www.fgks.org   »   [go: up one dir, main page]

Showing posts with label Privacy/Publicity. Show all posts
Showing posts with label Privacy/Publicity. Show all posts

Tuesday, May 29, 2018

Happy GDPR!

The European Union General Data Protection Regulation (GDPR) went into effect on May 25. Ahead of that date, all of us received updates and reminders from all the Internet services we use, reminding us of how our data is collected and used.  Those notices were useful, annoying, and a prompt to clean up where I've given permission for my data to be used.

If you are outside of the United States, you are now seeing a notice at the top of this blog, which is in keeping with the GDPR.  Blogger (Google) has placed this notice on the blog on my behalf.  For those of us inside the U.S., the notice is not visible.  So that everyone knows what it looks like and says, I have captured a screenshot of it from the French URL for this site.

Happy GDPR!

GDPR notice on Digitization 101

Thursday, August 18, 2016

WLIC2016 : Privacy Law in the Digital Age: Governments rethink the meaning of information access policies

Roberta Shaffer (moderator) - we've come a long way historical. The right to privacy is not a new one.   The right of privacy is infused with many type of relations.  She questioned whether we can be forgotten, which is part of the right of privacy.  It may not be technically possible.

Dennis Hirsch - blending the European and American approaches

Different privacy regimes

In the US, privacy is often controlled by the Federal Trade Commission.

In Europe, the right to be forgotten.  In Europe, the right to be forgotten makes a lot of sense.  In the US, we see this as true information, which should be available.  He mentioned lawsuits in France and Italy, where the right to be forgotten or the right to privacy had been upheld.

Is US privacy law adequate when dealing with data sharing across country boundaries.  People in other countries are not covered by the Fourth Amendment:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue,but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

This conflict is relevant outside of the US and Europe.  Many countries has adopted the European model.

How to think about this conflict?  One way of thinking about it in terms of economic competition.

Economic competition

GAFAM = Google, Amazon, Facebook, Apple and Microsoft.

In Europe, the privacy regulations are seen as protectionism.

But the US and Europe have two different cultures of privacy.  Europe is focused on dignity, while the US is focused on liberty. 

Two cultures of privacy

There is a long tradition in Europe of reputation and honor; your public face.  This was a right of the noble classes, which became a right of everyone.  It became a human right.  Each has a right to personal dignity. 

In the US, we got rid of the monarchy.  We believe that we have the right to make decisions free of state interference.  Our anxiety is that the government would get a hold of all of our private information.  We do not want an overbearing government in our private lives.

In the US, we don't want the government to limit what we can know.

How dose resolve the conflict over privacy?  Both come out of a western tradition.  Can we blend dignity with liberty?  Perhaps there is something in the Universal Declaration of Human Rights.

What about intellectual privacy? There is a book on that.

Make sense of differences in legal regimes

IFLA statement

Anne Klinefelter - Privacy law in the digital age: information access and the US law library

The privacy of library users is shrinking.  The private information of individuals, whom a library user might be researching, may be increasing.

Privacy of USA Law Library Users is Shrinking

We want to increase the privacy of our users as well the privacy of the people on our content.  We want to increase access to content.  We want to limit surveillance, including watching what people are accessing.

Areas affecting privacy:
  • Privacy of law library users
  • Library laws and ethics
  • Attorney-client confidentiality
  • Judge/legislator traditions
In the US, privacy laws are at the state level.  Some were passed in the wake of the Freedom of Information Act.  Laws in 48 states, the District of Columbia, and attorney general opinions form the basis for this.

Some states have laws about digital book services.  There is a new law in Delaware, for example.

Legal research itself is part of the client-lawyer confidentiality.

ALA and privacy

Privacy as shrinking

Data shared with any third party in the US can be monitored without a warrant.  There is a thin barrier between what Google knows and what the US government knows.  (The Third Party Doctrine)

There has been growth of data brokers, who combine information from across the web, and then sell the resultant information.  Data brokers may create discriminatory sounding categories, which can harm a person's dignity.

Privacy rights expanding
 

Adam Eisgrau - ALA Office of Government Relations

They address key library legislative issues with Congressional representatives.

What data does the US government get? They get it all.  He noted that USA PATRIOT Act and how much was lost in terms of civil liberties.  Librarians took exception to one section, which has become know as a library provision (the national security letter).  (Section 215)

Section 215 expired briefly and then was renewed by the USA Freedom Act on 2015.  This Act ended the bulk collection of the NSA, but requests can be made.  The gag order of Section 2015 now is subject to judicial review. 

The secret court rarely said "no" to requests.  Now advocates/watchdogs can be at the proceedings.

The cybersecurity Information Sharing Act now makes the NSA the collector of information, she something fishy happens,and that information is shared with other agencies.

The Electronic Communications Privacy Act - This act was passed in 1986 and it has not been amended since then.  In 1986, people dod not store long term.  If data is over 180 days old, a warrant is not needed.  There is activity in a congress to change this act, however, people are also looking to expand the PATRIOT Act.

What about encryption or digital "back doors"? This is a huge debate currently in the US.  People want stronger encryption. The government wants to get around encryption.  Can the government compel a company to break encryption?  Will the government study this to death?

Student Privacy and FERPA - The real action around student privacy has been in the states. One of the leading states on this is California.  https://ferpasherpa.org

FERPA

He noted that the President in the US can issue an Executive Order, which can impact privacy.  He mentioned Rule 41, which is about hacking.

Resources:

Http://www.districtdispatch.org
Http://www.ala.org/ogr
Comment:

  • Hirsch - in the privacy of readers, dignity and liberty are combined.  When it comes to content, dignity and liberty are in conflict.  We need to find creative ways to synthesize liberty and dignity.
  • Eisgrau - expunging versus contextualizing.  What about providing more information in order to provide context?  Given our technology, is an expunging possible? 
  • Shaffer - there is a balance in people's minds between privacy and convenience.  In the US, we have felt that the government would protect our privacy.  However, security breaches in the US demonstrate that the Government is not protecting our privacy.  In Germany, they do not trust the government and felt that corporations would protect their privacy.  However, breaches show that corporations are not adequately protecting people's privacy.
  • Hirsch - privacy has political and cultural contexts in different countries. 

Monday, December 29, 2014

Metadata, privacy and 1984

The book title 1984 was written during World War II and has had an impact on generations since then.  It has become the book title to note when talking about surveillance, a topic that is now frequently in the news.  And it came to my mind as I watched Cybercrimes with Ben Hammersley: Surveillance, a BBC news program.  The half-hour program - like many others - talked about Eric Snowden, but what stood out to me was what it said about metadata.  No, this wasn't the first time that I'd heard the terms "surveillance" and "metadata" linked together, but this time I recognized an opportunity.

All librarians understand that how an item is described is important.  Library users make many decisions based on those descriptions, which are now in the form of digital records.  In college, I worked for a librarian (Mrs. Martinez), who enjoyed describing a new book and creating the best catalogue record for it.  I can still see the smile on her face when she had succeeded!  However, we see the catalogue description as leading to an item.  In surveillance that description - the metadata - can be more important than the item itself. 

In surveillance, the metadata of a thousand items (people, phone calls, emails, etc.) can be mined for what could be useful information.  The mining is done by computers and the work can find a "needle in a haystack", or in other words a connection that might not have been found otherwise.  It is humans that launch the computers on these tasks and humans who then look at and analyze the results. 

Why Metadata MattersLike everyday, today I generated a fair amount of metadata.  I used my computer on the Internet, as well as my mobile devices.  All of the apps and web sites likely generated data as I used them, and some of that data I willingly shared.  Likely there is other data that was captured without my permission or knowledge.  My car does not have all of the up-to-date technology in it, but it does have some sort of a computer (and every computer generates data).  And since I was out driving around, it could be that a police officer captured my license plate with an automatic license plate reader.  If I happen to use my credit card today, that will also generate data.  And, of course, I watched cable TV and the cable service tracks some information about my usage (or how would it know that it can raise its rates and people will not complain?).  Given all this data that I'm creating, my privacy is an illusion.

However, all of this data has created an opportunity for us (librarians).  We are the people who understand how to describe data elements, so that the correct information is captured.  We're the ones that understand how to map (crosswalk) data elements across systems (and imagine how many systems are being involved with this worldwide).  We have the skills to help extract data - broadly or narrowly - and then analyze the results.  And...we understand the ethical use of information.  (And I will argue that people who understand the ethical use of information should work for organizations that do not use information ethically.  We need to be in those organizations and part of their internal conversations, which is how we might help them to change.)

