Understanding Privacy, Part One: What Data Is Being Collected and By Whom?


About This Webinar

In our current information ecosystem, respect for user privacy is a key distinguishing characteristic of libraries. Few communities have been as vehement and long-standing in their support of people’s right to intellectual freedom and privacy protections as librarians have been.  There are core elements of library services that are now provided by third parties, providing user services on behalf of the library.  These vendors might not have the same respect for patron privacy as librarians do and in order to ensure consistency in library services, librarians providing access to digital services and content to patrons need a thorough understanding of privacy in a library context.

This two-part webinar series will provide the community with a deeper understanding of the privacy implications of the services they are contracting for. Part one of this series will cover, what types of data is being collected about user behavior.  Understanding what can and is being collected, for what purpose, and with whom these data are shared is a critical first component of being able to exert privacy controls on behalf of patrons.  This session will discuss the technical side of data collection of personal information by providers.  Some of this data collection is acknowledged by the user, such as for the purpose of personal information management, while other data is processed without the awareness of users, or potentially even the library.   

The second part of this series will cover the privacy policies that govern engagement with user services.  Some of these policies are dense and full of legal terminology, which few have the time or expertise to comprehend fully.   During this session, presenters will break down key components of privacy policies and describe the ramifications of agreeing to these policy terms. This session will provide an overview of privacy policy terminology, and a grounding of some of the relevant legal underpinnings of these policies.

Event Sessions

How Advertisers Use Tracking Cookies to Profile Library Users


Many libraries unknowingly help advertisers by exposing detailed, individually identifiable behavioral information about their users. This talk will explain how this works, and how libraries can stop it.

Understanding and blocking invisible web trackers


Alison Macrina of Library Freedom Project will discuss the invisible trackers that follow us all over the web, creating a digital dossier for each of us that we've never seen and probably never consented to. Alison will talk about the uses of this data and who is collecting it, as well as free tools you can use to help blind the trackers.

The Metadata Mosaic


Individual bits of information about you may seem innocuous – but in aggregate they can reveal surprisingly intimate details about your life. Yet privacy laws and policies often focus on specific kinds of information, allowing anything else to be collected and used in ways patrons and libraries might not expect. How does this happen, and how can it be addressed?

Additional Information

  • Cancellations made by March 9, 2016 will receive a refund, less a $35 cancellation. After that date, there are no refunds.

  • Registrants will receive detailed instructions about accessing the virtual conference via e-mail the Friday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.

  • If you have not received your Login Instruction e-mail by 10 a.m. (ET) on the day before the virtual conference, please contact the NISO office at nisohq@niso.org for immediate assistance.

  • Registration is per site (access for one computer) and includes access to the online recorded archive of the conference. You may have as many people as you like from the registrant's organization view the conference from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.

  • If you are registering someone else from your organization, either use that person's e-mail address when registering or contact nisohq@niso.org to provide alternate contact information.

  • Conference presentation slides and Q&A will be posted to this event webpage following the live conference.

  • Registrants will receive an e-mail message containing access information to the archived conference recording within 48 hours after the event. This recording access is only to be used by the registrant's organization.

For Online Events

  • NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
  • You will need a computer for the presentation and Q&A.

  • Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.

Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.