Beruflich Dokumente
Kultur Dokumente
12/12/2017
LIS 520
Final Project
Tucson Pima Public Library: Ensuring Privacy and Ethical Treatment to Patrons
Introduction
The Pima County Public Library Mission Branch is an organization with a focus on
serving the Tucson community. As a public library, it offers various resources to all people, free
of any costs. A major staple of the library is the duty to provide services to all, regardless of race,
age, gender or socioeconomic status. This duty raises a variety of questions regarding the best
ethical practices to maintain the library’s integrity. This project aims to examine different
privacy scenarios and regulations regarding personal information, the rights of minors, as well as
how information is accessed and stored. Given that libraries today offer many different electronic
services such as computer access and e-books, a crucial goal of this paper is to understand how
privacy is protected in the digital age. In addition to discussing how privacy is handled within the
library, it is also important to examine other practices regarding various occurrences related to
privacy and security. In what ways does the library provide quality services to all while
Description
In an interview with Lauren Hebert, the Young Adult Services Librarian at the Mission
Branch, various topics surrounding privacy and information were discussed at length. Since
privacy is a word that is often redefined, this paper will incorporate the American Library
Association (ALA) definition of privacy. Privacy is defined by the ALA as “the right to open
inquiry without having the subject of one’s interest examined or scrutinized by others.” Given
this definition, in order to understand the ethical code of the Mission Branch library, a few
questions were asked regarding how privacy is maintained in various situations. When asked
about the types of information collected, Hebert gave a list of the standard information collected
by staff. Patron names, addresses, birthdates, mail items, and email addresses are collected by
staff. No information such as social security numbers or credit card numbers are collected by
patrons., and the only information collected is used to help notify patrons of due dates. Few staff
members are allowed access to the information that is provided by patrons. Since only select
staff would have access to this information, there are certain requirements that must be met by
staff. Requirements include that collectors of this information must be permanent staff and those
allowed access must first complete a number of privacy and security training sessions to handle
such information.
Along with personal information protected by staff, the library also serves to ensure that
patron reading materials are kept private, be it the wish of the patron. An interesting feature of
this library is the use of the Bibliocommons page. Through Bibliocommons, patrons can look at
a wide range of entertainment offered at the library and also review and rate each book, DVD or
CD. This type of web content is where privacy questions may come into play in terms of ethics.
Topics such as privacy questions are interesting because people can share the books they read
and this information is only attached to a patron’s username. However, patrons may choose to
make their book lists and reviews public, yet they are defaulted to private. People can access,
rate and review anything they wish at the library, however that it impossible to know unless they
The issue of privacy also lends itself to complications when law enforcement becomes
involved in the conversation. An interesting privacy rule that the library abides by relates to the
location of all patrons. For example, if law enforcement calls the library asking for information
about an individual, the individual’s privacy will be protected by the staff. In essence, libraries
cannot reveal the exact location of a patron, they may invite law enforcement to search the
premises. With the exception of a court order, the library will not give away information. A
similar case in terms of minors and parents requires that the minor’s privacy be held safe. If a
parent decides to call regarding the whereabouts of the child, the library may ask for a
description of the person and tell the person to call their parents. Underage patrons may also
provide information on their own, and can be issued a limited card good for two checkouts at a
time. Hebert states that the staff wants to give children a chance to have as much freedom as they
could have at the library. Children do not typically have agency or choice about their life, and
In terms of enforcing the rules and ensuring people have privacy and access to
information, the library staff usually handles situations on their own without involving law
enforcement. Some issues are settled instantly and librarians search for quick solutions. The
librarians at the Mission Branch are able to assess issues on their own and handle them carefully
while respecting every right to privacy. In certain cases, suspensions occur which result in
One example briefly discussed during the interview dealt with pornography at the library;
the patron can be removed from the area, or be given a privacy barrier to ensure that nobody else
