Skip to main content

Creating a Library Privacy Policy by Focusing on Patron Interactions

  • Conference paper
  • First Online:
Sustainable Digital Communities (iConference 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12051))

Included in the following conference series:

Abstract

As sensitive transactions continue to move online, public libraries are becoming a critical resource to patrons without access to the internet. This paper shares insights on how library staff negotiate privacy risks when working with patrons handling sensitive and private information. Based on findings from an analysis of library policies on technology use, as well as focus groups and participatory design sessions with library staff from around the United States, we categorize primary risks patrons face when using library computers to complete information tasks requiring submission of sensitive information, as well as how library staff navigate the tensions between their professional values and privacy concerns. We conclude the paper with a discussion of how these findings are informing our development of a framework that library staff can use to navigate privacy risks patrons face.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A privacy audit is often the first step in creating or revising a privacy policy. It evaluates current policies and practices in the library and can reveal strengths and weaknesses of existing policies and library culture.

References

  1. Mobile Technology and Home Broadband 2019. https://www.pewinternet.org/2019/06/13/mobile-technology-and-home-broadband-2019/. Accessed 16 Sept 2019

  2. Altman, I.: The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks/Cole Publishing Co., Monterey (1975)

    Google Scholar 

  3. Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  4. Vitak, J., Liao, Y., Kumar, P., Subramaniam, M.: Librarians as information intermediaries: navigating tensions between being helpful and being liable. In: Chowdhury, G., McLeod, J., Gillet, V., Willett, P. (eds.) iConference 2018. LNCS, vol. 10766, pp. 693–702. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-78105-1_80

    Chapter  Google Scholar 

  5. Privacy Tool Kit. http://www.ala.org/advocacy/privacy/toolkit. Accessed 15 Sept 2019

  6. Library Privacy Guidelines. http://www.ala.org/advocacy/privacy/guidelines. Accessed 07 Sept 2019

  7. Library Privacy Checklists. http://www.ala.org/advocacy/privacy/checklists. Accessed 07 Sept 2019

  8. Pekala, S.: Privacy and user experience in 21st century library discovery. Inf. Technol. Libr. 36(2), 48–58 (2017). https://doi.org/10.6017/ital.v36i2.9817

    Article  Google Scholar 

  9. Houghton, S.: The challenge of balancing customer service with privacy. J. Intell. Freedom Privacy 4(1), 8–9 (2019)

    Google Scholar 

  10. Klinefelter, A.: Privacy and library public services: or, I know what you read last summer. Legal Ref. Serv. Q. 26(1–2), 253–279 (2007). https://doi.org/10.1300/J113v26n01_13

    Article  Google Scholar 

  11. Core Values of Librarianship. http://www.ala.org/advocacy/intfreedom/corevalues. Accessed 07 Sept 2019

  12. Bonsignore, E., et al.: Embedding participatory design into designs for learning: an untapped interdisciplinary resource. In: CSCL 2013 (2013)

    Google Scholar 

  13. Thompson, K.M., Jaeger, P.T., Taylor, N.G., Subramaniam, M., Bertot, J.C.: Digital Literacy and Digital Inclusion: Information Policy and the Public Library. Rowman & Littlefield, Lanham (2014)

    Google Scholar 

  14. Gomez, R., Gould, E.: The “cool factor” of public access to ICT: Users’ perceptions of trust in libraries, telecentres and cybercafés in developing countries. Inf. Technol. People 23, 247–264 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shandra Morehouse .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Morehouse, S., Vitak, J., Subramaniam, M., Liao, Y. (2020). Creating a Library Privacy Policy by Focusing on Patron Interactions. In: Sundqvist, A., Berget, G., Nolin, J., Skjerdingstad, K. (eds) Sustainable Digital Communities. iConference 2020. Lecture Notes in Computer Science(), vol 12051. Springer, Cham. https://doi.org/10.1007/978-3-030-43687-2_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43687-2_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43686-5

  • Online ISBN: 978-3-030-43687-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics