top of page

Ethical, Legal, and Security

"We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted." 

~ ALA's Code of Ethics

LIBR 101

 

Privacy and security is one of the core values of libraries.  It is the key component to free speech, thought, and association.  It gives the patrons the freedom to read, watch, listen, and access information in any format without fear of repercussion from the community and risk of one’s reputation. 

The Library Bill of Rights, and the ALA’s Code of Ethics is the building blocks on which library’s hold their self responsible to upholding the intellectual freedom and the right to privacy.

The following course work will show my competency in the study of ethical, legal, and security considerations.

Ethic Scenario

 

Q1) The police chief asks you to provide records that document the library use of a person who she thinks is responsible for a series of thefts in the community. The chief explains to you that no one will know that you provided the records.

 

It is our duty as an employee of the library, to protect the privacy of the patrons.  Libraries have built a reputation as a safe haven for people of the community.  If patrons did not believe that their searches and viewing choices would be kept confidential, they would not be willing to ask questions and perform searches for fear of judgement.  Staff should be trained how to handle intimidation by law enforcement through reenactments. 

 

I would tell the police that I am unable to provide any patron records without the expressed written consent of the patron or by a subpoena.   We follow the guidelines of the American Library Association, and “We protect the rights of individual’s privacy and confidentiality in the use of library resources and services.”

 

Reference:

Fourie, D. K., & Loe, N. E. (2016). Libraries in the information age: An introduction and career exploration. Santa Barbara, CA: Libraries Unlimited, an imprint of ABC-CLIO, LLC.

 

 

Q4) An alumnus, who has generously contributed to the academic library, believes that the library should only have materials that promote the community’s values.

It is important for the alumnus to understand that the library needs to have materials that are relevant to everyone’s needs.  I would try to explain that all materials chosen have gone through a selection process or has been purchased because due to a patron request.

 

Depending on the alumnus reaction, I could also tell them about section II of the Library Bill of Rights, “Libraries should provide materials and information presenting all points of view on current and historical issues.  Materials should not be proscribed or removed because of partisan or doctrinal disapproval.” 

 

As an employee of the library, we have the obligation to be all encompassing in the collection development.  We cannot exclude materials because of patron objections, donor objections, or even our own personal objections.  

 

Since the alumnus has contributed to the library, it would be beneficial for the Director of Library Services to come and speak with the donor.

Q5) A patron checks out materials on religion at the public library. When he receives an overdue notice, he informs the library will not return the books because he believes the materials are not suitable for the community.

 

Something like this happened at a library in Maine.  Where the patron checked out two copies of Changing Bodies, Growing Up, Sex & Sexual Health, and refused to return the books because of the sexual content. The patron sent a check to the library to cover the costs of the books. The Director of the Lewiston Library, Rick Speer refused the check and sent the form Reconsideration of Materials for the challenged books.

The act by the patron is theft.  It is depriving other patrons the use of the books.  Like the library in Maine, an act like this could benefit by getting the public involved.  The American Library Association states, “There is no place in our society for efforts to coerce the taste of others, to confine adults to the reading matter deemed suitable for adolescents, or to inhibit the efforts of writers to achieve artistic expression.”

 

This incident is a teaching tool, to explain to the community that there are procedures in place for them to express their concerns.  It is also an opportunity to explain that materials are selected through a defined process, and are also chosen by patron requests.

 

http://www.swissarmylibrarian.net/2007/09/19/patron-refuses-to-return-book/

LIBR 105

CIPA in Public Libraries and Schools

Title: One Law with Two Outcomes: Comparing the Implementation of CIPA in Public Libraries and Schools

Authors: Paul T. Jaegar and Zheng Yan

Published: March 2009

Database: Academic Search Premier

Search Procedure: Articles ---> EBSCOhost. Selected: Library, Information Sciences and Technology. 

In search boxes: “library*” in Title AND “security” (All Text) AND “filtering”(Subject Terms).

Limit To: Full Text and Scholarly (Peer Reviewed) Journals, and Publication Date 2007-2018.

