About This Webinar
In our connected environment, security is tremendously important element of any system. Institutions large and small have been targets of attack and libraries are a significant vector of approach for some institutions, because of their bias toward access and sharing of resources. In addition to personal information about patrons, library systems contain a variety of valuable information and provide gateways to numerous other resources. All of these realities require information specialists to be aware of potential risks and how to address them.
This two-part webinar program will focus on what best practice activities libraries should be implementing to ensure that their services are protected and secure. Part one of this webinar will be focused on management of internal systems and methods of securing library systems and the data that they hold.
The second session of this program will be focused on the issue of privacy and methods for protecting content from unauthorized distribution, including digital rights management systems, social DRM, and other approaches to preventing piracy.
Security Lessons Learned from an EZproxy Administrator
OCLC's EZproxy maintains a significant market share in library resource security, authentication, and access. In this presentation Paul Butler will review EZproxy's security features and use his experience as an EZproxy administrator to discuss security tips, tools, and techniques that can be useful for both EZproxy and other authentication systems. This presentation will also provide publishers and vendors a better sense of EZproxy's security features. Paul is hopeful that with better knowledge of the systems in use libraries, publishers, and vendors can further the conversation, work together, and make resources more secure while maintaining accessibility and privacy.
Do You Know Your Privacy Risks?
Protecting privacy is inescapably tied to library technology, due to the almost universal use of technology to collect, store, process, and utilize personal information in the pursuit of library goals. Do you know how to identify the privacy risks inherent in your operations, your services, and your strategic initiatives? In this presentation, you will learn how to use privacy harms to identify your risks, and then how to use privacy principles to identify solutions to mitigate those risks.
Protecting Your Libraries' Resources
Libraries are target rich environments. We exist to enable access to information, yet we must also be able to control and limit that access. Our libraries are full of hardware, databases, patron information and various other things that are of value. These things are bought, sold and traded, they are the currency of the underground Internet economy. I will outline practical steps to help protect library content and prevent unauthorized access and piracy.
Cancellations made by Day, Date, Year will receive a refund, less a $35 cancellation. After that date, there are no refunds.
Registrants will receive detailed instructions about accessing the virtual conference via e-mail the Friday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.
If you have not received your Login Instruction e-mail by 10 a.m. (ET) on the day before the virtual conference, please contact the NISO office at email@example.com for immediate assistance.
Registration is per site (access for one computer) and includes access to the online recorded archive of the conference. You may have as many people as you like from the registrant's organization view the conference from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.
If you are registering someone else from your organization, either use that person's e-mail address when registering or contact firstname.lastname@example.org to provide alternate contact information.
Conference presentation slides and Q&A will be posted to this event webpage following the live conference.
Registrants will receive an e-mail message containing access information to the archived conference recording within 48 hours after the event. This recording access is only to be used by the registrant's organization.
For Online Events
- NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
You will need a computer for the presentation and Q&A.
Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.
Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.