Search Results (5)

View
Selected filters:
  • Data Privacy Project
Data Privacy Project: Curriculum
Conditions of Use:
No Strings Attached
Rating

Welcome to the curriculum page for the Data Privacy Project. We are pleased to share a set of learning tools that was created with and for library professionals. The curriculum contains a facilitator’s guide, presentation slides, and handouts, and permits remix and reuse under a Share Alike 4.0 Creative Commons license.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Data Privacy Project: Overview
Conditions of Use:
No Strings Attached
Rating

The goal of our trainings is to learn the building blocks of privacy protection and digital security. Our teachings focus on activities patrons do every day at the library so that library staff can develop capacity.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Historical Overview
Conditions of Use:
No Strings Attached
Rating

In the early 20th century, when the library profession was debating privacy and its relationship to free speech, information about patrons flowed in a relatively simple manner.
A patron communicated information about herself—her interests, beliefs, or values—in the process of borrowing a book. Book borrowing involved the library creating a paper record and storing it the library’s circulation records system.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Mapping Data Flows
Conditions of Use:
No Strings Attached
Rating

This module, part of the Data Privacy Project, shows the data flow that occurs when library patrons use a public computer terminal.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Risk Assessment
Conditions of Use:
No Strings Attached
Rating

Risks vary from person to person. For example, a Visa card data breach impacts anyone who uses these cards, but a person who does not have a credit card will not need to worry about this. Patrons that use social media need to consider their privacy settings on those sites, as well as the terms of service of those companies. Journalists may need to protect who they contact, in addition to the content of their conversations. Depending on your risk, you’ll need different privacy "armor" that's appropriate for your particular situation.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017