If working with this type of data and metadata is of interest to you (or someone you know), consider what you need to do to get the job you want.  Perhaps you need to take university courses.  Perhaps you need a degree or an advanced certificate.  Maybe you need to do other professional development.  Likely you need to do some research on the jobs available and the organizations that have those positions.  You likely need to do some networking, both as a way of learning more and as a way of getting yourself known (e.g., SLA's new Data Caucus).  How long will it take you to get a job in this area?  That's up to you and may be dependent on what skills you need to develop.

It has been said that Eric Snowden's revelations didn't change anything at all.  It could be that the "change" needs us.  We're the missing ingredient.  Who among us will get involved?

Snowden during interview with Glenn Greenwald and Laura Poitras (June 6, 2013).
Resources:

Thursday, August 11, 2011

blog post: When I Go Away: Getting Your Digital Affairs in Order

Wondering how to get your digital life in order for your heirs? Mike Ashenfelder provides details on the steps you will need to take. The process is not easy. (Definitely not as easy as creating your last will and testament.) As Ashenfelder notes:
Planning is tedious but crucial and your heirs will appreciate your considerate forethought.

Tuesday, January 27, 2009

My top seven presentation tips

I've been planning this post for a while and a conversation this morning made me realize that I should do this now.

How to give a good presentation is something that you learn by doing, learn by watching others, and learn from feedback. I found that I am constantly learning more about giving presentations and that as I learn more, my style changes (and hopefully improves). And while people may look at my presentations and be in awe, I am in awe of many of the presenters that I see.

At some point, we all have to give a presentation, whether it is to staff on a project proposal, to grant funding agencies on why our project is the most worthy, or to colleagues on what we've accomplished. How we give the presentation, as well as the content, can be very important. It is not just the words, but how we say them.

With that in mind, here are my seven top presentation tips:
  1. Use language that your entire audience will understand. Take out the jargon and the acronyms. If you need to use jargon, explain it.
  2. Tell stories to illustrate your points. Stories are very powerful tools.
  3. If you are using PowerPoint, try to limit the number of slides as well as the number of words per slide. (See the 10-20-30 Rule of PowerPoint below). Larry Lessig, for example, uses PowerPoint masterfully because he understands the minimalist approach to his slides.
  4. Realize that you cannot cover the entire world in 30 or 60 minutes. Craig Valentine suggests that you can thoroughly cover one major point in 10 minutes. If you try to cover too much in too short a period of time, you will lose your audience.
  5. Don't memorize everything you are going to say. Yes, do practice your presentation several times (and out loud) and make notes to remind you of what you intend to say, but a memorized speech can sound memorized rather than natural. By the way, Aaron Schmidt suggests that you spend time learning additional information about your topic, rather than excessively practicing your presentation. That will help you feel confident about the topic and give you additional information for the Q&A.
  6. Make a connection with the audience. Look at them. Smile. Talk to them. Engage them. When you do this, they will give you feedback (visual and oral) that will help you know that you are reaching them and getting your point across.
  7. Be comfortable. If you aren't comfortable, you may not be in the right mood to get your point across. For me, this means double-checking what I have on and make sure I look fine (no food on my jacket!), as well as putting on lotion and lip balm. You may laugh, but it works for me!
If you have tips that you would like to share, please leave them as a comment.

Additional Resources:


Technorati tags: , ,

Saturday, June 21, 2008

Blog post: Libel Suit over Digitized Article Dismissed

Quoting American Libraries (6/13/2008):
A federal judge has dismissed a $1-million lawsuit filed by a Cornell University alumnus who claimed that the school libeled him in a 1983 Cornell Chronicle article reporting that he had been charged with third-degree burglary when he was a student. Back issues of the Chronicle, a newspaper published by the university’s press office, are being digitized by the campus library.
Marry Minow wrote in her blog post:
Disclosure of private facts claim was dismissed since the item was newsworthy.
As she notes, this is an important issue, since so older news is being digitized and will likely surface news items that some people would rather have forgotten.


Technorati tags: ,

Tuesday, January 29, 2008

The right to be left alone

Greta Garbo is famous for saying "I want to be alone."1

The right to be left alone is the right of privacy. We have the right to keep our private lives private. This is now referred to as the Vegas rule.2 However, sometimes we reveal parts of our private lives, which is our right.3 This right does end generally when we die.4 This becomes important to us with some digitization programs. For example, if you are digitizing burial records, it is important to know that technically nothing on the record is private. Some people may want to redact (or black out) the cause of death, since it may reveal information that the family doesn't want shared. Oh, your father died of that?!