               

The article discusses the history and the affects the Children’s Internet Protection Act (CIPA) has had on the public and school libraries.  When the CIPA was passed in 2000, it was not widely implemented until 2003, when 96% of public schools were in compliance with the act. Leading up to the creation of CIPA, the act was produced after multiple attempts to control Internet content failed.  The Children’s Internet Protection Act focuses on blocking three types of content: obscene material, child pornography, and “material that is harmful to minors (depictions of nudity and sexual activity that lack artistic, literary, or scientific value)” (Jaegar &Yan, 7).

               

The main strategy for Internet protection act specified in Section 1711 for schools and 1712 for public libraries is the use of filtering on the computers. Section 1721 required both libraries to develop a policy for Internet safety, to notify the public, and to address the policy through a public hearing or meeting. By adopting these policies and installing technology protection, libraries are able to benefit from the Universal Service Program (E-Rate) that provides discounts from 20 to 90 percent of Internet access and connection costs.  According to Jeagar and Yan, 99% of public schools had Internet access by 2007, with 99.7% of public libraries by 2007.

               

Two of the biggest complaints dealing with filtering implementation are the decision on what is being filter is left to the software companies instead of the schools, libraries, or community; and the inconsistency of the material being blocked.

               

At my library, we have a firewall to prevent students from viewing inappropriate content on the Internet.  According to IT, if a student were to open a restricted website they would see the message “Ivy Tech prevented this page from loading.”  IT uses an active directory, to create rules on how the computers will run, and who has access to certain applications.

 

Reference

Jaeger, P. I., & Zheng, Y. (2009). One Law with Two Outcomes: Comparing the Implementation of CIPA in      Public Libraries and Schools. Information Technology & Libraries, 28(1), 6-14.

Open Source Software

Title: The Free Software Alternative: Freeware, Open-source Software, and Libraries

Author: James E. Corbly

Published: September 2014

Database: EBSCOhost – Library, Information Science & Technology Abstracts

Search terms: open source

 

In the publication Information Technology and Libraries, author James E. Corbly describes the differences and lists the criteria for freeware and open source software.  He gives a brief history of product licensing and the categories for registration.  The author also provides the reader with tips as to where to find freeware and open source software, along with a check list of criteria that can be used to judge their usability and safety. 

 

Corbly explains that Freeware is a copyrighted software that cannot be altered because the owner retains “sole possession of the copyright.”  Whereas, open source software, the source code is distributed for studying, modification, and redistribution as long is redistributed with the same conditions as the original (Corbly, 2014, p.66).

 

In the brief history of licensing for open source products, the author noted there are “over sixty-five different open source licenses,” with General Public License (GPL) used on almost 70% of open source products.  The principles of GPL is the software can be used for any purpose, it can be altered to meet the users’ needs, the software can be shared with others, and the changes can be freely distributed. (Corbly, 2014, p.67).  Freeware is more complex because the “rights and responsibilities of the copyright owner vary from program to program.”  They do have some common clauses where the copyright is retained by the author or provider of the software, the users can use the software for any legal purposes, only a specified number of computers can install or use the software, users can not profit for the sale of the freeware, and the software is provided “as is” (Corbly, 2014, p.68).

 

Software registration for personal, charities and non-profit institutions normally allows for unlimited use of the software.  Many open source software and freeware do not require registration or sometimes it is optional, for personal use.  For-profit freeware software normally requires permission from the software owner.  Commercial use may require a fee (Corbly, 2014, p.69).

 

Corbly’s article did a good job in briefly and clearly describing the difference between freeware and open source software and providing an understanding of licensing and registration.  The tips for locating freeware and open source software, how to determine their usefulness, and how to evaluate whether the software my contain viruses or malware are well worth reading.  I enjoyed that Cobly opened his article with several ways he has used freeware and open source software in the library during his time at St. Ambrose University in Davenport, Iowa.

 

 

References

 

Corbly, J. E. (2014). The Free Software Alternative: Freeware, Open-source software, and Libraries. Information Technology & Libraries, 33(3), 65-75.

bottom of page