci
 
Dmexco Vortrag Online Panels
Dmexco Vortrag Online PanelsDmexco Vortrag Online Panels
Dmexco Vortrag Online PanelsQuestBack AG
 
Digital Direct Marketing
Digital Direct MarketingDigital Direct Marketing
Digital Direct MarketingDatalicious
 
Lenguaje c compu 2
Lenguaje c compu 2Lenguaje c compu 2
Lenguaje c compu 2luiseldrumer
 
Programa Diseñarte Bolivia 2013
Programa Diseñarte Bolivia 2013Programa Diseñarte Bolivia 2013
Programa Diseñarte Bolivia 2013Abomoda Bolivia
 
XPRESS HOLDINGS PR
XPRESS HOLDINGS PRXPRESS HOLDINGS PR
XPRESS HOLDINGS PRJacqui Heng
 

Viewers also liked (11)

Performing electrophysiological measurements in humans inside Magnetic Resona...
Performing electrophysiological measurements in humans inside Magnetic Resona...Performing electrophysiological measurements in humans inside Magnetic Resona...
Performing electrophysiological measurements in humans inside Magnetic Resona...
 
Resume.2012
Resume.2012Resume.2012
Resume.2012
 
Braduate Issue05 A
Braduate Issue05 ABraduate Issue05 A
Braduate Issue05 A
 
Dmexco Vortrag Online Panels
Dmexco Vortrag Online PanelsDmexco Vortrag Online Panels
Dmexco Vortrag Online Panels
 
JCI - ONU
JCI - ONUJCI - ONU
JCI - ONU
 
Digital Direct Marketing
Digital Direct MarketingDigital Direct Marketing
Digital Direct Marketing
 
Lenguaje c compu 2
Lenguaje c compu 2Lenguaje c compu 2
Lenguaje c compu 2
 
Descarga de musica
Descarga de musicaDescarga de musica
Descarga de musica
 
Programa Diseñarte Bolivia 2013
Programa Diseñarte Bolivia 2013Programa Diseñarte Bolivia 2013
Programa Diseñarte Bolivia 2013
 
XPRESS HOLDINGS PR
XPRESS HOLDINGS PRXPRESS HOLDINGS PR
XPRESS HOLDINGS PR
 
PSA Watch Brochure
PSA Watch BrochurePSA Watch Brochure
PSA Watch Brochure
 

Similar to ALA Code Privacy Reader Data

Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Dorothea Salo
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
Aggressive Driving Essay Persuasive. Online assignment writing service.
Aggressive Driving Essay Persuasive. Online assignment writing service.Aggressive Driving Essay Persuasive. Online assignment writing service.
Aggressive Driving Essay Persuasive. Online assignment writing service.Beth Garcia
 
Domesticating intelligence @ Interaction17
Domesticating intelligence @ Interaction17Domesticating intelligence @ Interaction17
Domesticating intelligence @ Interaction17Simone Rebaudengo
 
Soylent Semantic Web Is People! (with notes)
Soylent Semantic Web Is People! (with notes)Soylent Semantic Web Is People! (with notes)
Soylent Semantic Web Is People! (with notes)Dorothea Salo
 
Is the net disappointed 9 for print
Is the net disappointed 9 for printIs the net disappointed 9 for print
Is the net disappointed 9 for printdavidjoho
 
The Future of the Social Web and How to Stop It
The Future of the Social Web and How to Stop ItThe Future of the Social Web and How to Stop It
The Future of the Social Web and How to Stop ItChris Messina
 
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...Monica Bulger
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
Hacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hackerHacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hackerBons Ju
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?David Smith
 
What's the Buzz? Keeping Up with Technology for Librarians
What's the Buzz? Keeping Up with Technology for LibrariansWhat's the Buzz? Keeping Up with Technology for Librarians
What's the Buzz? Keeping Up with Technology for LibrariansGuilderland Public Library
 
Foundations reflective journal
Foundations reflective journalFoundations reflective journal
Foundations reflective journalstacimnovak
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's WayDorothea Salo
 
Grab a bucket! It's raining data!
Grab a bucket! It's raining data!Grab a bucket! It's raining data!
Grab a bucket! It's raining data!Dorothea Salo
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?Mike Ellis
 

Similar to ALA Code Privacy Reader Data (17)

Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?Is this BIG DATA which I see before me?
Is this BIG DATA which I see before me?
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Aggressive Driving Essay Persuasive. Online assignment writing service.
Aggressive Driving Essay Persuasive. Online assignment writing service.Aggressive Driving Essay Persuasive. Online assignment writing service.
Aggressive Driving Essay Persuasive. Online assignment writing service.
 
Domesticating intelligence @ Interaction17
Domesticating intelligence @ Interaction17Domesticating intelligence @ Interaction17
Domesticating intelligence @ Interaction17
 
Soylent Semantic Web Is People! (with notes)
Soylent Semantic Web Is People! (with notes)Soylent Semantic Web Is People! (with notes)
Soylent Semantic Web Is People! (with notes)
 
Is the net disappointed 9 for print
Is the net disappointed 9 for printIs the net disappointed 9 for print
Is the net disappointed 9 for print
 
The Future of the Social Web and How to Stop It
The Future of the Social Web and How to Stop ItThe Future of the Social Web and How to Stop It
The Future of the Social Web and How to Stop It
 
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...
Voices from the Field: Practices, Challenges & Directions in Digital Humaniti...
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Hacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hackerHacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hacker
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
 
What's the Buzz? Keeping Up with Technology for Librarians
What's the Buzz? Keeping Up with Technology for LibrariansWhat's the Buzz? Keeping Up with Technology for Librarians
What's the Buzz? Keeping Up with Technology for Librarians
 
Foundations reflective journal
Foundations reflective journalFoundations reflective journal
Foundations reflective journal
 
Future of semantic apps
Future of semantic appsFuture of semantic apps
Future of semantic apps
 
Avoiding the Heron's Way
Avoiding the Heron's WayAvoiding the Heron's Way
Avoiding the Heron's Way
 
Grab a bucket! It's raining data!
Grab a bucket! It's raining data!Grab a bucket! It's raining data!
Grab a bucket! It's raining data!
 