I tell people that even though privacy ends at death that they may want to use some common sense in deciding what to digitize. For example, if you were digitizing information from a family and in those papers there was evidence of abuse, you may decide to not make public that information. It could be that you do not want to bring a spotlight to that part of a family's private history or that you are concerned about the spotlight that will be shown on your project. Some people feel that this is being a censor and we -- especially librarians -- have a hard time with that.

Do programs find themselves not digitizing materials of deceased people due to a concern about privacy? I would suspect that the answer is "yes." I would also suspect that it doesn't happen very often and that when it does, the course of action is clear.

By the way, this topic came to me as I watched ABC This Week on Sunday morning. Each week, they do a brief segment on those who have died, and include photos and sometimes quotes. The quote used for Heath Ledger came from his most famous movie5 and was:
"Why don't you just let me be huh?"
Sadly, after his untimely death, he is not being "let be." Because of his fame, he hadn't had a truly private life in years and will not even in death.


1 Although reportedly what she really said was "I want to be let alone."
2 What happens in Vegas, stays in Vegas. Or more correctly, "What happens here, stays here."
3 With Vegas' new ad campaign, this will soon be known as "Your Vegas is showing." Although it seems that people don't like this slogan.
4 In the U.S., the right of privacy is governed by laws at the state level.
5 If you listen to the media, you might think that he had done very little before playing a cowboy in the 2005 tragic western.



Technorati tag:

Tuesday, January 23, 2007

Privacy & Publicity

In October, I posted two articles (here & here) that I had written for WNYLRC Watch on copyright. This article below was just published in the Jan./Feb. 2007 issue of WNYLRC Watch and compliments the other two articles.



The September/October and November/December issues of WNYRLC Watch contained articles about copyright and copyright clearance in regards to a digitization program. This article is focused on two remaining concerns that are frequently overlooked: privacy and publicity. While copyright gives the creator the right to reproduce the work, prepare derivatives, distribute copies, perform the work publicly and as well as display the work publicly, it is the rights of privacy and publicity that force us to stop and consider our moral responsibilities.

Both privacy and publicity are protected by state, common or statutory law. In a broader sense, the roots of the right of privacy are found in the U.S. Constitution, which has been interpreted to give us the “right to be left alone.” There are four types of invasion of privacy: intrusion, appropriation of name or likeness, unreasonable publicity and false light. In understanding whether you are violating someone's right to privacy, you might ask questions such as: Does the matter cast a false light on the person? Are you intruding on an aspect of the person that they wanted to be truly private? How would you feel if this information was disclosed about you? Generally the right of privacy ends with the death of the individual; however, you may decide – based on the content of the materials you are digitizing – to extend the right of privacy beyond death in deference to the family.

The right of publicity “prevents the unauthorized commercial use of an individual's name, likeness, or other recognizable aspects of one's persona. It gives an individual the exclusive right to license the use of their identity for commercial promotion.” (Right Of Publicity: An Overview, Cornell Univ.) The right of publicity can extend beyond a person's death and be controlled by his/her estate. We encounter the right of publicity generally with famous individuals, both dead and alive.

With both the rights of publicity and privacy, common sense will be you best guide in understanding if you are in violation. Likely you have already been educated by news story of various litigations involving these rights. Remember those stories as you make your decisions. If you would like a second opinion, contact your organization's legal counsel for advice.

In conclusion, when deciding if materials can be digitized, you must consider rights related to copyright, privacy and publicity. Keep in mind that doing copyright clearance, which can be resource-consuming, is only one of the huddles. By clearing all three, you will be assured of your right to digitize the materials.

Resources:

  1. WNYLRC Watch, Sept/Oct 2006, contained a brief overview of copyright law, www.wnylrc.org/PUB/OnLineNews/2006/Sept_Oct.pdf
  2. WNYLRC Watch, Nov/Dec 2006,) contained an article on the copyright clearance process, www.wnylrc.org/PUB/OnLineNews/2006/Nov_Dec.pdf
  3. Right Of Privacy: An Overview, www.law.cornell.edu/wex/index.php/Privacy
  4. Right Of Publicity: An Overview, www.law.cornell.edu/wex/index.php/Publicity
  5. Right of Publicity, www.publaw.com/rightpriv.html



Technorati tag: , ,