Read All About It

Showing 5 of 5 Results

Data-Intensive Technologies and Your Privacy: Two Case Studies

01/28/2025
Teddy Schneider
No Subjects

You may not have heard the phrase “Data-Intensive Technology” before this blog post. You wouldn’t be alone – I stumbled across this phrase for the first time while doing research for my first blog post, “American Public Libraries and Data Privacy.” But as I learned more about DITs (Data-Intensive Technologies), it became clear that I interact with them daily. You probably do, too. 

DIT is an umbrella term for applications and systems that can “process, analyze, and manage large data sets” (Paradkar). But a given technology is not necessarily data-intensive just because it collects a lot of data -- it only becomes data-intensive when the data it collects is “constantly changing and needs to be processed in real time” (Firebolt).  

DITs are pervasive. They are used by businesses, governments, healthcare providers, and a vast variety of other kinds of organizations to make decisions which can impact individuals, communities, laws and regulations, and bottom lines.  

So, let’s look at two DITs that you may interact with in your day-to-day, to get a sense of how DITs interact with your privacy: Artificial Intelligence, and social media. 

Artificial Intelligence 

I have generally run into two schools of thought when I talk about Artificial Intelligence (AI). The first approach can be appropriately described as “Run Away Screaming.” The second might be called “This Thing Sure Is Neat.” Whatever your opinion may be about AI, the fact remains: It’s an incredibly data-intensive system. 

AI has existed in some form or another since the 1950s, but there’s been a recent surge of interest in generative AI, which “can create stories, essays, images, audio, video, and more by learning from existing content” (Collins). All AI systems “rely on huge amounts of data, including sensitive personal data, to train algorithms and enhance performance” (Thomson).  

AI is an interesting case study in privacy, because there are two ways in which this DIT might be used to violate your privacy: with data you give it, and data you don’t. When you use generative AI, any information that you give it during your use of it is stored to be used later. If you love pulling up Chat GPT just to have a chat with it, remember that any information that you reveal about yourself, your beliefs, your work, etc., is used to train that AI and make it better at its task. But even if you've been avoiding using AI, Artificial Intelligences may still have access to your personally identifying information. That’s because training a generative AI takes a lot of data, and much of that data is scraped from the web.  

Generative Artificial Intelligence is being used in decision-making processes in all kinds of fields. For example, Edina, Minnesota’s parks and recreation department uses a platform called Placer.ai, “which uses location analytics to provide data on the movement of people, such as where they travel to/from and how long they stay at a given location,” using cellphone data (Collins). While the data is seen in aggregate to “maintain anonymity,” there is still concern over the general lack of policy and norms protecting park users from invasion of privacy (Collins). 

AI is also starting to appear in healthcare settings, where it is being used to strengthen clinical trials, improve medical diagnosis, treatment, and supplement health care professionals’ knowledge and skills (WHO). However, “the use of AI systems in healthcare is directly associated with access to individuals’ health data” (Uygun). If these AI systems were hosted internally, there might be fewer privacy risks. But that’s not the case – AIs are generally created and owned by corporate entities, and healthcare providers run the risk of patient data being commercialized by AI companies, who retain access to the data the AI is being asked to analyze (Uygun). 

These are just two examples of the countless environments in which AI utilizes the data of people who aren’t interacting with the software directly. AI programs like these analyze constantly-updated data sets, which may contain private information, to inform decisions in a variety of spheres of public life. Even if you’ve never used ChatGPT or Gemini, for example, your data might be fed into an AI system to train it, to answer questions about you as an individual, or to gather insight into behaviors of people like you.  

Social Media 

This section may very well be called “DITs You’ve Definitely Used at Some Point.” Social media and communications applications are becoming ever more data-intensive. “Companies like Google, X, and Meta collect vast amounts of user data, in part to better understand and improve their platforms, but largely to be able to sell targeted advertising” (Elliott). This data can be used in aggregate to determine what people are generally interested in purchasing, or how users are generally engaging with a platform. But it is often used on an individual level, utilizing data like a user’s sexuality, race, age, political beliefs, ethnicity, or other identifiers, to sell products and services (Elliott). This is because many social media and communications platforms monetize your personal engagement with their technology.  

In most cases, social media services don’t cost money. Instead, these companies “make money through monetizing the engagement of their users” (Richards). When you use one of these applications, your data is collected. That data is then used to show you content that aligns with your interests, including specifically targeted advertisements. These advertisements are what provides the businesses with revenue. The app or website is monetarily free for you to use, but you’re paying with your data. 

Engagement-based business models like this are becoming more standard. American legal scholar Jack Balkin has called this the “grand bargain;” social media and communications services are provided “in exchange for participation in a regime of fine-grained surveillance of your activity, desires, and psychological pressure points” (Richards). As technology improves and is better able to process and analyze ever more and bigger data sets, this surveillance data gathered by social media companies is used more and more specifically to advertise to you. 

As these engagement-based applications and websites become more and more pervasive in our everyday lives, it can be incredibly difficult, if not impossible, to opt out of data collection (Elliott). Privacy policies and Terms of Use Agreements for these companies “remain complicated and vague, and many users don’t have the time or knowledge of legalese to parse through them” (Elliott). It’s become a pop-culture in-joke that no one reads or understands Terms of Use agreements, yet contract law assumes the opposite, and “because legal doctrines apply to online contracts, consumers routinely find themselves legally bound to contracts they have not – and often could not – read” (Samples). Even dedicated Terms of Use-readers can sign up for a service or platform by agreeing to privacy policies or Terms of Use which then change over time (Elliott).  

Conclusion: You Care About Privacy, So What Do You Do Now? 

Data-Intensive Technologies can seem scary. If you read this blog post to this point and thought, “This sure looks grim,” you’re not alone. But you also aren’t alone in wanting to protect your data. This week is National Data Privacy Week, sponsored by the National Cybersecurity Alliance, and the 2025 theme is, aptly, Take Control of Your Data.  

There are ways to do just that – take control of your data and retain your privacy. 

When it comes to Data-Intensive Technologies, typical data privacy recommendations like strong passwords, multifactor authentication, and phishing awareness won’t address the issue (although they are all great practices).  

Instead, make sure you understand the “bargain” that you are making with these companies for your convenience. Is using the DIT worth the data it will gather about you? Make sure that you make this decision with as much information as possible by reading (or at least skimming) the fine print. 

 Also consider whether or not you can control how much data the DIT gathers from you by adjusting your privacy settings. Many DITs have the option to manage your privacy settings, and it is best to opt-out of data collection when you can.  

Beyond these steps, practice general data safety. Be selective with the personal data you share online. Consider using privacy tools like VPNs, ad blockers, and privacy-focused browsers to generally reduce your digital footprint. Finally, stay up to date on data privacy laws and regulations as you are able. Knowing your privacy rights allows you to advocate for stronger privacy protection from the services and technologies you use. 

Bibliography and Further Reading 

Cirrito, Chris. 2024. “An Introduction to the Ethical Use of Artificial Intelligence in Corrections.” Corrections Today 86 (2): 56–57. 

https://research.ebsco.com/linkprocessor/plink?id=7ef3a56b-ff7a-3cf7-a29e- 0dc4bb94212a. 

 

Collins, Lindsay. 2024. “Here and Now: How the Rise of Artificial Intelligence Will Impact the Field of Parks and Recreation.” Parks & Recreation 58 (13): 36–41. 

Paradkar, Sameer. “Data-Intensive Applications  --  Part 1.” Medium, September 27, 2024. https://medium.com/oolooroo/data-intensive-applications-part-1-87d9b46aa2b9. 

Richards, Neil, and Woodrow Hertzog. “Against Engagement.” Boston University Law Review 104, no. 1151 (2024). https://scholarship.law.bu.edu/faculty_scholarship/3818 

Samples, Tim, Katherine Ireland, and Caroline Kraczon. “TL;DR: The Law and Linguistics of Social Platform Terms-of-Use.” Berkeley Technology Law Journal 39, no. 47 (2024). 

Thomson, Lucy L., and Trooper Sanders. 2024. “Human Rights Challenges with Artificial Intelligence.” Human Rights 49 (4): 24–25. 

Uygun İli̇khan, Sevil, Mahmut Özer, Hande Tanberkan, and Veysel Bozkurt. 2024. “How to Mitigate the Risks of Deployment of Artificial Intelligence in Medicine?” Turkish Journal of Medical Sciences 54 (3): 483–92. doi:10.55730/1300-0144.5814. 

Elliott, Vittoria. “The New Era of Social Media Looks as Bad for Privacy as the Last One.” Wired, November 1, 2023. https://www.wired.com/story/x-alternatives-user-privacy-report/. 

“What Is a Data-Intensive Application?” Firebolt Glossary. Accessed January 8, 2025. https://www.firebolt.io/glossary-items/data-intensive-application. 

“WHO Outlines Considerations for Regulation of Artificial Intelligence for Health.” World Health Organization. Accessed January 8, 2025. https://www.who.int/news/item/19-10-2023-who-outlines-considerations-for-regulation-of-artificial-intelligence-for-health. 

No Subjects
11/29/2024
No Subjects

Gladwyne, PA – The Gladwyne Free Library is thrilled to announce that it has been awarded a $25,000 grant from the Philadelphia Funder Collaborative to support its upcoming project, “Literacy and Liberty: Empowering Revolutionary Change through Collaborative Art and Public Libraries” in celebration of the Our Nation’s Semiquincentennial. This initiative aims to host year-long events that will feature lectures and workshops for all ages, active and passive programming, as well as hybrid and accessible events.

“Literacy and Liberty” will have a diverse representation of artists and lecturers, who plan to acknowledge and honor the distinctive stories of the American experience, specifically those of Philadelphia-area natives. An Artist-in-Residence Program that will enrich our community's cultural landscape and provide a valuable platform for local artists to connect with their audience. By educating ourselves on the past and present of our nation and libraries as community centers, we can better understand our place in the world and work towards a brighter future. 

“This grant is an incredible opportunity for the Gladwyne Free Library,” said Alicemarie Collins, Head Librarian of the Gladwyne Free Library. “We are grateful to the Philadelphia Funder Collaborative for their support and belief in our mission. This project will not only enhance our offerings but will also inspire our community to reflect on the history of our country and the value of literacy in our lives.”

The “Literacy and Liberty” project will run from January 2026 to December 2026. A total of four artists- in- residence will be selected via an application process beginning in July 2025. The program will culminate with an exhibition featuring collaborative art pieces created throughout the program.

“We invite everyone to join us in this celebration of our nation’s history and the critical role that literacy plays in shaping our future,” Alicemarie Collins added. “Together, we can empower each other through knowledge and understanding.”

For more information about the “Literacy and Liberty” project and upcoming events, please visit the Gladwyne Free Library’s website at lmls.org/gladwyne or contact the library at gladwynelibrary@lmls.org.

### About Gladwyne Free Library

The Gladwyne Free Library is committed to providing the community with access to a wealth of resources, educational programs, and cultural enrichment opportunities. With a focus on fostering a love of reading and lifelong learning, the library serves as a vital hub for all who seek knowledge and connection within the community.

### About Philadelphia Funder Collaborative

The Philadelphia Funder Collaborative for the Semiquincentennial exists to support Philadelphia-area programs celebrating the 250th anniversary of the founding of the United States. Philadelphia has long enjoyed pride of place for the observation of major national milestones. The Centennial of 1876 was a massive success, attracting more than 10 million visitors to Philadelphia. We hope to build on that proud legacy by providing financial support to eligible nonprofits that are planning and hosting programs related to the 2026 commemorations.

Following the nonpartisan Educating for American Democracy framework, which has been funded and endorsed by the National Endowment for the Humanities and the Department of Education, the Collaborative intends to approach this grant making from a posture of “reflective patriotism.” This posture seeks to better understand and celebrate the nation’s founding ideals; to acknowledge the times the nation has failed to uphold those ideals; and to recognize the many individuals who have helped move the nation toward the realization of its founding ideals.

This post has no comments.
11/29/2024
No Subjects
decorative-image

The Lower Merion Library System is currently accepting applications for a Member-At-Large to serve on the system’s Board of Directors. 

This is an important volunteer position requiring a minimum time commitment of one evening in person per month and participation in other subcommittee tasks as needed. 

The Library System is designated by the Township of Lower Merion to act as the township’s agent to provide library services for residents. Board directors are responsible for policymaking, stewardship, and long-range planning for the six members: Ardmore, Bala Cynwyd, Belmont Hills, Gladwyne, Ludington and Penn Wynne Libraries. 

Interested candidates are encouraged to submit a resume and letter of interest to the President of the Board of Directors, Lower Merion Library System, at jdeangelis@lowermerion.org or mail to 75 East Lancaster Avenue, Ardmore, PA 19003

The deadline to submit resumes is Monday, December 16, 2024.

This post has no comments.
06/05/2024
Teddy Schneider
No Subjects
decorative-image

I feel like everyone I know is at least a little concerned about their right to privacy these days. We all know that we’re in the “digital age” , and it can be hard to pin down exactly what that means for our privacy rights. I find it useful to turn to history in times of uncertainty, and maybe you do, too! The following timeline is a series of important moments in the history of your right to privacy today. 

Let’s start way back in Ancient Greece. You might have guessed that privacy isn’t a new idea, but did you know that it wasn’t always desirable? In Ancient Greece, public life and private life were very separate. Public life, or polis, was for free men. It was the sphere of freedom, ideas, and action. Meanwhile, private life was for women and slaves. Private life existed only to fulfil the needs of a human body, like food and rest. In Ancient Greece, if you lived a life in private, you weren’t fully human. To be human was to be publicly involved and publicly perceived.  

For more information: 

Keigo Komamura, “Privacy’s Past: The Ancient Concept and Its Implications for the Current Law of Privacy” 

Hannah Arendt, “The Human Condition” 

Okay, so privacy was a thing, even if it wasn’t always something you wanted. But what about human rights? While we won’t get to the concept of “human” rights for a while, we should make a pitstop in 1140s Italy, when a monk named Gratian completed a compilation of 4,000 texts called the “Decretum Gratiani.” The Decretum was made up of texts that described judicial relationships within the Catholic Church, giving historians a huge insight into how rights were perceived during this time period. The Decretum Gratiani proves to us today that medieval people understood and supported the idea of natural rights (rights that everyone is born with and that cannot be taken away) and agreed that those natural rights could and should be protected.  

For More Information:  

Antonio Padoa-Schioppa, “A History of Law in Europe: From the Early Middle Ages to the Twentieth Century” 

The concepts of privacy and natural rights continued to circle each other for centuries as thinkers and lawmakers mulled them over. In 1689, John Locke published his seminal treatise on property, writing that “every man has a property in his own person... The labour of his body, and the work of his hands, we may say, are properly his.” Some scholars today think that Locke’s definition of property was so broad that it might help us think about protecting our privacy from technological intrusions and invasions of data privacy. It is certainly true that Locke’s thoughts on property and other natural rights are important cornerstones of American and international law, and have shaped privacy law. 

How do we know that Locke’s thoughts on natural rights shaped privacy law? Because they shaped the Bill of Rights! A century after Locke published his treatise on property, the United States of America adopted the Bill of Rights. This document protects the natural rights of American citizens and is a foundational text for American law, as it accompanies the Constitution. It is also a foundational text for privacy law, specifically. The Bill of Rights contains what we may consider “nods” to privacy rights – it never explicitly expresses a citizen’s right to privacy, but it does come close! We often refer to the first amendment as the freedom of religion, but it may also be interpreted as the right to religious privacy. Usually when we think of privacy and the Bill of Rights, we think about the fourth amendment, which doesn’t say “you have a right to privacy” but comes pretty close, expressing “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”   

 

The first time that privacy rights are formally introduced to the American legal sphere was in 1890, with Samuel D. Warren and Louis Brandeis’ seminal work, “The Right to Privacy.” While “The Right to Privacy” was not legislation, it did lay the foundation for torte law regarding privacy. Warren and Brandeis were worried about recent technological advancements and how people using those technologies might be able to invade a persons’ privacy if that privacy were not explicitly protected (sound familiar?). They wrote that these recent inventions, like “instantaneous photographs,” made it important to be able to protect private and domestic life from invasion.  

