Sie sind auf Seite 1von 10

Christopher Rodriguez

12/12/2017
LIS 520
Final Project

Tucson Pima Public Library: Ensuring Privacy and Ethical Treatment to Patrons

Introduction

The Pima County Public Library Mission Branch is an organization with a focus on

serving the Tucson community. As a public library, it offers various resources to all people, free

of any costs. A major staple of the library is the duty to provide services to all, regardless of race,

age, gender or socioeconomic status. This duty raises a variety of questions regarding the best

ethical practices to maintain the library’s integrity. This project aims to examine different

privacy scenarios and regulations regarding personal information, the rights of minors, as well as

how information is accessed and stored. Given that libraries today offer many different electronic

services such as computer access and e-books, a crucial goal of this paper is to understand how

privacy is protected in the digital age. In addition to discussing how privacy is handled within the

library, it is also important to examine other practices regarding various occurrences related to

privacy and security. In what ways does the library provide quality services to all while

maintaining their ethical integrity?

Description

In an interview with Lauren Hebert, the Young Adult Services Librarian at the Mission

Branch, various topics surrounding privacy and information were discussed at length. Since
privacy is a word that is often redefined, this paper will incorporate the American Library

Association (ALA) definition of privacy. Privacy is defined by the ALA as “the right to open

inquiry without having the subject of one’s interest examined or scrutinized by others.” Given

this definition, in order to understand the ethical code of the Mission Branch library, a few

questions were asked regarding how privacy is maintained in various situations. When asked

about the types of information collected, Hebert gave a list of the standard information collected

by staff. Patron names, addresses, birthdates, mail items, and email addresses are collected by

staff. No information such as social security numbers or credit card numbers are collected by

patrons., and the only information collected is used to help notify patrons of due dates. Few staff

members are allowed access to the information that is provided by patrons. Since only select

staff would have access to this information, there are certain requirements that must be met by

staff. Requirements include that collectors of this information must be permanent staff and those

allowed access must first complete a number of privacy and security training sessions to handle

such information.

Along with personal information protected by staff, the library also serves to ensure that

patron reading materials are kept private, be it the wish of the patron. An interesting feature of

this library is the use of the Bibliocommons page. Through Bibliocommons, patrons can look at

a wide range of entertainment offered at the library and also review and rate each book, DVD or

CD. This type of web content is where privacy questions may come into play in terms of ethics.

Topics such as privacy questions are interesting because people can share the books they read

and this information is only attached to a patron’s username. However, patrons may choose to

make their book lists and reviews public, yet they are defaulted to private. People can access,
rate and review anything they wish at the library, however that it impossible to know unless they

make that information public to other users.

The issue of privacy also lends itself to complications when law enforcement becomes

involved in the conversation. An interesting privacy rule that the library abides by relates to the

location of all patrons. For example, if law enforcement calls the library asking for information

about an individual, the individual’s privacy will be protected by the staff. In essence, libraries

cannot reveal the exact location of a patron, they may invite law enforcement to search the

premises. With the exception of a court order, the library will not give away information. A

similar case in terms of minors and parents requires that the minor’s privacy be held safe. If a

parent decides to call regarding the whereabouts of the child, the library may ask for a

description of the person and tell the person to call their parents. Underage patrons may also

provide information on their own, and can be issued a limited card good for two checkouts at a

time. Hebert states that the staff wants to give children a chance to have as much freedom as they

could have at the library. Children do not typically have agency or choice about their life, and

are not asked or expected to carry identification.

In terms of enforcing the rules and ensuring people have privacy and access to

information, the library staff usually handles situations on their own without involving law

enforcement. Some issues are settled instantly and librarians search for quick solutions. The

librarians at the Mission Branch are able to assess issues on their own and handle them carefully

while respecting every right to privacy. In certain cases, suspensions occur which result in

ending computer sessions, or relocating a patron to a new area.

