What to do
Hirose offered several suggestions for attendees interested in strengthening privacy protections for library patrons, and outlined best practices for handling various scenarios when a police officer or other official requests or demands patron records. First, she suggested that libraries should not collect or retain data for longer than necessary. The best policy is not to retain patron data if there’s no reason for it. If a library does have the data that an official is requesting, explain that the library does not make patron records available without a subpoena, court order, or warrant. If police or other officials engage in a search without a subpoena, court order, or warrant, have a library official make it clear that the library is not consenting to the search. This will help ensure that police or other officials will need to prove probable cause for the search if any information gathered is later used in court. If a library receives a subpoena for records, examine whether the subpoena has been signed by a judge, and contact the library's legal counsel regarding the possibility of a challenge. Unsigned subpoenas, or administrative subpoenas, may be too broad, and there may be grounds to challenge or quash the subpoena under rules such as New York's Civil Practice Law and Rules (CPLR) section 2307, which specifically deals with subpoenas served to libraries and some municipal offices. Notably, this rule requires that libraries must be given at least 24 hours to comply with a subpoena. Subpoenas signed by a judge are less likely to be overturned, but libraries should still contact their legal counsel to determine whether a challenge may be posed. And, in all cases, unless there is a valid gag order in place, a library can inform a patron that their records are being searched. Warrants are signed by a judge and can be executed immediately by designated officers. A librarian can ask to review the warrant, and request the opportunity for library counsel to review, but officers are not required to provide the library with additional time. National security letters are a different order of magnitude. Issued by federal agencies, these are comparable to subpoenas but are certified relevant to an authorized investigation to protect against international terrorism or clandestine intelligence agencies. There is a gag order in place, and the recipient of the letter should not discuss it with anyone except library counsel.Proactive protection
The second portion of the event began with Macrina discussing digital security and threat modeling. As explained by the Electronic Frontier Foundation, "Digital security isn’t about which tools you use; rather, it’s about understanding the threats you face and how you can counter those threats. To become more secure, you must determine what you need to protect, and whom you need to protect it from. Threats can change depending on where you’re located, what you’re doing, and whom you’re working with." Libraries offer services to patrons with a wide range of "threat models" who may want to keep Internet searches and other library activity private, including domestic violence survivors, political activists, whistleblowers, journalists, or LGBT teens or adults in many communities, for example. Macrina suggested that libraries use the Tor Browser, which ensures privacy by routing an individual's Internet usage through a distributed, global network of relays to prevent websites from ascertaining a visitor's physical location, and preventing anyone monitoring the user's Internet connection from learning what sites he or she has visited. The Library Freedom Project has advocated for the installation of Tor exit relays in libraries. Libraries do not need to set up an exit relay in order to use the Tor browser, but, exit relays do help fortify the Tor network. Another major effort of the project is advocating for libraries and library vendors to implement HTTPS encryption for their websites, catalogs, and all online resources to prevent online eavesdropping or data tampering. The Library Freedom Project will help libraries with both, she said. In addition, Macrina discussed best practices for password creation and password managers, malware protection, ad blocking apps, and mobile device security, along with security essentials that libraries should practice and preach to patrons. "The most important thing that you can do for your computer privacy and security is to keep your software up to date," she said. "We have no public education around using our computers.... People don't know these things. Software updates contain patches for critical security vulnerabilities," and hackers can easily figure out which computers on a network are using unpatched software or operating systems.We are currently offering this content for free. Sign up now to activate your personal profile, where you can save articles for future viewing
Add Comment :-
Comment Policy:
Comment should not be empty !!!
Kenneth Freeman
I have cited this on the Wikipedia article on the Library Freedom Project. Thanks!Posted : May 04, 2016 09:39