"If you love your content, set it free" ?
"If you love your content, set it free" ?"If you love your content, set it free" ?
"If you love your content, set it free" ?
 

More from NASIG

Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...NASIG
 
The Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersThe Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersNASIG
 
Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...NASIG
 
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...NASIG
 
Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments NASIG
 
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...NASIG
 
Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials NASIG
 
Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...NASIG
 
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...NASIG
 
Bloomsbury digital resources
Bloomsbury digital resourcesBloomsbury digital resources
Bloomsbury digital resourcesNASIG
 
Web accessibility in the institutional repository crafting user centered sub...
Web accessibility in the institutional repository  crafting user centered sub...Web accessibility in the institutional repository  crafting user centered sub...
Web accessibility in the institutional repository crafting user centered sub...NASIG
 
Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries NASIG
 
Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration NASIG
 
Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?NASIG
 
Mapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeMapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeNASIG
 
When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020NASIG
 
Getting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentGetting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentNASIG
 
A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...NASIG
 
Knowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementKnowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementNASIG
 
Practical approaches to linked data
Practical approaches to linked dataPractical approaches to linked data
Practical approaches to linked dataNASIG
 

More from NASIG (20)

Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
Ctrl + Alt + Repeat: Strategies for Regaining Authority Control after a Migra...
 
The Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of CatalogersThe Serial Cohort: A Confederacy of Catalogers
The Serial Cohort: A Confederacy of Catalogers
 
Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...Calculating how much your University spends on Open Access and what to do abo...
Calculating how much your University spends on Open Access and what to do abo...
 
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
Measure Twice and Cut Once: How a Budget Cut Impacted Subscription Renewals f...
 
Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments Analyzing workflows and improving communication across departments
Analyzing workflows and improving communication across departments
 
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
Supporting Students: OER and Textbook Affordability Initiatives at a Mid-Size...
 
Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials Access to Supplemental Journal Article Materials
Access to Supplemental Journal Article Materials
 
Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...Communications and context: strategies for onboarding new e-resources librari...
Communications and context: strategies for onboarding new e-resources librari...
 
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
Full Text Coverage Ratios: A Simple Method of Article-Level Collections Analy...
 
Bloomsbury digital resources
Bloomsbury digital resourcesBloomsbury digital resources
Bloomsbury digital resources
 
Web accessibility in the institutional repository crafting user centered sub...
Web accessibility in the institutional repository  crafting user centered sub...Web accessibility in the institutional repository  crafting user centered sub...
Web accessibility in the institutional repository crafting user centered sub...
 
Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries Linked Data at Smithsonian Libraries
Linked Data at Smithsonian Libraries
 
Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration Walk this way: Online content platform migration experiences and collaboration
Walk this way: Online content platform migration experiences and collaboration
 
Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?Read & Publish – What It Takes to Implement a Seamless Model?
Read & Publish – What It Takes to Implement a Seamless Model?
 
Mapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing ChangeMapping Domain Knowledge for Leading and Managing Change
Mapping Domain Knowledge for Leading and Managing Change
 
When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020When to hold them when to fold them: reassessing big deals in 2020
When to hold them when to fold them: reassessing big deals in 2020
 
Getting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides ContentGetting on the Same Page: Aligning ERM and LIbGuides Content
Getting on the Same Page: Aligning ERM and LIbGuides Content
 
A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...A multi-institutional model for advancing open access journals and reclaiming...
A multi-institutional model for advancing open access journals and reclaiming...
 
Knowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource ManagementKnowledge Bases: The Heart of Resource Management
Knowledge Bases: The Heart of Resource Management
 
Practical approaches to linked data
Practical approaches to linked dataPractical approaches to linked data
Practical approaches to linked data
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

