NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Coombs, Karen A. – Computers in Libraries, 2005
In this article, the author discusses how she and the other librarians at State University of New York (SUNY) Cortland learned to "scrub" their records so that patrons remained protected, but the librarians still had access to useful statistics. The topic of library privacy regulations is complex. There is a host of legislation at both…
Descriptors: Electronic Libraries, Librarians, Library Services, Privacy
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Brandt, D. Scott – Computers in Libraries, 1998
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
Descriptors: Access to Information, Computer Security, Computer Software, Glossaries
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail