1 / 79

Patron Privacy in a Surveillance State. Revised. Adam Chandler

Patron Privacy in a Surveillance State. Revised. Adam Chandler. Metadata Working Group May 1, 2014. July 5, 1993. “They are intent on making every conversation and every form of behaviour in the world known to them” - July 2, 2013. Post-Snowden reality.

Télécharger la présentation

Patron Privacy in a Surveillance State. Revised. Adam Chandler

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Patron Privacy in a Surveillance State. Revised. Adam Chandler Metadata Working Group May 1, 2014

  2. July 5, 1993

  3. “They are intent on making every conversation and every form of behaviour in the world known to them” - July 2, 2013

  4. Post-Snowden reality

  5. Gellman, Barton, and AshkanSoltani. “NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say.” The Washington Post, November 1, 2013,

  6. “First half of 2013, American authorities made 12,444 requests of 40,322 accounts. Yahoo handed over content in 37 percent of cases, whereas in 55 percent of the cases, the company handed over only ‘non-content data’ (NCD).”* *Basic subscriber information including the information captured at the time of registration such as an alternate e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., “to,” “from,” and “date” fields from e-mail headers).

  7. 321,000 legal orders for user data in 2013. Of those, over 6,000 were court orders to provide metadata in real time.”

  8. “State and federal agencies made 301,816 separate demands for data from AT&T in 2013. “Governments asked for location-related data 37,839 times”

  9. “Sprint Accused of Overcharging US for Spying Assistance.” Network World, March 4, 2014. http://www.networkworld.com/news/2014/030414-sprint-accused-of-overcharging-us-279362.html.

  10. “What eludes Mr. Snowden – along with most of his detractors and supporters – is that we might be living through a transformation in how capitalism works, with personal data emerging as an alternative payment regime. The benefits to consumers are already obvious; the potential costs to citizens are not. As markets in personal information proliferate, so do the externalities – with democracy the main victim.” EvgenyMorozov

  11. “When the government collects metadata on people, the government puts them under surveillance. When the government collects metadata on the entire country, they put everyone under surveillance. When Google does it, they do the same thing. Metadata equals surveillance; it's that simple.” Bruce Schneier

  12. “Surveillance is the business model of the Internet.” Bruce Schneier

  13. “With little or no revenue from its users, Google still manages to turn a healthy profit by selling advertisements within its products that rely in substantial part on users’ personal identification information … in this model, the users are the real product.“- after dismissing a class action lawsuit brought by Google users who claimed the search giant broke the law when it combined the privacy policies of Gmail, YouTube and a variety of other services. US Magistrate Judge Paul Grewal

  14. "We have a stalker economy."

  15. Um. Since we work in libraries… what does all this mean for patron privacy?

  16. Statement on Access to Personally Identifiable Information in Historical Records Librarians should recognize an obligation to monitor their governments’ legislation in regard to confidentiality of data records. In particular, librarians should support the need for privacy laws to protect library users from such abuses as government agencies monitoring their reading and research habits. - IFLA Governing Board

  17. ALA Code of Ethics III. We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted. - American Library Association

  18. "The privacy that libraries traditionally have been preserving is not always valued by their patrons, especially in an age of social networking." David Weinberger, co-director of the Harvard Library Innovation Lab.

  19. Library 2.0

  20. “Librarian 2.0 is the guru of the information age.” Stephen Abram

  21. 7.5% Zimmer, Michael. “Patron Privacy in the ‘2.0’ Era: Avoiding the Faustian Bargain of Library 2.0.” Journal of Information Ethics 22, no. 1 (April 1, 2013): 44–59. doi:10.3172/JIE.22.1.44.

  22. 1.6% Zimmer, Michael. “Patron Privacy in the ‘2.0’ Era: Avoiding the Faustian Bargain of Library 2.0.” Journal of Information Ethics 22, no. 1 (April 1, 2013): 44–59. doi:10.3172/JIE.22.1.44.

  23. Contextual integrity Nissenbaum, Helen Fay. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, Calif.: Stanford Law Books, 2010.

  24. Case study: How are these competing paradigms playing out in Cornell University Library?

  25. Library systems that collect patron usage data inside Cornell campus

More Related