ALA Code Privacy Reader Data

  • 1. Ain’t Nobody’s Business IF I DO Dorothea Salo the iSchool at UW-Madison NASIG 2015 (read serials) Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions changed Good morning, folks, and thanks for being here. My name is Dorothea Salo, and I teach technology as well as scholarly communication at the iSchool at the University of Wisconsin Madison, after spending several years in academic libraries working on open access and research-data stewardship. When I was asked here to NASIG, the organizers told me I was slotted into a “Vision Session,” that I needed to offer a vision relevant to this excellent and distinguished conference, something that’s not happening on the ground right now that I think should be. I pitched the organizers several ideas — which may not surprise you if you know me; I am never short of opinions — and the one that caught fire with them was the question of reader privacy with respect to electronic serials and ebooks, e-resources generally.
  • 2. Lady Day Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection And that immediately brought to mind for me the unforgettable Billie Holiday singing the nineteen-twenties Grainger and Robbins blues classic “Ain’t Nobody’s Business if I Do.” Which, the version of the song that Holiday sings starts out, “There ain’t nothin’ I can do nor nothin’ I can say, that folks don’t criticize me. But I’m gonna do just as I want to anyway, I don’t care if they all despise me.” Love that. LOVE. IT. Because in my head it completely captures what’s going on with collection and exploitation of reader behavioral data. There’s a whole lotta libraries and a whole lotta content providers in the Big Data or even small-data game doing whatever they want no matter what readers think. Might as well, right? Because whether you do or you don’t, somebody’ll hate you. If you DON’T collect and exploit user data, your accountants and Big Data nerds will hate you, because you’re missing revenue opportunities — or so they think; I’m not always convinced the financial upside is what they think it is. Your usability wonks might hate you too, because they can learn useful things from snooping on how readers dink around with e-resources. And, I mean, I’m laying it on the line here: that’s snooping, y’all, I don’t care how holy the reason is. But the uproar if you tell them not to do it, well, I’m seeing some of it, and wow. Some usability wonks HATE privacy wonks like me right now.
  • 3. Image: erokism, “Nope in Manchester,” https://www.flickr.com/photos/10295270@N05/3858329955/ CC-BY, cropped Now, if you DO collect and exploit user data in the way it’s usually done today, I tell you what, I HATE YOU RIGHT BACK. Well, okay, “hate” might be a little strong. But I am definitely NOPEing you, because if I as a reader of serials know you’re doing that, I trust you less, and I trust your systems less. And you know who else trusts you less? The American Library Association.
  • 4. —American Library Association Code of Ethics Article III “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” See, ALA has this Code of Ethics thing that first got written in nineteen-thirty-nine and has been revised a few times since then, and Article Three says that libraries will “protect each library user’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted.”
  • 5. Why? Why does this matter? Well, okay, so what? So ALA thinks reader privacy is important, so what? Hey, Facebook’s Mark Zuckerberg says we should all get over the privacy thing already! So who gives a flying flip about a nearly century-old ethics code from some hysterical century-old librarians? Did she just go there? YES, I WENT THERE, I said the h-word! I did so fully cognizant of the resonance that word has for librarians, as Section 215 of the Patriot Act teeters on the sunset bubble, and I did so because it’s a pretty salient — and recent! — example of librarians taking the high road despite being called every name in the book. Which is not entirely dissimilar to what’s happening to some library privacy advocates now, really! Now, I could pound the podium at this point about abstractions like intellectual freedom, civil society, surveillance society, panopticons, blah blah blah. I could pound the podium, but there are ethicists and philosophers and legal scholars and others who are a lot better at all that abstraction than I am. I’d rather keep it concrete. Plus, the hotel probably doesn’t want me to damage the podium, right?
  • 6. Internet of Things So, concretely, let’s talk for a second about what’s being called the Internet of Things. I mean, things, how much more concrete can you get, right? The basic idea here, for anyone not familiar with it, is that gizmos we own that have ticked right along for ages without Internet connections can now be connected to the Internet. That lets us operate them remotely, like a thermostat in my house that I can set from my office if I happen to be coming home early that day. They can also get information from the internet, like a TV automatically knowing what’s on. Networked gizmos can give us insight into how they work and how to use them more efficiently, again like the thermostat. They can also give us insights into our own behavior, as with all the fitness trackers out there, and make suggestions at least nominally aimed at helping us.
  • 7. And one of the things that’s happening now with the Internet of Things is that the Federal Trade Commission is scrutinizing it pretty closely — this image here is from the opening page of their January report on it, it’s a good report, not too long, and I recommend reading it — because as it turns out, it is SUPER easy to cause people real tangible harm based on data coming from mundane items like a television or a fitness tracker or a thermostat. A thermostat? Really?
  • 8. Image: Ian Burt, “Empty Room—Shining Wallpaper,” https://www.flickr.com/photos/oddsock/2256899211/ CC-BY Kind of the paradigm case here: my spouse is home at the moment, but if that weren’t so, imagine what the thermostat data would be telling a home burglar. Oh, hey, house is empty, come and get it! More subtly, though — and this became a prominent public concern when Google bought Internet of Things thermostat maker Nest — what can this thermostat tell advertisers or even law enforcement about me that actually ain’t nobody’s business? It ain’t nobody’s business when my house has people in it and when it doesn’t. For one thing, that starts to indicate whether there’s a stay-at-home parent, or somebody unemployed, or somebody with a disability, or somebody who works at home. And that ain’t nobody’s business! And it starts to be information that can be used against me, especially when correlated with all the other data coming from every corner of our lives. It could totally be used unfairly in credit and loan deliberations, rental decisions, and so on. And we’re already starting to see horror stories like that, data used for redlining as well as extremely dubiously-ethical marketing.
  • 9. Image:Mike Licht, “Creepy ‘Hello Barbie’ Doll Will Spy On Your Kids,” https://www.flickr.com/photos/notionscapital/16828864532/ CC- BY There have already been some publicized cases of stunning Internet of Things creepery, too, like the Barbie doll that recorded whatever a kid said to it and streamed that to Mattel, where it piles up into a dossier on the kid. Yeah, totally no potential for abuse THERE. But yeah, fine, thermostats and Barbie don’t reflect what anybody’s READING, so it’s NOT an intellectual-freedom issue, so why is Internet of Things-style creepery an issue for NASIG?
  • 10. Well, thanks to our good friends at Adobe, we actually KNOW e-resource use is being snooped on and collected into dossiers, just like what kids say to Barbie. No possibility of doubt. I don’t think anybody here has been living under a rock, so we all know about this, but just a recap: Adobe’s collecting reader-behavior information from Adobe Digital Editions, including when it’s used on library-provided e-resources. Adobe got caught because they were transmitting the information in the clear, and they’ve stopped doing that — but they have NOT stopped collecting the information, as far as anybody knows. So I’m sorry, content providers, I really am, but there’s NO benefit of the doubt possible here. Readers can’t trust you. Librarians can’t trust you. Adobe shoved its foot in it right up to the thigh for all y’all. We have to believe you’re all behaving like Adobe until and unless you state — and ideally prove — otherwise.
  • 11. So what I’m ultimately saying here is, it actually makes a lot of sense to think of electronic resources as part of the Internet of Things. What’s an ebook? What’s an e-journal article? It’s a mundane item you use for your own purposes that back in the day wasn’t even Internet-connected but now is. It communicates with the Internet and leaves data about you and your behavior behind, data that can be used to dish the dirt on you, to cause you real tangible harm, individually or because your behavior happens to cluster with the behavior of others in a way that somebody with power doesn’t approve of. The same privacy issues the F-T-C cares about with Internet of Things gadgetry are entirely salient to electronic resources. *pause* Hey, F-T-C, c’mon over here and let’s talk, okay? I mean, we’re in Washington DC, right? If privacy’s gonna be a thing for dolls and thermostats, I’d love it to be a thing for ebooks and electronic journals too. If that takes F-T-C intervention, I’m cool with that.
  • 12. —American Library Association Code of Ethics Article III “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” Because I could go into the horror scenarios here, the real ones and the what-ifs, but I don’t see a need, they’re not all that different from what libraries have guarded against in the print era, and anyway we’ve seen examples already. Aaron Swartz, Georgia State, e-textbook and e-testing platforms collecting data about minors, you all know the score. It’s because libraries were aware of all these risks — had experience with a lot of them! — all the way back in nineteen thirty-nine that ALA took such a strong stance in favor of privacy and confidentiality. Amazingly prescient stuff. I respect ALA a lot for this.
  • 13. That’s libraries. What about publishers? So that’s libraries’ ethical stance on reader privacy… what about publishers? I mean, since y’all are here and all.
  • 16. That’s libraries. What about content providers? Content providers generally? What’s y’all’s ethical stance on reader privacy?
  • 17. So I went looking… So I went looking for trade-level reader-privacy ethics statements, because hey, I started in publishing, I totally didn’t want to leave out all the people at NASIG who aren’t librarians, and actually I discovered something pretty interesting. For “disturbing” values of “interesting.”
  • 18. Committee on Publication Ethics I started in the obvious place, the Committee on Publication Ethics, because this is an ethical question, right?
  • 19. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA Crickets. COPE says NOTHING about reader privacy. Jack. Diddly. Squat.
  • 20. Society for Scholarly Publishing SSP, the next likely source, plus they’re right here with us — hi y’all! — so I couldn’t possibly ignore them.
  • 21. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
  • 22. STM Association Huh. Okay, how about the STM Association?
  • 23. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
  • 24. Open Access Scholarly Publishers Association And of course the question of reader privacy is just as salient for open-access journals as for anything else, if not more so, so I checked out OASPA too. I actually think it’s pretty cool that to the best of my knowledge and belief, open-access journals don’t seem to have turned to exploiting or selling reader data as a major revenue stream. Maybe that’s because of OASPA, I thought to myself!
  • 25. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA
  • 26. Directory of Open Access Journals Well, so, okay, maybe OASPA left it to D-O-A-J, since they’re coming up with quality criteria for inclusion and certification of open-access journals these days.
  • 27. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA (look uncomfortable, shuffle feet, let the moment go on too long…) Yeah, so, as you know I’m a long-time open-access advocate, and I gotta say to my fellow open-access folks, I’m seriously not cool with this, y’all. Can open access please take the high road here?
  • 28. So, maybe looking at trade associations was the wrong route, I said to myself, maybe the privacy statements are happening at the individual-journal level. Turns out that’s been looked at, in a twenty-twelve study published in College and Research Libraries.
  • 29. *crickets* Sound: jnthnjng, “Backyard Cricket After Nightfall,” https://soundcloud.com/jnthnjng/backyard-cricket-after CC-BY-SA Pretty much crickets, folks. Pret-ty much crickets. Yeah, there were privacy policies, but they were basically terrible.
  • 30. And unfortunately, we know there are ugly issues here on both sides of the business-model fence. Eric Hellman checked twenty major research journal websites for evidence of ad-network trackers, who in case you haven’t checked lately have been spreading malware as well as being generally creepy. He found trackers. Lots of trackers. In both toll-access and open-access journal websites. And yeah, this was a really tiny sample, but be my guest, expand it, do you really think the results will be MORE in favor of reader privacy? Because I don’t. This is a technology-infrastructure point, and tech infrastructure isn’t really what I want to talk about today, but just this one thing, librarians: the instant we put some third-party resource on our website or in our LibGuides or in our catalog or refer patrons to it some other way, WE BECOME RESPONSIBLE for its privacy implications. If it takes some kind of systematic ethics review of content-provider websites to call out this kind of thing, hopefully make some noise toward stopping it, well, I’m in favor.
  • 31. Image: Will, “Conspiracy Nut” https://www.flickr.com/photos/emigh/57420134/ CC-BY, cropped And to be fair, I’m not saying there’s a conspiracy theory here, okay? No tinfoil hats, I totally don’t believe that. It’s historical accident, this absence of ethical-responsibility statements from content providers. It happened because in the days of print, reader privacy wasn’t the content-provider’s problem; aside from the venial sin of selling subscriber lists, content providers pretty much couldn’t compromise reader privacy even if they wanted to! There was basically no way to monitor the use of a print journal or a print index or a print anything. Either it got mailed to an individual subscriber and the subscriber did whatever they wanted with it —