would be able to view the content. Another interesting topic important to privacy is the use of
website history. Website history is not tracked at the Mission Branch library. In fact after the
Patriot Act, the library ensured that when a patron checks in a book, that the record is deleted. In
addition, records are deleted upon return of materials and self-checkout is also available to
protect the privacy of patrons. When a computer session ends, all of the information is deleted
from the computer. The effects of the Patriot Act were also discussed as we delved into how a
user could have their privacy threatened at any time. After the Patriot Act was set in place,
librarians found it difficult to maintain their ethical grounding and people lost their jobs for
giving information to law enforcement. One of the crucial principles of library ethics is keeping
Evaluation
Two of the most prominent ethical theories related to the day-to-day operations of the
Mission Branch library were the Ethics of Care, and Consequentialism theories. Based on the
library’s ethical standards and operations, ethics of care and consequentialist theories .The Ethics
of Care theory is essentially built on the foundations of respect and empathy for people. This
respect and empathy leads librarians and staff set various goals that will help all of their patrons
deals with the outcomes involved in taking action, whether they be good or bad. If an action
yields negative consequences, it is considered bad, however if the action yields positive
consequences the action is good. In the case of the Mission Library, providing children with a
chance to have freedom in what they choose to check out at the library. The staff empathizes
with each child, and makes a point to use a dewey decimal and self-checkout system for
the library setting. In Claudia Close’s Introduction to the Ethic of Care, we are given four
components of care. The first being that attention must be given to people. Second, there must be
a focus on the needs versus the interests of patrons. Third, it is necessary to have a commitment
to speaking vocally about issues and communicating effectively with people to reach an
various degrees, the mission Branch library shows a dedication to uphold privacy of all of their
patrons. The library does not merely enforce rules, it acts as a mediator to ensure specific content
can still be viewed so long as the parties wish to view it. If a patron is hurt or in need of help, the
staff have various procedures in place to assist the person. When thinking of library ethics in
what happens in a library. If a patron is creating a disturbance, the library will first try to work
something out before dismissing the patron, which will depend on the consequences of the
actions. However, if nobody is in danger or if no consequence brought any harm, the library may
A few works regarding internet security discuss the Tor web browser which holds many
benefits for library users. The Tor browser was essentially created to make all users anonymous.
In Kelley Misata’s The Tor Project: An Inside View, the reason behind the creation of the
browser lies within the importance of anonymity “privacy is vital, and being anonymous in web
interactions holds a necessary place in daily life. The user group depends on the thousands of
volunteers across the world who run the relays. The relay operators oversee a continuous stream
of internet traffic daily (Misata, 2013). In Anonymously Browse, Post Through Tor to Protect
Your Privacy Bhargav goes into detail to explain how the browser is able to mask the daily users
“if you browse the internet through a Tor client, then your traffic is routed through these relays,
after being encrypted multiple times. At each relay, the data is decrypted one layer at a time,
passing the remaining encrypted data to the next relay, and the final relay in the chain sends it to
the desired server” (Bhargav, 2013). Although the library does not currently use the Tor browser,
it is capable of completely wiping web history after each session. Users are not anonymous such
as those using the Tor browser, however, it makes it more difficult for other patrons to see what
Proposal
The Mission Branch library strives to provide quality services to people and wishes to
make minors feel more secure and independent. In terms of privacy, staff is well trained on how
to handle personal information as well. However, as an ethical proposal, I would like to suggest
something similar to the Tor browser as it keeps users anonymous while at the library. Although
the computers at the library currently wipe the data from a user session, the added stitch of
security might help users feel more comfortable or secure in their research or computer use.
References
Ardia, D. S., & Klinefelter, A. (2015). PRIVACY AND COURT RECORDS: AN EMPIRICAL
STUDY. Berkeley Technology Law Journal, 30(3), 1807-1897.
Discusses court records in libraries, courts and archives. The article references how each
of these organizations are shifting toward making these court records public, and issues
surrounding the fact. Empirical data representing personal information in court records are also
analyzed throughout the reading.