One example briefly discussed during the interview dealt with pornography at the library;

the patron can be removed from the area, or be given a privacy barrier to ensure that nobody else
would be able to view the content. Another interesting topic important to privacy is the use of

website history. Website history is not tracked at the Mission Branch library. In fact after the

Patriot Act, the library ensured that when a patron checks in a book, that the record is deleted. In

addition, records are deleted upon return of materials and self-checkout is also available to

protect the privacy of patrons. When a computer session ends, all of the information is deleted

from the computer. The effects of the Patriot Act were also discussed as we delved into how a

user could have their privacy threatened at any time. After the Patriot Act was set in place,

librarians found it difficult to maintain their ethical grounding and people lost their jobs for

giving information to law enforcement. One of the crucial principles of library ethics is keeping

privacy safe by determining a line or space, developing empathy for people.

Evaluation
Two of the most prominent ethical theories related to the day-to-day operations of the

Mission Branch library were the Ethics of Care, and Consequentialism theories. Based on the

library’s ethical standards and operations, ethics of care and consequentialist theories .The Ethics

of Care theory is essentially built on the foundations of respect and empathy for people. This

respect and empathy leads librarians and staff set various goals that will help all of their patrons

Evidence of Consequentialism is also found in the library’s ethical standards. Consequentialism

deals with the outcomes involved in taking action, whether they be good or bad. If an action

yields negative consequences, it is considered bad, however if the action yields positive

consequences the action is good. In the case of the Mission Library, providing children with a

chance to have freedom in what they choose to check out at the library. The staff empathizes

with each child, and makes a point to use a dewey decimal and self-checkout system for

adolescents that may need to rent sensitive or personal material.


As a basis of comparison, it is important to also take a look at what care truly means in

the library setting. In Claudia Close’s Introduction to the Ethic of Care, we are given four

components of care. The first being that attention must be given to people. Second, there must be

a focus on the needs versus the interests of patrons. Third, it is necessary to have a commitment

to speaking vocally about issues and communicating effectively with people to reach an

agreement. Last, care is not a system of principle instead it is a mode of responsiveneness. To

various degrees, the mission Branch library shows a dedication to uphold privacy of all of their

patrons. The library does not merely enforce rules, it acts as a mediator to ensure specific content

can still be viewed so long as the parties wish to view it. If a patron is hurt or in need of help, the

staff have various procedures in place to assist the person. When thinking of library ethics in

terms of consequentialism, the Mission Branch displays a consequentialist style by evaluating

what happens in a library. If a patron is creating a disturbance, the library will first try to work

something out before dismissing the patron, which will depend on the consequences of the

actions. However, if nobody is in danger or if no consequence brought any harm, the library may

relocate the patron or find an alternative.

A few works regarding internet security discuss the Tor web browser which holds many

benefits for library users. The Tor browser was essentially created to make all users anonymous.

In Kelley Misata’s The Tor Project: An Inside View, the reason behind the creation of the

browser lies within the importance of anonymity “privacy is vital, and being anonymous in web

interactions holds a necessary place in daily life. The user group depends on the thousands of

volunteers across the world who run the relays. The relay operators oversee a continuous stream

of internet traffic daily (Misata, 2013). In Anonymously Browse, Post Through Tor to Protect

Your Privacy Bhargav goes into detail to explain how the browser is able to mask the daily users
“if you browse the internet through a Tor client, then your traffic is routed through these relays,

after being encrypted multiple times. At each relay, the data is decrypted one layer at a time,

passing the remaining encrypted data to the next relay, and the final relay in the chain sends it to

the desired server” (Bhargav, 2013). Although the library does not currently use the Tor browser,

it is capable of completely wiping web history after each session. Users are not anonymous such

as those using the Tor browser, however, it makes it more difficult for other patrons to see what

was viewed before them.

Proposal

The Mission Branch library strives to provide quality services to people and wishes to

make minors feel more secure and independent. In terms of privacy, staff is well trained on how

to handle personal information as well. However, as an ethical proposal, I would like to suggest

something similar to the Tor browser as it keeps users anonymous while at the library. Although

the computers at the library currently wipe the data from a user session, the added stitch of

security might help users feel more comfortable or secure in their research or computer use.
References

Ardia, D. S., & Klinefelter, A. (2015). PRIVACY AND COURT RECORDS: AN EMPIRICAL
STUDY. Berkeley Technology Law Journal, 30(3), 1807-1897.

Discusses court records in libraries, courts and archives. The article references how each
of these organizations are shifting toward making these court records public, and issues
surrounding the fact. Empirical data representing personal information in court records are also
analyzed throughout the reading.