  • 32. Image: kait jarbeau, “oh, boy, let’s not do that again,” https://www.flickr.com/photos/esquire/52176612/ CC-BY doodle wildly all over the pages
  • 33. Image: Bibliotheek Kortrijk, “Boekenkerstboom,” https://www.flickr.com/photos/bibliotheekkortrijk/6553190505/ CC-BY make an art installation for their favorite holiday
  • 34. Image: LearningLark, “The House of Leaves-Burning 8,” https://www.flickr.com/photos/44282411@N04/4140306649/ CC-BY light it on fire, whatever —
  • 35. Image: Shannon Hauser, “Shelves and Book Cart” https://www.flickr.com/photos/shauser/9556678137/ CC-BY — or the publication got mailed to a library, and maybe the library keeps track of how often that chunk of print leaves the shelf, but the library CERTAINLY doesn’t know who picked it up, much less in what context, so it can’t tell the content provider anything about that. Not that it would anyway. So content providers didn’t have to think about reader privacy. But times have changed, folks. Times. Have. Changed. The library isn’t always in the middle of the publisher-reader transaction any more, and even when we ARE, today’s content provider has a lot more ways to compromise reader privacy available, so yes, content providers NEED to come up with an ethical position on reader privacy, okay?
  • 36. And there’s an effort underway to maybe get a handle on this, NISO is working on this thing they call a Consensus Framework to Support Patron Privacy in Digital Library and Information Systems. And I am BEGGING the NASIG community — I am begging each and every one of you here — to watch this, and to comment on it, and to make all participants in it VERY VERY CLEAR that you’re watching. You are the right people, the people NISO needs to hear from! Because I generally dig the word “consensus,” but I confess I’m a little worried that in the NISO context it’ll mean what it seems to mean in Trade Pacific Partnership negotiations, which is something like “the rich content owners are gonna set the rules in a secret smoke-filled room and the rest of the world can just lump it.” That’s not consensus, that’s railroading, and it NEEDS not to happen. So let’s not let it, okay?
  • 37. —American Library Association Code of Ethics Article III “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” Until that or something like it happens, though, I’ll have to rely on the ALA Code of Ethics here, which actually doesn’t bother me a bit. One thing I want you to notice about this statement is that it has ZERO qualifiers. None. Do you see an asterisk or a dagger or a footnote here? I do not.
  • 38. * * except when that’s inconvenient “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” It doesn’t say “libraries protect privacy — except when that’s inconvenient.”
  • 39. Image: Gaby Av, “Indeed.” https://www.flickr.com/photos/photogaby/5090553158/ CC-BY, cropped/enlarged Because sure, it’s super-convenient to do usability testing or market research silently, it’s super-convenient for librarians who need tenure to trawl those data, I get it, I do! And I’m not unilaterally against those things, I’m just unilaterally against doing them in the thoughtless, careless way they’re often being done now. And, librarians, you get NO SMUG POINTS here, okay? I am seeing articles in the library literature right now, today, that HORRIFY me, they’re so careless about reader data.
  • 40. * except when we’re improving our services * “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” Another non-footnote goes “libraries protect reader privacy except when we’re improving our services,” which, what even IS that, that is one of the most amazing weasel phrases I have ever heard. You can hide ANYTHING behind that, no matter how creepy.
  • 41. Image: Mike Fernwood, “Jessy makes a movie” https://www.flickr.com/photos/ultimateslug/67568147/ CC-BY I mean, imagine that in the physical library. “We’re going to follow you around the library and record what you’re reading with cameras and video, and we’ll keep that data indefinitely, but don’t worry, we totally won’t ask you your name, and we’re only following you around in order to Improve Our Services!” In what world would that not be creepy? How is it any LESS creepy watching my e-resource reading trail? Just because it’s immensely harder for me to figure out you’re doing it, much less stop you? That’s not less creepy, it’s MORE creepy! We are talking sparkly vampire zombie werewolf Evil Overlord’s One Ring levels of creepy here, people! I actually think “would we do this in the physical library, the physical bookstore, the NASIG exhibit floor?” is a fairly decent heuristic for assessing something’s creep factor. It’s not perfect, absolutely not, but it’s useful, because our sense of what we will and won’t do in physical spaces is pretty strong, pretty sophisticated, pretty well thought through. It also keeps our patron base from being divided into physical-library users and digital-library users, and one group having better privacy protections than the other, which, that just ain’t right. Throwing that out there for people to take home.
  • 42. * except when we’re sharing data with our partners * “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” Here’s another one, there’s no asterisk in Article Three saying that libraries protect privacy except when sharing data with partners — whoever THEY are. And librarians, “partners” doesn’t just mean “content providers,” so some of us need to be way more nervous about what we’ve got on our websites than we are. We saw that with Hellman’s quick look at research journals. Google Analytics, anybody? Facebook Like button? Yeah. Yeah. We need to be nervous about that.
  • 43. —Ars Technica http://arstechnica.com/tech-policy/2014/04/google-ends- creepy-practice-of-scanning-gmail-education-apps/ Our good buddy Google? Totally shoved its foot in it up to the thigh on privacy. If you’re not in K-twelve circles you might have missed this, so the story is that schools using Google Apps for Education suddenly found out that Google was assembling data and profiling students based on their email to use for advertising, despite many public protestations that Apps for Education respected privacy! What can I even say about that? Except that I don’t trust Google with behavior data as far as I could THROW Google. I don’t think any of us should. Yeah, I know Google Analytics’ terms of service says it respects privacy. I just don’t believe what Google says about that. Why should I? Why should you? Why should anybody?
  • 44. * except learning analytics * “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” Speaking of education, Article Three has no exception for learning analytics either, whatever THOSE even are. Librarians generally don’t rat out our students to their professors, even when students are being stunningly unwise. They’re learning, right? We know we have to leave them a private space for the various kinds of unwisdom that happen during the learning process. Digital doesn’t change that! It’s not any more okay to rat students out now just because we have lots more detailed ways to do it.
  • 45. Image: istolethetv, “oops, a memory” https://www.flickr.com/photos/istolethetv/2436193339/i CC-BY, cropped And I’ll tell a story on myself for this one. Our course-management system at U-W Madison, like many, tracks what students do on their course websites and how long they spend doing it. So for one online course I taught, I noticed that students weren’t spending hardly any time on the main lesson pages where the video content was, and they weren’t clicking on links to readings. And I got pretty upset about that, and I made a huge angry fuss — only to find out that students were downloading video rather than streaming it because the streaming didn’t work real great, and they were clicking on links from the PDF syllabus instead of the course pages. They were doing the work. They were! They just weren’t doing the work in the way that the course-management system was able to capture. And my poor students were sincerely hurt and scared, and they had every right to be, and I’m sorry about it to this day. And since then, I’ve been super-skeptical of whether learning analytics tell us much that’s useful, and super-aware that they break trust bonds between student and instructor that I for one absolutely need to do effective work in the classroom. So I’ve learned my lesson — I don’t want to surveil my students. I don’t want anybody ELSE surveilling them either — and that absolutely includes the library and e-resource content providers. But at this point it doesn’t even look like I can say no! How do I say no, people? How? How do I tell all y’all to leave my students alone? Speaking of Georgia State, I want publishers OUT OUT OUT of course-management systems, ‘cos y’all creepy.
  • 46. * except when the patron doesn’t care * “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” And finally, there isn’t an exception to library protection of privacy based on whether the patron knows or cares about what’s going on. Libraries pretty much assume that patrons usually don’t know or care. Safe assumption, right? But not enough to let us do whatever we want, not ever. We also know, for example, that some privacy violators go to great lengths to KEEP people from knowing their privacy is being systematically trashed, cough-cough-Patriot-Act, cough-cough-Snowden. We also know that some of our patrons absolutely vitally need their privacy respected to be safe and to feel safe. Even if some of our patrons don’t particularly have to care about privacy, others absolutely DO based on their research interests, their life circumstances, whatever — and y’all, I gotta say here, I do NOT think it coincidence that practically all the librarians and other pundits I’ve seen saying libraries go too far in protecting privacy have been white men. Check yourself before you wreck yourself like Google Buzz and Google Plus, folks. Look. if libraries don’t respect privacy, patrons who desperately need privacy won’t trust libraries, and sometimes these are the very patrons who need libraries the most. So libraries default to privacy, and I believe with all my heart and soul that’s the correct default. Notice that Article Three doesn’t say “when the patron KNOWINGLY CONSENTED,” which, yes, I agree that’s a whole different ball game. What I’m seeing — again, pretty much from white men — is some kind of sense that the library can do whatever it wants with patron web-behavior and reading-behavior data because supposedly patrons don’t care. And I don’t know where that sense comes from, but it sure ain’t the ALA Code of Ethics.
  • 47. Well, I CARE. And I do not consent to this. Oh, and nobody cares, you say? WELL, I CARE. Y’all don’t get to just say “patrons don’t care, readers don’t care.” I AM a library patron, as well as a reader of e-journals and other electronic resources, and I care a WHOLE LOT about my personal privacy. If your whiz-bang technology rig, whatever it is, doesn’t account for me, and for other people with the smarts and the grit to believe in privacy and to WANT privacy, there is something pretty seriously wrong with your technology rig, and you might want to check your ethics too.
  • 48. Lady Day Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection And this is where I get back to the song made famous by Bessie Smith and Lady Day, because if you listen to it — and I honestly didn’t remember this until I’d already chosen my talk title — if you listen to the song Ain’t Nobody’s Business If I Do, you find out that it’s about the singer allowing other people to walk all over her, to hurt her and exploit her — and I’m being a little vague here, because the song is really painful and hard-hitting, so I’m warning people, only look at the lyrics if you’re okay with that. And the song insists that it’s her right to let those awful things happen and nobody should interfere with that. And the way Lady Day sings it, it’s really clear to me that for her the song comes from a place of deep despair and helplessness. Don’t interfere with my self-destruction, she sings, because if I can’t even do myself any good here, what good do you think you can do me?
  • 49. Lady Day Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection And I’m guessing that sounds familiar to some folks here, who feel helpless faced with ubiquitous incessant onslaughts on reader privacy. It’s super-easy for any information seeker to throw their privacy down the drain, it’s super-easy for any library to enable that, it’s super-easy for any web service that libraries use or that uses library interfaces to enable that, it’s super-easy for any content provider to enable that, and yes, patrons do sometimes tell us “screw privacy, I want what I want!” And what I’m saying here is, just because it’s easy and convenient to screw privacy doesn’t make it right, and it doesn’t mean we have to lie down and take it. Especially at Internet of Things, Big Data scale.
  • 50. “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” NO EXCEPTIONS. library user reader I’m supposed to give you a vision in this talk, and I haven’t done that yet, so here it is, here’s my vision. It’s super-simple really. I want libraries AND content providers to live up to Article III of the ALA Code of Ethics, to protect each library user’s right *CLICK* — really each READER’s right, to include those of us in the room who are content providers rather than librarians — each reader’s right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired, or transmitted. *CLICK* No exceptions. And yes, I know that’s a radical position, but it ain’t the first radical position I’ve espoused in my career, and I sure hope it won’t be the last. This is my vision and I’m sticking to it: NO EXCEPTIONS.
  • 51. Ain’t Nobody’s Business IF I DO (read serials) Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions changed Because seriously, it ain’t nobody’s business — it ain’t the webmistress’s business, it ain’t my wonderful departmental librarians’ business, it ain’t no publisher’s or aggregator’s or A-and-I provider’s business, it ain’t the NSA’s business, it ain’t YOUR business — it ain’t NOBODY’S business if I do read serials!
  • 52. “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” NO EXCEPTIONS. library user reader So what can we do, besides providing input to the NISO process I mentioned earlier, which I totally hope y’all will all do, to bring this vision closer to reality?
  • 53. Wow. I wish I knew. I wish to the bottom of my heart I had a pat answer for you today. All this is enormously complicated, right? I’ve just scratched the surface here today. But I think I know where to start. I do. It’s practically my classroom go-to for all kinds of situations, from privacy considerations in donor agreements to copyright and digitization to digital preservation planning.
  • 54. the risks.Understand First we understand the risks, as best we can.
  • 55. the risks.Mitigate Then we mitigate the risks, again as best we can, certainly acknowledging that there are some things, like organizations obsessed enough to dive to the bottom of the ocean in order to copy traffic off fiber optic cable, that we just don’t control. I mean, how is this the world I live in, I don’t even know.
  • 56. Which info is risky? The first question I think we need to get a handle on is exactly what kind of information about our patrons causes risks to them.
  • 57. Personally Identifiable Information Behavior Trails Long Tail Information And for convenience, I’m dividing that into three buckets of information: P-I-I, what I call “long-tail information,” and behavior-trail information.
  • 58. Personally Identifiable Information Behavior Trails Long Tail Information ☞ And, I mean, I think we’re all clear on personally-identifying information being really scary, so I don’t need to elaborate much on that. All I want to say is that it is NOT the only category of data we need to be concerned about, and that sometimes privacy policies use P-I-I as a smokescreen for abuse of other classes of data — they proclaim very loudly that P-I-I is either not collected at all or very carefully protected, and don’t say ANYTHING about anything else. Not okay, people. Any ethical framework we build around data needs to consider more than just P-I-I.
  • 59. Personally Identifiable Information Behavior Trails Long Tail Information ☞ The next class of information I want us to be concerned about is what I’m calling “long tail information,” by which I mean data collected about patrons that’s a serious outlier in privacy- problematic ways. There’s data about people, for example, that isn’t strictly speaking P-I-I but is still uncommon enough to identify specific individuals — this happened in the A-O-L search- log release fiasco, it happened with the Netflix prize fiasco, it happened with the Hauser Facebook case, it’s how browser fingerprinting works, it’s really pretty common! What’s more, classic anonymization techniques don’t fix this. And the thing is, we’re all outliers in some way or other. So even if somebody doesn’t stick out in one dataset, combine a bunch of datasets that contain information about them — and this is exactly what data brokers and web trackers and ad networks DO — and more and more people become individually identifiable, P-I-I or no P-I-I. What people read? Totally long-tail information that can be tracked back to us. For some of us even more than others. I mean, if y’all could get your hands on journal-reading data from U-W Madison, you could correlate my reading with my public Pinboard bookmarks in like two point five SECONDS and know it was me, because believe you me, I regularly read stuff nobody else on my campus does. And anything in my journal reading that’s unexpected, an outlier? You’d know I read it and you’d be able to start guessing why. And just as another paradigm example, four years ago? When my mother was dying of cancer of unknown origin? My outlier journal reading would have been EXTREMELY sensitive information, you get me?
  • 60. Personally Identifiable Information Behavior Trails Long Tail Information ☞ That leads me to behavior trails. Just one reading transaction probably isn’t super-re-identifiable, unless what’s being read is a serious, serious outlier. An individual visit to an individual web page, likewise. Where it starts being problematic is where you track a whole bunch of reads and a whole bunch of visits from the same person, even when you supposedly de-identify them. Or even just when you keep highly specific timestamps along with the interactions; that’s sometimes enough to let somebody reconstruct a behavior trail. And the more behavior trail data you have and the longer you keep it, the worse the privacy problem gets, because the easier it is to correlate interactions, and the more likely it is that you capture outlier reads that patrons would rather you didn’t associate with them.
  • 61. Image: Shannon Hauser, “Shelves and Book Cart” https://www.flickr.com/photos/shauser/9556678137/ CC-BY And one great way libraries totally bypass this problem is by tracking uses of stuff without tracking people, and without trying to chain together or even correlate uses. Going back to the physical library, again, you see a bunch of stuff on the cart, you scan the barcodes and it goes into a database, and who the heck knows who used it? And correlating use is dubious at best because you don’t have any idea how many people put stuff on that cart, so nobody tries it. As data-collection practices go, this is pretty respectful of reader privacy. Libraries also watch out for proxy server logs, because those are FULL of behavior-trail information. We do have to collect them, unfortunately, to deal with the would-be data miners appropriately, but we don’t usually keep them very long because we understand there’s a privacy issue there. More of that, please, more intentional discarding of data. Data is a hot potato! Drop it whenever you can! This is records-manager wisdom, y’all, LISTEN to your records managers, okay?
  • 62. Who wants to know? The next question we need to get a grip on is “who wants to know?” And a lot of times people answer this question by occupation, you know? You got your spooks, your marketers, your academic researchers, your usability wonks, your black-hat hackers, and so on.
  • 63. Omnivores Paparazzi Opportunists I’m actually going to divvy it up a different way, by how and why people approach data about other people, and the techniques they’re likely to use to get hold of it and analyze it. Because I think that gets at the risks better, and is more helpful at suggesting ways to mitigate those risks. So this is only a first approximation, don’t hold me to it, but I think there are data omnivores, data opportunists, and data paparazzi.
  • 64. Omnivores Paparazzi Opportunists ☞ The N-S-A is an omnivore. Google, Facebook, Amazon, commercial data brokers, they’re omnivores. Black-hat hackers are omnivores, typically. If there’s data, they want it, and they want to match your data TO you. The only way to prevent that is to keep data out of their greedy paws, even when they’re actively lying to you and trying to subvert any effort you make to kick them out of your systems. How to do that is a bit beyond the scope of this talk, but for what it’s worth most of the fixes I know of are partial at best, and they’re technical in nature.