Ayala, D. (2017). Security and Privacy for Libraries in 2017. Online Searcher, 41(3), 48-52.
Article mainly focuses on what happens to information once it is sent over the internet.
This leaves patrons wondering how they can protect their personal information at a library, as
well as if it can be seen or who it can be seen by in a given scenario. The article also explains
the steps libraries can take to keep information secure. Explanations regarding safety from
hackers is also discussed in the reading.
Bélanger, F., & Crossler, R. (2011). Privacy in the Digital Age: A Review of Information
Privacy Research in Information Systems. MIS Quarterly, 35(4), 1017-1041.
This article takes a look at current privacy settings in the modern world. Research
explains what data patrons feel they should have control over when entering their own
information. Technical solutions to issues are explained in detail, as well as what types of
research have currently been conducted so far. This article is also a source for information
regarding various privacy concerns online.
Bhargav, R (2013). "Anonymously Browse, Post Through Tor to Protect Your Privacy." Money
Life, General OneFile. Retrieved Nov. 15, 2016
A look at how the Tor browser operates. The specific functions and features of the web
browser are highlighted throughout the article.
Bayle, E., Compoe, S., Ehrick, R., Hubbell, D., Lowe, B., & Ridge, J. (2017). Patron Privacy: Is
The Tor Browser Right for Library Use?. Computers In Libraries, 37(6),
10-13.
Examines the TOR browser with regards to library use. Discusses the different benefits of
using TOR as well as the potential problems with the browser as well. The article explains that
the TOR browser is essentially free and does not allow people to view your internet connection.
On paper, the TOR browser may potentially protect patrons’ privacy while at the library.
Childs, L. (2017). To Uphold and Resist: Protecting Intellectual Freedom through Progressive
Librarianship. Serials Librarian, 73(1), 58-67.
This article examines public librarianship with regards to ethics surrounding the
intellectual freedom of library patrons. More specifically, how the connection between patrons
and accessing information online leads to censorship and surveillance risks. A major focus of
this article pertains to combatting surveillance and censorship while maintaining the intellectual
freedom of patrons.
Dixon, P. (2008). Ethical Issues Implicit in Library Authentication and Access Management:
Risks and Best Practices. Journal Of Library Administration, 47(3-4), 141-162.
Authentication and access management systems in libraries are now shifting to a digital
format. This transition has left questions regarding the types of ethical issues involved in the new
processes. Patron related data is involved in various authentication data and this article examines
the security and privacy risks associated with such data. Best practices and ethical guidance are
discussed throughout the reading.
Knox, E. M. (2017). Opposing Censorship in Difficult Times. Library Quarterly, 87(3), 268-276.
Topics regarding censorship as well as various materials that patrons can legally access.
How libraries and information organizations can oppose censorship and abide by ethics during
times in which people request censorship. Also takes a look at different case studies regarding
censorship as well as online privacy issues, specifically with mobile phones.
Mars, P. (2017). ALA Precedent in Defense of Personal Privacy and Privacy Activism of 21st
Century Information Professionals. Serials Librarian, 73(1), 54-57.
This article discusses information privacy related to digital devices such as smart phones
and other electronics. The article leads into security risks while using apps, social media and
other ways information is entered online while looking at the right to privacy and other legalities.
A specific case takes a look at iPhones and privacy issues.
Misata, K. (2013). "The Tor Project: An Inside View." XRDS: Crossroads, 20(1), 45-47.
An inside look at the benefits of the TOR web browser designed for anonymity. Article
gives an unbiased look at the pros and cons. Anonymity is the high point, understanding that it is
important for library users to be safe.
Ethics regarding privacy as well as how privacy is protected throughout time. Article
takes a look at the different rules and procedures surrounding how privacy is ensured for patrons,
as well as what ethical issues come into play while monitoring privacy.