Muutke küpsiste eelistusi

Library Privacy Policies SEW

  • Formaat: kõrgus x laius x paksus: 2687x2125x0.50 mm, kaal: 340 g
  • Sari: Library Technology Reports
  • Ilmumisaeg: 04-Sep-2020
  • Kirjastus: Ala Tech Source
  • ISBN-10: 0838946771
  • ISBN-13: 9780838946770
Teised raamatud teemal:
  • Formaat: kõrgus x laius x paksus: 2687x2125x0.50 mm, kaal: 340 g
  • Sari: Library Technology Reports
  • Ilmumisaeg: 04-Sep-2020
  • Kirjastus: Ala Tech Source
  • ISBN-10: 0838946771
  • ISBN-13: 9780838946770
Teised raamatud teemal:
Protecting patron privacy in an increasingly distributed online environment is a complex challenge facing libraries. Still, publicly posted patron privacy policies can empower patrons, allow librarians to share their professional values, and help support sound library operations in the event of information disclosure requests.

Protecting patron privacy in an increasingly distributed online environment is a complex challenge facing libraries. Still, publicly posted patron privacy policies can empower patrons, allow librarians to share their professional values, and help support sound library operations in the event of information disclosure requests. This issue of Library Technology Reports (vol. 56, no. 6), "Library Privacy Policies," shares results from an analysis of publicly posted privacy policies from one hundred academic and public libraries across the United States. Details on data types, why data is collected, how data is used and protected, and how data may be released are shared. Just as importantly, nuances in how policy text is phrased reveals a richness and emphasizes the adage that “It's not always what you say, but how you say it.”

Chapter 1 Introduction and Demographics
5(5)
Purpose of This Report
7(1)
Research Sample and Demographics
7(1)
Notes
8(2)
Chapter 2 Systems and Data Referenced
10(7)
Systems and Technologies Referenced
12(1)
References to Particular Data Fields
13(1)
Links to Third-Party Native Privacy Policies
14(1)
Notes
15(2)
Chapter 3 Why Data Is Collected and How It Is Used
17(12)
Web Server Logs and Analytics
19(2)
Cookies
21(1)
Other References Related to Electronic Resource Usage and Logs
21(1)
E-mail and Web Forms
22(1)
Virtual Reference Transactions
22(1)
Surveys
23(1)
Patron Records and Circulation Services
24(1)
Interlibrary Loan and Document Delivery Services
24(1)
Authentication Services and Computer Use
24(1)
Social Media
25(1)
Donors
25(1)
Video Camera Surveillance Data
25(1)
Photos and Videos for Promotional Purposes
26(1)
Miscellaneous
26(1)
Notes
26(3)
Chapter 4 Third-Party Platforms
29(7)
Sharing of Private Information
30(1)
Working with Vendors to Respect Library Privacy Policies and Values
31(1)
Encouraging Patrons to Review the Policies of Third-Party Vendors
32(1)
Google Analytics
33(1)
Notes
34(2)
Chapter 5 Data Security, Integrity, and Retention
36(10)
Retention of Data
37(2)
Circulation Data
39(1)
Interlibrary Loan and Document Delivery Data
40(1)
End User Computer and Resource Use Data
40(2)
Reference Transaction Data
42(1)
Video Surveillance Data
42(1)
Patron Record Data
42(1)
Social Media and Shared Content Data
43(1)
Parent Institution or System-wide Retention Schedules
43(1)
Notes
44(2)
Chapter 6 Higher Authorities and the Potential Release of Information
46
Professional Organization Guidance, Recommendations, and Advocacy
46(1)
Parent Organization Policy
47(1)
State and Federal Law
48(3)
Release of Information
51(1)
Notes
52