  • 65. Omnivores Paparazzi Opportunists ☞ Opportunists are trying to do cool and useful things with data. They’re academic researchers, and data collectors trying to be nice to academic researchers. They’re web and social-media developers, usability wonks. They’re hackathonners. They’re open-data advocates and assessment experts. They’re what Ann Arbor District Library used to call “superpatrons.” They’re people with their hearts in the right place — but that doesn’t mean they’ve thought things through. Data opportunists have made some pretty big privacy messes! This is actually also where I’d place patrons who want to reuse their own data, or who want access to a family member’s data for reasonable reasons, things like that. There’s nothing wrong with what they want to do necessarily, they just don’t understand the broader implications or are lucky enough not to have to care. The thing about data opportunists is, they generally don’t want to hurt anybody, and they absolutely don’t want the backlash that happens if they mess up on privacy. We can, I believe, help teach them how not to, not to mention WHY not to, and we should — they’re often good privacy allies once they understand the issues.
  • 66. Omnivores Paparazzi Opportunists ☞ So, data paparazzi. Data paparazzi have a TARGET, a specific person they want to track, and they are gonna pursue that specific target through whatever data they can find. They are people on political crusades, speaking of Washington DC. They are doxxers. They are kidnappers, perpetrators of violence, other people who hate and who harm. And paparazzi are terrifying, because they are obsessed, they are amoral, and they stop at NOTHING — they will social-engineer you, they will hack your systems and try to use them against their target, they will take over a target’s account to impersonate them or ruin them, they will correlate whatever they find out from you about their target with anything else they can find anywhere. Don’t be thinking “well, they don’t want the data WE have” — yes, yes they do! Some people, even some security researchers, will tell you “don’t worry, be happy” about behavior trails and other non-P-I-I data, because reidentification attacks don’t have a real high success probability. Ed Felten and his research crew argue — and I agree with them — that this notion is based on the assumption that the attackers are data omnivores or opportunists, not data paparazzi. Attacks carried out by paparazzi, because they’re so tightly targeted and so relentless, have a much higher chance of being successful and of causing somebody harm. So I’m telling you, yes, worry about privacy. Worry about the patrons you have, the readers you have, who have paparazzi on their trail. I am absolutely sure you have at least one such patron or reader, and probably you have lots more.
  • 67. What ought we (not) do? The last question is the big one, right? What should we do? What should we not do?
  • 68. Image: Brad.K, “Ostrich Butt And American Flag” https://www.flickr.com/photos/stopbits/3584145338/ CC-BY First thing is, NO OSTRICHING, okay? Heads OUT of the sand.
  • 69. And to that end, I want you to know about the Library Freedom Project if you don’t already. This is Knight Foundation funded, it’s run by the amazingly badass Alison Macrina (ma-KREE-na), and it is all about libraries protecting reader privacy in all the ways we can find to do that. It’s at libraryfreedomproject dot org.
  • 70. Image: Ray Dumas, “Cat Fight” https://www.flickr.com/photos/rtdphotography/2822978477/ CC-BY, brightened/sharpened And on that same theme, profession-level and industry-level advocacy and policy work are super-important here. Without them, librarians don’t know what to do, what to negotiate for, or even what to hope for, and content providers get stuck in a nasty prisoner’s-dilemma cat fight because anybody who takes the high road on privacy has to be afraid they’ll be outcompeted by somebody else taking the road to hell. Trade associations, this is your job; please do it. No more crickets, okay?
  • 71. Lady Day Photo: Carl Van Vechten, “Billie Holiday” Library of Congress, Prints & Photographs Division, Carl Van Vechten Collection Next thing is, DON’T GIVE UP. Forget the song. We are NOT helpless, we CAN take concrete action to protect reader privacy, and it’s ABSOLUTELY worth doing.
  • 72. Photo: Andrew Magill, “$5700” https://www.flickr.com/photos/amagill/362201147/ CC-BY Next, librarians, let us use our benjamins wisely. License-negotiation time is the time we can ask the hard questions about privacy, and nail content providers down to real concrete answers. I know, I know, world plus dog is trying to use e-resource licensing as a policy tool, but I’m asking you to consider doing it one more time, okay? Because as I said earlier, once we add something to our website or our catalog, once we’re pointing patrons at it, WE ARE RESPONSIBLE if it compromises their privacy. Content providers, give us privacy policies we can feel good about, please. I can’t put it any more simply than that.
  • 73. Photo: Shannan Muskopf, “Standardized Test” https://www.flickr.com/photos/40964293@N07/4728093020/ CC-BY, cropped And I know assessment is a thing and it’s not going away, but can we please, please assess mindfully, conscious of potential data leakage and data abuse scenarios? Right now in too many libraries and at too many content providers, assessment is so compelling that it’s utterly obliterating privacy considerations. That’s NOT OKAY. It’s actually really scary, I mean, I-R-Bs exist because scientists decided their work was too important to bother about whether they were harming people or lying to them about what was happening to them. Are we gonna revisit those days now? Please let’s not. When we see this, we need to call it out, refuse to participate, refuse to publish or otherwise countenance this kind of work, insist on confronting the privacy issues openly and conscientiously.
  • 74. Image: Everett, “404” https://www.flickr.com/photos/everdred/58794161/ CC-BY, cropped/enlarged One final thought to take home with you: not even the greediest data omnivore, the most clueless data opportunist, or the most evil of data paparazzi can misuse data that isn’t there. Right now, collectively, our reader-data default is “collect it! unless there’s a reason not to!” That’s backwards. The correct default is “don’t collect reader data unless there’s a CLEAR reason we should. Just don’t.” The shoe needs to be on the foot of reasonable and transparent — not just transparent to us, but transparent to our readers — justification for any data we collect and use. Because that’s another useful decision heuristic, right? If you dread explaining your data collection and use to your readers, if you start weasel-wording all over it because you fear backlash, maybe-just-maybe whatever you’re doing doesn’t pass the sniff test.
  • 75. “protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted” NO EXCEPTIONS. library user reader Article III. ALA Code of Ethics. That’s my vision of where we need to be. Please help me make this vision real.
  • 76. Ain’t Nobody’s Business IF I DO (read serials) Background: Evelyn Flint, “Vintage Film 2” https://www.flickr.com/photos/evelynflint/16887278850/ CC-BY, proportions changed Because one more time, say it with me — it ain’t NOBODY’S business if I do read serials!
  • 77. Thank you! This presentation is available under a Creative Commons Attribution 4.0 International license. Please respect licenses on included images. Dorothea Salo the iSchool at UW-Madison salo@wisc.edu http://dsalo.info/