Ayala, D. (2017). Security and Privacy for Libraries in 2017. Online Searcher, 41(3), 48-52.
Article mainly focuses on what happens to information once it is sent over the internet.
This leaves patrons wondering how they can protect their personal information at a library, as
well as if it can be seen or who it can be seen by in a given scenario. The article also explains
the steps libraries can take to keep information secure. Explanations regarding safety from
hackers is also discussed in the reading.

Bélanger, F., & Crossler, R. (2011). Privacy in the Digital Age: A Review of Information
Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017-1041.

This article takes a look at current privacy settings in the modern world. Research
explains what data patrons feel they should have control over when entering their own
information. Technical solutions to issues are explained in detail, as well as what types of
research have currently been conducted so far. This article is also a source for information
regarding various privacy concerns online.

Bhargav, R (2013). "Anonymously Browse, Post Through Tor to Protect Your Privacy." Money
Life, General OneFile. Retrieved Nov. 15, 2016

A look at how the Tor browser operates. The specific functions and features of the web
browser are highlighted throughout the article.
Bayle, E., Compoe, S., Ehrick, R., Hubbell, D., Lowe, B., & Ridge, J. (2017). Patron Privacy: Is
The Tor Browser Right for Library Use?. Computers In Libraries, 37(6),
10-13.

Examines the TOR browser with regards to library use. Discusses the different benefits of
using TOR as well as the potential problems with the browser as well. The article explains that
the TOR browser is essentially free and does not allow people to view your internet connection.
On paper, the TOR browser may potentially protect patrons’ privacy while at the library.

Childs, L. (2017). To Uphold and Resist: Protecting Intellectual Freedom through Progressive
Librarianship. Serials Librarian, 73(1), 58-67.

This article examines public librarianship with regards to ethics surrounding the
intellectual freedom of library patrons. More specifically, how the connection between patrons
and accessing information online leads to censorship and surveillance risks. A major focus of
this article pertains to combatting surveillance and censorship while maintaining the intellectual
freedom of patrons.

Dixon, P. (2008). Ethical Issues Implicit in Library Authentication and Access Management:
Risks and Best Practices. Journal Of Library Administration, 47(3-4), 141-162.

Authentication and access management systems in libraries are now shifting to a digital
format. This transition has left questions regarding the types of ethical issues involved in the new
processes. Patron related data is involved in various authentication data and this article examines
the security and privacy risks associated with such data. Best practices and ethical guidance are
discussed throughout the reading.

Knox, E. M. (2017). Opposing Censorship in Difficult Times. Library Quarterly, 87(3), 268-276.
Topics regarding censorship as well as various materials that patrons can legally access.
How libraries and information organizations can oppose censorship and abide by ethics during
times in which people request censorship. Also takes a look at different case studies regarding
censorship as well as online privacy issues, specifically with mobile phones.
Mars, P. (2017). ALA Precedent in Defense of Personal Privacy and Privacy Activism of 21st
Century Information Professionals. Serials Librarian, 73(1), 54-57.

This article discusses information privacy related to digital devices such as smart phones
and other electronics. The article leads into security risks while using apps, social media and
other ways information is entered online while looking at the right to privacy and other legalities.
A specific case takes a look at iPhones and privacy issues.

Misata, K. (2013). "The Tor Project: An Inside View." XRDS: Crossroads, 20(1), 45-47.

An inside look at the benefits of the TOR web browser designed for anonymity. Article
gives an unbiased look at the pros and cons. Anonymity is the high point, understanding that it is
important for library users to be safe.

West, J. (2015). Security in a Sharing Profession. Computers In Libraries, 35(5), 25-26.

Information regarding to hacker motivation, password sharing, and storage of local


information. This brief reading provides a few examples of issues that could arise in a library
setting, as well as what precautions need to be taken to ensure privacy.

West, J. (2017). Monitoring Privacy as the Environment Changes. Computers In Libraries,


37(4), 12-13.

Ethics regarding privacy as well as how privacy is protected throughout time. Article
takes a look at the different rules and procedures surrounding how privacy is ensured for patrons,
as well as what ethical issues come into play while monitoring privacy.

Das könnte Ihnen auch gefallen