Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Privacy | 13 |
Internet | 8 |
Library Services | 7 |
Access to Information | 5 |
Computer Security | 4 |
Librarians | 4 |
Library Policy | 4 |
Public Libraries | 4 |
Users (Information) | 4 |
Electronic Libraries | 3 |
Policy Formation | 3 |
More ▼ |
Source
Computers in Libraries | 13 |
Author
Balas, Janet L. | 2 |
Bernstein, Joan E. | 1 |
Brandt, D. Scott | 1 |
Breeding, Marshall | 1 |
Coombs, Karen A. | 1 |
Guenther, Kim | 1 |
Harris, Lesley Ellen | 1 |
Hastings, Robin | 1 |
Huang, Phil | 1 |
Ostrowsky, Ben | 1 |
Reutty, Michele | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 13 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Media Staff | 2 |
Location
New Jersey | 2 |
United States | 2 |
Canada | 1 |
Missouri | 1 |
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hastings, Robin – Computers in Libraries, 2010
In August 2008, the Missouri River Regional Library (MRRL), where the author serves as information technology coordinator, switched over from an internally hosted Microsoft Exchange email server to the Google Apps product. As the person who led the charge to use Google Apps and the person who actually flipped the switch, he was responsible for…
Descriptors: Information Technology, Public Libraries, Privatization, Electronic Mail
Ostrowsky, Ben – Computers in Libraries, 2005
Like the Lone Ranger's mask, a good information retention policy can safeguard personal identity information. Librarians want to be sure that patrons will return what they borrow, and they want statistics that quantify the library's value to its community. Librarians also want to protect customers' privacy; they usually don't keep personally…
Descriptors: Privacy, Library Services
Reutty, Michele – Computers in Libraries, 2007
Michele Reutty was director of the Free Public Library of Hasbrouck Heights for 17 years. Hasbrouck Heights is a mile-square "bedroom community" of New York City that is located in northern New Jersey. In this article, she narrates her experience--one that probably occurs with alarming regularity to professional librarians all over the…
Descriptors: Law Enforcement, Public Libraries, Police, Intellectual Freedom
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Coombs, Karen A. – Computers in Libraries, 2005
In this article, the author discusses how she and the other librarians at State University of New York (SUNY) Cortland learned to "scrub" their records so that patrons remained protected, but the librarians still had access to useful statistics. The topic of library privacy regulations is complex. There is a host of legislation at both…
Descriptors: Electronic Libraries, Librarians, Library Services, Privacy
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Brandt, D. Scott – Computers in Libraries, 1998
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
Descriptors: Access to Information, Computer Security, Computer Software, Glossaries
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail
Walsh, Taylor; And Others – Computers in Libraries, 1992
Edited transcripts of three talks presented at the 1991 Research and Education Networking (R&EN) Conference address municipal information systems, including descriptions of local networks, privacy issues, and future possibilities; networking in Canada, including CA*net, regional networks, and federal activities; and Canadian reactions to…
Descriptors: Access to Information, Community Information Services, Computer Networks, Conferences