Reading “The Right to Privacy” today is almost spooky; Warren and Brandeis were right on the money when they wrote that “numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” If not spooky, it’s at least relatable. Is Alexa listening to what we whisper in our closet, and shouting it from the housetop of Amazon’s headquarters? And “instantaneous photographs” have taken on a whole new meaning in the era of social media – never mind newspapers. 

Warren and Brandeis did more than express worry, though. They argued that there should be protections for a person’s right to be “let alone.” This was the first time that people argued that a person’s right to privacy should be legally protected in America. 

A little over half a century later, in the aftermath of World War II, the global community recognized the need to protect fundamental human rights. So, in 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights. Article XII of the Declaration states that “no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence... Everyone has the right to the protection of the law against such interference.” This was a foundational moment for how we understand privacy today, as a human right, and laid the groundwork for future legal protections of privacy all over the globe. 

For more information: 

Universal Declaration of Human Rights  

A couple of decades later, Americans were beginning to put two and two together. Privacy was now a human right, and one might argue that the Bill of Rights protected it, even if indirectly. In the 1965 Supreme Court case Griswold v. Connecticut, the Court ruled that a Connecticut law forbidding the use of contraceptives violated the right of marital privacy. Justice William O. Douglas famously wrote that the Constitution implicitly guarantees a citizens’ right to privacy, referring to it as a right within the “penumbra” of specific guarantees of the Bill of Rights.  This case stated that even though the Bill of Rights doesn’t use the word privacy, it’s still a big part of how Americans’ right to privacy is granted and protected. 

In 1974, the United States federal government passed the Privacy Act (Public Law 93–579, 88 Stat. 1896, enacted December 31, 1974, 5 U.S.C. § 552a). Sounds promising, doesn’t it? Well, it wasn’t terribly far reaching. In fact, it only applied to federal agencies. But it did change a lot about how the federal government respected and protected the privacy rights of American citizens. The Privacy Act recognized the responsibility that the government itself has in protecting individuals’ information, and was designed to safeguard individual privacy from the misuse of federal records. When it became law, it granted individuals the right to request their records from federal agencies, request amendments to records that were inaccurate, untimely, or incomplete, and protected people against “unwarranted invasion of their privacy through the maintenance, use, and disclosure of personal information.”  

In 1986, American law started to protect privacy on a grander scale than federal agencies. The Electronic Communications Privacy Act of 1986  (Public Law 99-508, 100 Stat 1848) took a stab at protecting what we might today consider “data privacy.” This law protects communications from interception while they are being made, while they’re on their way, and when they are stored on computers, and applies to emails, telephone conversations, and electronically stored data. This law has since been updated several times to keep up with new technologies. It was also updated by the Patriot Act, in 2001, which brings us to another chapter in privacy rights. 

In the aftermath of the September 11th terrorist attacks in 2001, the United States began to grapple with how to protect both privacy and national security. The Patriot Act (Public Law 107-56, 115 Stat 272), introduced less than a week after the attacks, explicitly allowed more surveillance of the American public than ever before. It allowed for both domestic and international wiretapping and walked back protections on electronic communications. For more information about how libraries approached the Patriot Act and its threats to patron privacy, see my first blog post in this series on libraries and privacy. While the Patriot Act did expire in March, 2020, federal law enforcement agencies still retain most of the authorities granted by the original act. 

In 2019, the United Nations returned to the issue of privacy full force after half a century. A resolution was adopted by the Human Rights Council (HRC) in September 2019. The Council expressed concern that “individuals often do not and/or cannot provide their free, explicit, and informed consent to the collection, processing, and storage of their data.” Just think of all the terms of service you have agreed to throughout your life just to use the internet, and you’ll understand this concern! The HRC also affirmed that “the same rights that people have offline must also be protected online, including the right to privacy,” calling back to their initial Universal Declaration of Human Rights. Finally, the Council expressed that while new and emerging technologies, such as Artificial Intelligence, have the potential to infringe on one’s right to privacy, such risks should be minimized through regulation that ensures “a safe, secure, and high-quality data infrastructure and by developing human-centered auditing mechanisms, as well as redress mechanisms.” 

In 2020, the United Nations General Assembly responded to the Human Rights Council, affirming the need to discuss the right to privacy once again now that we are in the digital age, and affirming that “the right to privacy is important for the enjoyment of other rights,” as it affects political, economic, social, and cultural spheres. 

