, to see if you have full access to this publication.
Book Titles No access

Information Privacy Fundamentals for Librarians and Information Professionals

Authors:
Publisher:
 2014

Summary

As more information is collected, shared, and mined, the need to understand and manage information privacy has become a necessity for information professionals. Governments across the globe have enacted information privacy laws. These laws continue to evolve and the information privacy protections that have been established differ by country. A basic understanding of privacy law, information privacy approaches, and information security controls is essential for information professionals to properly manage private/personally identifiable information (PII) in differing capacities in libraries, academic institutions, corporations, hospitals, and state and federal agencies.

Understanding and knowledge of applicable privacy laws and the ability to write privacy policies and procedures for the proper handling of PII are crucial skills for librarians and other information managers.

Information Privacy Fundamentals for Librarians and Information Professionals is tailored to the needs of librarians and information professionals. It introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.



Bibliographic data

Copyright year
2014
ISBN-Print
978-1-4422-2881-8
ISBN-Online
978-1-4422-2882-5
Publisher
Rowman & Littlefield, Lanham
Language
English
Pages
129
Product type
Book Titles

Table of contents

ChapterPages
    1. Table of Contents No access
    2. Acknowledgments No access
    3. Preface No access
        1. Privacy and the U.S. Bill of Rights No access
        2. The “Right to Privacy” Is Recognized No access
      1. State Recognition of Privacy No access
        1. Personal Data No access
        2. Data Protection No access
        3. Personally Identifiable Information No access
        4. Sensitive Personal Data No access
        5. Privacy Policy No access
        6. Privacy Notice No access
    1. The Development of Privacy Rights Globally No access
    2. Technology Spurs the Creation of Fair Information Practice Principles No access
    3. Protecting Information Privacy No access
      1. Federal Privacy Laws No access
      2. State Privacy Laws No access
      1. Privacy Literacy No access
      2. Information Privacy in Libraries No access
      3. Applying Information Privacy Knowledge No access
    4. Notes No access
    5. Bibliography No access
    1. Protecting Privacy in Information Environments No access
      1. The Right to Receive Information in Libraries No access
    2. Intellectual Privacy No access
    3. Reader Privacy No access
      1. Library Associations No access
      2. Archivists Associations No access
      3. Medical Informatics and Health Information Management Associations No access
    4. Conclusion No access
    5. Notes No access
    6. Bibliography No access
    1. Introduction No access
      1. Trade and Marketing: The Federal Trade Commission No access
      2. Commerce, Trade, and Business Development:The U.S. Department of Commerce No access
      3. Finance: The Consumer Financial Protection Bureau, Federal Reserve Board, and Comptroller of Currency No access
      4. Educational Records: The U.S. Department of Education No access
      5. Privacy in the Workplace: Equal Employment Opportunity Commission No access
    2. Approaches to the Enforcement of Privacy Rights No access
    3. State Attorneys General and State Privacy Laws No access
    4. Self-Regulation No access
      1. Marketing and Telecommunications: TCPA, Do Not Call, CAN-SPAM No access
      2. Protecting Children and Teens Online—COPPA No access
      3. Education Records: Family Educational Rights and Privacy Act (FERPA) and the Protection of Pupil Rights Amendment (PPRA) No access
      4. Financial Records: Gramm-Leach-Bliley Act, Fair Credit Reporting Act No access
      5. Health Information: HIPAA, HITECH, and GINA No access
        1. The Privacy Act of 1974 No access
        2. The Freedom of Information Act No access
        3. FISA, the PATRIOT Act, and NSLs: Terrorism Investigations That Impact Privacy and Protections No access
    5. Costs Associated with Information Breach No access
    6. Conclusion No access
    7. Notes No access
    8. Bibliography No access
    1. Digital Literacy No access
    2. Information Literacy No access
      1. Patrons No access
      2. Youth No access
      3. Employees No access
      1. Cookies and Web Beacons No access
      2. Internet Protocol (IP) Addresses No access
      3. Data Mining No access
      4. Search Logs and Email Scanning No access
      5. Social Media Posts No access
      6. Online Gaming No access
      1. Phishing and Passwords No access
      2. Public Wi-Fi Hotspots No access
      3. Spying and Webcam Safety No access
      4. Adjusting Browser Privacy and Security Settings No access
    3. Mobile Devices and Information Privacy No access
    4. Keep Abreast of Changes No access
    5. The Promise of Safer Web Surfing No access
    6. Conclusion No access
    7. Notes No access
    8. Bibliography No access
    1. Greater Anonymity No access
    2. Protecting Privacy and Confidentiality on the Front Lines No access
    3. Patron Awareness No access
    4. The USA PATRIOT Act No access
      1. Data Collection No access
      2. Observability No access
    5. RFID Systems in Libraries No access
    6. Learning from Privacy Practices of Small and Medium-Sized Businesses No access
    7. The Role of Privacy Professionals No access
    8. Locating and Examining Privacy Laws No access
    9. Dedicating Time for Privacy Review and Training No access
    10. Conclusion No access
    11. Notes No access
    12. Bibliography No access
      1. Start with the Law No access
        1. Perform a Privacy Audit or Assessment No access
        1. Collecting and Sharing Information: Cookie Use and Third Parties No access
        2. Contact Information No access
      2. Plain Language No access
      3. Visual Cues No access
      4. Layered Policies (Also Known as Layered Notices) No access
      5. Prominently Display Your Privacy Policy and Opt-Out Choice No access
      6. Contract for the Same Level of Privacy No access
      7. Review Good Examples of Privacy Policies No access
      8. Get Key Employees and Executives Involved No access
      9. Review, Approval, and Implementation No access
      1. Support and Strategic Planning No access
      2. Training and Awareness No access
      3. Privacy Policies, Procedures, Checklists No access
      4. Creating a Privacy Team No access
      5. Challenges No access
      6. Communication No access
      7. Incident Reporting and Response No access
      8. Data Breach No access
      1. Language and Presentation Options No access
        1. Data Flows and Retention No access
        2. Data Collection, Use, and Third Parties No access
        1. Considerations for Special Populations No access
      2. ALA Guidance for Libraries No access
    1. Conclusion No access
    2. Notes No access
    3. Bibliography No access
    1. Fair Information Principles No access
    2. The Organization for Economic Co-operation and Development’s Guidelines No access
    3. Fair Information Practice Principles (USA) No access
      1. U.S.-EU Safe Harbor Program No access
      2. Binding Corporate Rules and Model Contracts No access
    4. APEC Privacy Framework No access
      1. Two Federal Laws No access
      2. PIPEDA Privacy Principles No access
    5. Conclusion No access
    6. Notes No access
    7. Bibliography No access
  1. Glossary No access Pages 113 - 120
  2. Index No access Pages 121 - 128
  3. About the Author No access Pages 129 - 129

Similar publications

from the topics "Linguistics"
Cover of book: Lessing Yearbook/Jahrbuch LII, 2025
Edited Book No access
Carl Niekerk, Thomas Martinec
Lessing Yearbook/Jahrbuch LII, 2025
Cover of book: Postcolonial Studies
Educational Book No access
Dirk Uffelmann, Paweł Zajas
Postcolonial Studies
Cover of book: Sprache – Rhythmus – Übersetzen
Edited Book No access
Marco Agnetta, Vera Viehöver, Nathalie Mälzer
Sprache – Rhythmus – Übersetzen
Cover of book: Linguistik im Nordwesten
Edited Book Full access
Katharina S. Schuhmann, Tio Rohloff, Thomas Stolz
Linguistik im Nordwesten