library privacy and the privacy audit

36
WHAT YOU DON’T KNOW CAN HURT YOU: PRIVACY AUDITS Rachel Gordon Mercer University School of Law

Upload: rachel-gordon

Post on 22-Apr-2015

116 views

Category:

Technology


2 download

DESCRIPTION

Presentation from the 2014 Southeastern Chapter of the American Association of Law Libraries conference in Knoxville, TN on privacy audits in law libraries.

TRANSCRIPT

Page 1: Library privacy and the privacy audit

WHAT YOU DON’T KNOW CAN HURT YOU: PRIVACY AUDITS

Rachel Gordon

Mercer University School of Law

Page 2: Library privacy and the privacy audit

What is Privacy? In a library (physical or virtual), the right to

privacy is the right to open inquiry without having the subject of one’s interest examined or scrutinized by others.

– ALA, An Interpretation of the Library Bill of Rights

Page 3: Library privacy and the privacy audit

Privacy and Confidentiality Confidentiality exists when a library is in

possession of personally identifiable information about users and keeps that information private on their behalf.

– ALA, An Interpretation of the Library Bill of Rights

Page 4: Library privacy and the privacy audit

Personally Identifiable Information

Generally includes any information that can identify a specific individual

Name Address Phone/Fax number

Social security number

Driver’s license number

Bar or Student ID Number

Email addressMother’s maiden

nameSpouse information

Financial information Medical information Education information

Birth date IP address Signature

Page 5: Library privacy and the privacy audit

What Laws Govern Library Privacy? Federal

1st AmendmentVideo Privacy Protection ActFreedom of Information Act (FOIA)Family Educational Rights and Privacy Act

(FERPA) State

Library privacy statutesRecords retention/destruction statutes

Page 6: Library privacy and the privacy audit

Georgia Library Privacy Statute

Page 7: Library privacy and the privacy audit

Georgia Business Records Statutes

O.C.G.A. § 10-11-2. Time period for retention of business records

O.C.G.A. § 10-15-2. Disposal of business records containing personal information

Page 8: Library privacy and the privacy audit

Privacy Audit

What is it? Whose responsibility is it? What is the end product?

Page 9: Library privacy and the privacy audit

What is a Privacy Audit?

Ensure goals supported by practices Protect from liability Process, not a one-time event

Page 10: Library privacy and the privacy audit

Whose Responsibility?

Page 11: Library privacy and the privacy audit

End Products

Privacy policy Document retention policy Staff training

Page 12: Library privacy and the privacy audit

Preliminary Steps1. Evaluate existing policies and procedures

2. Compile definitions, including what is considered PII

3. Identify a process/department to audit

Page 13: Library privacy and the privacy audit

Data Collected

Protected?

Secure?Test

Destroy

Privacy Audit Cycle

Page 14: Library privacy and the privacy audit

Concluding Steps

Establish ownership Address issues

○ Process Improvement ○ Training

Repeat periodically

Page 15: Library privacy and the privacy audit

Auditing for PII

Patron records Transaction logs Notices for overdue items and fines ILL and document delivery records Visitor registers Reference logs Public terminals

Page 16: Library privacy and the privacy audit

Data Collection Considerations

Why is data being collected? Who is collecting? Who else has access? How stored? For how long? How will data be destroyed?

Page 17: Library privacy and the privacy audit

Developing a Privacy Policy State that privacy and 1st Amendment rights

are protected Specifically discuss patron use info related to

books, multimedia resources, and the internet State that general statistical data may be

compiled, but that PII is not included Offer an opt-in for contact unrelated to library

activities Mention vendors Have it reviewed by legal counsel

Page 18: Library privacy and the privacy audit

Record Retention Policies

Is there a state statute? Minimum time to retain

Page 19: Library privacy and the privacy audit

Audit Results

Existing privacy policy Electronic security Issues in practice

Instances of borrowing history revealedPapers not secured/shreddedProcesses needed updating

Page 20: Library privacy and the privacy audit

Audit Results – Electronic Info Patron circulation data well protected

ILS set to only keep current check outs and unpaid fine information

Staff not clearing patron data from circulation computer monitor

Scanned files need to be manually deleted

Page 21: Library privacy and the privacy audit

Official Requests

Law Enforcement FOIA Open Records Act

Page 22: Library privacy and the privacy audit

Social Security Numbers

Do not use! Check old records Redact or destroy

Page 23: Library privacy and the privacy audit

Informal Patron Requests Who has Weinstein

on Evidence checked out?

Would jury instructions for child molestation be civil or criminal?

Page 24: Library privacy and the privacy audit

Reference Questions

How do I find information on whether I have to tell my boss that I’m HIV positive?

Page 25: Library privacy and the privacy audit

Holds Balance patron privacy with need to

know who receives item Wrap hold items to cover titles if stored

on an open shelf

Page 26: Library privacy and the privacy audit

Routing Slips

Routing slips reveal one or more patron names linked to an item

Opt in

Page 27: Library privacy and the privacy audit

Law Enforcement Requests

Separate policy Easy reference University-wide

THERESA CHMARA, PRIVACY AND CONFIDENTIALITY ISSUES: A GUIDE FOR LIBRARIES AND THEIR LAWYERS (2009).

Page 28: Library privacy and the privacy audit

Audit Results – Training

10-15 student assistants each semester with a completely new staff every 2 years

Students are the main circulation desk contacts

Training issues/reinforcement Reminder sign posted next to the

circulation computer

Page 29: Library privacy and the privacy audit

Audit Results – Paper Problems

MANY issuesInadvertent prints from the circulation

computerCopies of checksOld student info with social security

numbersGraded student work left by former

employeesStaff info page on a bulletin boardPrint copies of sent overdue notices

Page 30: Library privacy and the privacy audit

Inadvertent Printing

Page 31: Library privacy and the privacy audit

Payment Records

Copies of checks

Page 32: Library privacy and the privacy audit

Overdue and Fine Notices

Rachel Gordon123 Some StreetMacon, GA 31204

Page 33: Library privacy and the privacy audit
Page 34: Library privacy and the privacy audit

Public Internet Terminals

Page 35: Library privacy and the privacy audit

Components of a Good Privacy Policy

Notice of rights & applicable laws Choice & consent Access & updating Data integrity and security Data aggregation Required disclosures

Page 36: Library privacy and the privacy audit

Related Issues

Internet security Identity theft Social engineering