Were you worried that American privacy protections were gone with the Patriot Act? Not so! The United States is keenly aware of the privacy rights issues we face in the present day, and as we look to the future of privacy rights, we might consider the American Privacy Rights Act of 2024, which was introduced on April 7th of this year (but has not been made law). This proposed act “would establish national consumer data privacy rights and set standards for data security.” Basically, if you’ve ever consumed anything online (whether that means you’ve gone online shopping, signed up for Facebook, or trained your TikTok algorithm), this bill is meant to protect you. If passed, it would give you the right to access data collected about you, as well as correct, delete, and export it. Plus, it would give you the right to opt out of targeted advertising, a process that looks at your personal data to try to discern what you might like to buy. All of which is to say, if you’re worried about your privacy in this digital age, not to worry: there are government representatives who are, too! 

For that matter, your local libraries are also concerned with your right to privacy. It is part of our professional best practices and professional ethics to protect your privacy in the library, and to help you protect it yourself. That’s a big part of why you’re reading this blog post on a library system’s blog.  

Keep an eye out for more blog posts here as we continue our series on privacy. 

This post has no comments.
04/18/2024
Teddy Schneider
No Subjects

 

Data Privacy Blog

 


 

 

In recent years, concerns about data privacy have escalated as technology infiltrates every aspect of our lives. I often worry about the extent to which companies gather and utilize our data—whether it's Alexa listening in, Facebook's insights about me, or TikTok crafting a startlingly accurate image of my preferences to enhance my user experience.

Our modern landscape is saturated with data-intensive technologies—applications, websites, and programs reliant on copious amounts of personal data. Consequently, we've come to associate data privacy inseparably with technology. And rightfully so. Our devices gather so much data, which can feel daunting in and of itself. Then there’s the seemingly impossible matter of tracking where that data ends up. So, how do we safeguard our data privacy?

The good news? Libraries are increasingly recognizing their role in safeguarding patrons' data privacy. Throughout history, libraries have collected data from patrons, such as names and addresses, in exchange for access to resources. The digital age has brought with it more opportunities for libraries to collect patron data, and a surge in the risk of recommending applications and websites that compromise patrons' data security. Consequently, the library profession has established norms, best practices, and a code of ethics to navigate these challenges and prioritize patrons' data privacy.

But it wasn't always this way.

Henry Melnek and the Evolution of Privacy as a Library Ethic

The concept of privacy and its status as a human right and library ethic have evolved significantly over time, shaped by societal shifts and evolving opinions within the field of library science. In a notable case in June 1906, Henry Melnek was arrested for book theft from the Astor Library, a precursor to the New York Public Library in the East Village. Melnek’s case serves as a compelling example of early librarianship's treatment of privacy.

During that era, most public libraries didn't allow browsing. Patrons made specific requests, and librarians retrieved items from closed stacks. At the Astor Library, librarians were familiar with Melnek's frequent visits and his interest in anarchism and socialism, and when two books went missing, one of which was in German, librarians suspected Melnek. Rather than collaborating with local authorities, the Chief Librarian worked with two Russian agents of the czar stationed in New York who were looking for agents working against the Russian state.5

Melnek’s arrest stands as one of the earliest examples of a data privacy breach in library practices. Notably, the Astor librarians’ cooperation with Russian agents to identify an American citizen for arrest did not cause public furor – rather, the library was critiqued for providing materials about anarchism and socialism.

Although Melnek’s case suggests otherwise, privacy was gradually becoming a professional concern for librarians. By the late 1800s and early 1900s, some librarians began viewing themselves as ethically obligated to provide confidential services akin to doctors and lawyers. This sentiment was reflected in former American Library Association President Arthur Bostwick's 1909 statement at the ALA’s 33rd annual meeting, emphasizing the library's obligation to protect patron privacy, especially concerning their whereabouts or address.

The American Library Association, founded in 1876, officially recognized a patron's right to privacy in its 1939 Library Bill of Rights. This aspirational document marked a significant step towards prioritizing privacy in library services.

Where the ALA led, others followed. In 1961, Pennsylvania passed Privacy of Circulation Records, which states that information identifying library users and their use of materials shall be confidential, unless in the case of a court order or criminal proceeding. If you’ve ever stopped by the Belmont Hills Library and I’ve told you that your reading history is between “you, library staff, and anyone with a warrant,” this is what I was talking about! This statute is still in effect today.

Libraries' Confrontations with the Federal Government on Privacy

In the latter half of the 20th century, libraries faced more concrete challenges regarding patron privacy, this time from government agencies. In 1970, the IRS sought library circulation records in Milwaukee and Atlanta to identify potential domestic terrorists. This prompted the American Library Association to issue the Policy on Confidentiality of Library Records in 1971, reinforcing the confidentiality of patron records and advising resistance against government inquiries without proper authorization.

Similarly, in the 1970s and 80s, the FBI's Library Awareness Program aimed to gather patron data from libraries to identify potential threats. Librarians, relying on established ethics and legislation, resisted government intrusions into patron privacy, viewing them as threats to intellectual freedom and free inquiry.

These encounters set the stage for libraries' response to the Patriot Act of 2001, which also infringed on patron privacy rights. Sections 215 and 205 allowed for the seizure of borrowing records and imposed gag orders on librarians, which prohibited them from telling patrons if their data had been accessed. Despite constraints, librarians mobilized to protect patron privacy through patron education, legal challenges, and organizational support. It was during this era that librarian Jessamyn West’s famous sign hung from circulation desks across the country, reading: “The FBI has not been here. Watch very closely for the removal of this sign.”

Contemporary Approaches to Data Privacy in Libraries

Today, libraries remain committed to safeguarding patron privacy amidst technological advancements. Libraries acknowledge the delicate balance between data collection for essential services and protecting patron privacy. Robust privacy policies outline the data collected, its purpose, and measures to limit tracking and ensure anonymous browsing. Lower Merion Libraries has a very informative privacy policy, which library users can use to see what information we collect and how we protect it.

Libraries also prioritize staff education on data privacy best practices and offer patrons guidance on safeguarding their digital privacy beyond library premises. As technologies increasingly rely on user data, librarians vet websites and applications to ensure they meet privacy standards.

Finally, many libraries also offer education to our users about how to protect their data privacy even when they are not at the library, confirming that our commitment to privacy as a human right extends beyond the walls of our buildings and into the community at large.

Conclusion

While societal attitudes towards privacy evolve, libraries continue to uphold their commitment to patron data privacy. As guardians of information access, libraries strive to protect patrons' privacy both within and beyond their premises. As we navigate an ever-changing landscape of technology and privacy concerns, libraries remain steadfast in our role as advocates for intellectual freedom and data privacy.

Stay tuned for future blog posts on current data privacy issues, the history of privacy as a human right, and how libraries empower patrons to protect their data in the digital age.

Bibliography

 

American Library Association. 1939. “Library Bill of Rights.” Advocacy, Legislation & Issues. September 7, 2022.
https://www.ala.org/advocacy/intfreedom/librarybill.

American Library Association. 1971. “Policy on Confidentiality of Library Records.” Advocacy, Legislation & Issues.
https://www.ala.org/advocacy/intfreedom/statementspols/otherpolicies/policyconfidentiality.

American Library Association. 2017. “History.” About ALA. July 18, 2017.

https://www.ala.org/aboutala/history#:~:text=At%20the%20end%20of%20the,of%20the%20American%20Library%20Association.

American Library Association. 2019. “Privacy: An Interpretation of the Library Bill of Rights.” Advocacy, Legislation & Issues.
https://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy.

Aycock, Anthony. “Before book-banning wave, the FBI spied on people’s library activity.” The Washington Post. January 23, 2023.
        https://www.washingtonpost.com/history/2023/01/23/library-awareness-program-fbi-surveillance/ (accessed January 31, 2024).

Bostwick, Arthur E. “[Exploitation of the Public Library].” Bulletin of the American Library Association 5, no. 4 (1911): 60–65.
         http://www.jstor.org/stable/25684991.

“Digital Data Collection and Information Privacy Law by Mark Burdon (Review).” 2021. Information & Culture 56 (1).
         https://research.ebsco.com/linkprocessor/plink?id=2116094d-4f7f-302a-af99-855ed2414f3b.

Drabinski, Emily. "Librarians and the Patriot Act." Radical Teacher, Winter 2006, 12+. Gale Academic OneFile (accessed January 31, 2024).
         https://link.gale.com/apps/doc/A158526546/AONE?u=tel_k_cedgrv&sid=bookmark-AONE&xid=e526038b.

Foerstel Herbert N. 1991. Surveillance in the Stacks : The FBI’s Library Awareness Program. New York: Greenwood Press.

Fontichiaro, Kristin. 2019. “Data Literacy: Negotiating Convenience and Data Privacy.” Teacher Librarian 47 (1): 51–54.
         https://research.ebsco.com/linkprocessor/plink?id=e909a3d6-f3d7-336e-8cbf-4badc6a6574a.

Fortier, Alexandre, and Jacquelyn Burkell. 2015. “Hidden Online Surveillance: What Librarians Should Know to Protect Their Own
          Privacy and That of Their Patrons.” Information Technology & Libraries 34 (3): 59–72.  https://doi.org/10.6017/ital.v34i3.5495.

Gilens, Naomi. “The NSA has not been here: Warrant canaries as tools for transparency in the wake of the Snowden disclosures.” 
          Harvard Journal of Law & Technology 28, no. 2 (Spring 2015).

“The Known Citizen: A History of Privacy in Modern America by Sarah E. Igo (Review).” 2021. Information & Culture 56 (2).
          https://research.ebsco.com/linkprocessor/plink?id=b68d7c04-0285-38df-9dbd-75b95c5411dc.

Krug, Judith F. 2010. Intellectual Freedom and the American Library Association (ALA): Historical Overview [ELIS Classic].
          Encyclopedia of Library and Information Sciences. 3rd ed. Taylor & Francis. https://doi.org/10.1081/e-elis3-120008776.

Lamanna, Thomas. “On Educating Patrons on Privacy and Maximizing Library Resources.” 
           Information Technology and Libraries 38, no. 3 (September 15, 2019): 4–7. https://doi.org/10.6017/ital.v38i3.11571.

Lund, Brady. 2022. “Policy Before Technology: Don’t Outkick the Coverage.” Information

Technology & Libraries 41 (1): 1–3.  https://doi.org/10.6017/ital.v41i1.14773

McAndrew, Chuck. 2020. “LibraryVPN: A New Tool to Protect Patron Privacy.” Information Technology & Libraries 39 (2): 1–3.
          doi:10.6017/ital.v39i2.12391.

Pennsylvania Statutes Title 24 Pa.C.S.A. Education § 9375. Privacy of circulation records.

https://www.legis.state.pa.us/WU01/LI/LI/CT/HTM/24/00.093.075.000..HTM

"Privacy: An Interpretation of the Library Bill of Rights", American Library Association, July 7, 2006.
          http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/privacy (Accessed January 31, 2024).
          Document ID: 5c653c23-920b-b254-d94c-6dcf4ccd86c6.

San Nicolas-Rocca, Tonia, and Richard J Burkhard. “Information Security in Libraries: Examining the Effects of Knowledge Transfer.” 
          Information Technology and Libraries 38, no. 2 (June 17, 2019): 58–71. https://doi.org/10.6017/ital.v38i2.10973.

Sarabia-Sánchez, Francisco-José, Juan-Miguel Aguado, and Inmaculada J. Martínez-Martínez “Privacy Paradox in the Mobile Environment: The Influence
          of the Emotions.” El Profesional de la Información 28, no. 2 (March 25, 2019). https://doi.org/10.3145/epi.2019.mar.12.

Witt, Steve. “The Evolution of Privacy within the American Library Association, 1906-2002.”  Library Trends 65, no. 4 (Spring 2017): 639-658.
          https://doi.org/10.1353/lib.2017.0022

Zimmer, Michael. 2013. “Assessing the Treatment of Patron Privacy in Library 2.0 Literature.”Information Technology & Libraries 32 (2): 29–41.
          doi:10.6017/ital.v32i2.3420.

This post has no comments.
Provided email address is invalid.
Field is required.
Field is required.