Enhancing Online Patron Privacy in Library Websites

O
n
l
i
n
e
 
P
a
t
r
o
n
 
P
r
i
v
a
c
y
Assessment of library websites
Marshall Breeding
Independent Consultant, Author, and
Founder and Publisher, Library Technology Guides
https://twitter.com/mbreedinghttps://librarytechnology.org/
October 29, 2021
ASIS&T WorkShop
Online
Privacy
Checklist
Privacy Policy
Valid digital certificate
Operate all web services using https
Share web traffic only when consistent with privacy
policy
Google analytics? Only using anonymized
configuration
Eliminate crossover with advertising networks
Enforce privacy protection options when using
federated authentication services (RA21, Seamless
Access, OpenAthens)
Privacy
Vulnerabilities
Security
and Privacy
 
Important to use https to protect the privacy of
users
 
Data transmitted with http is not encrypted and
can  be intercepted
 
Browsers show warnings for http sites as
untrustworthy
 
Sites not using https are penalized in search
results by Google (and other search engines)
 
Not enough to enable https, but must also
redirect any http request to https
Browser privacy warning
Secure site verification
Privacy and
Security
Scanner
 
Based on library website URLs maintained
in libraries.org directory
 
Uses Perl lwp:Useragent libraries to test
status and capture home page
 
Validates https and http redirection
 
Scans pages for
 
Google Analytics tags
 
advertising tags or trackers
 
DoubleClick
 
Facebook Connect
 
Key loggers
 
 
Privacy
scan:
US
Academic
Libraries
https://librarytechnology.org/libraries/security/report/
Privacy
scan:
US
Academic
Libraries
https://librarytechnology.org/libraries/security/report/
US
Academic
Libraries
(Mar 2017)
US
Academic
Libraries
(Oct 2019)
US
Academic
Libraries
(Jan 2020)
US
Academic
Libraries
(Sep 2020)
US
Academic
Libraries
(Mar 2021)
US
Academic
Libraries
(Oct 2021)
Privacy
scan:
US Public
Libraries
https://librarytechnology.org/libraries/security/report/
Privacy
scan:
US Public
Libraries
https://librarytechnology.org/libraries/security/report/
US Public
Libraries
(Mar 2017)
US Public
Libraries
(Oct 2019)
US Public
Libraries
(Jan 2020)
US Public
Libraries
(Sep 2020)
US Public
Libraries
(March
2021)
US Public
Libraries
(Oct 2021)
Advertising networks
Advertising trackers
h
t
t
p
s
:
/
/
t
h
e
m
a
r
k
u
p
.
o
r
g
/
s
e
r
i
e
s
/
b
l
a
c
k
l
i
g
h
t
https://www.ghostery.com/
https://themarkup.org/blacklight
Key loggers: antithetical to Privacy
Privacy and
Security
Report Card
Privacy and Security Report Card
Social plug-ins?
https://www.webnots.com/6-factors-to-check-before-using-social-sharing-plugin-in-wordpress/
Self-service kiosks and peripherals
 
SIP2 protocol used for self-check and  other remote transactions is not encrypted by
default
 
Exposes very specific personally identifiable data regarding patrons and content items
 
Susceptible to network eavesdropping
 
All remote transactions should be encrypted via https, VPN, or other encryption
tunneling methods
 
RFID readers may also enable exposure of transactions or of items held by patrons
Observations
 
Most library websites use https, though exceptions
remain
 
The technical characteristics of a very large portion of
public and academic libraries in the US are inconsistent
with strict protection of patron privacy
 
Most library websites remain entangled with analytics
and advertising network bots that may track patron use
 
Concern that technical behavior of library websites does
not conform to organizational privacy policies or
professional value related to privacy
 
Difficult to maintain a pristine privacy environment while
using technical components inherent to the commercial
advertising ecosystem.
 
Libraries should validate privacy conformance (in-house,
vendor, consultant)
Library Privacy Resources
 
Library Freedom Project
 
https://libraryfreedom.org/
 
LDH Consulting Services
 
https://ldhconsultingservices.com/
 
ALA Privacy Tool Kit
 
http://www.ala.org/advocacy/privacy/toolkit/
Slide Note
Embed
Share

This assessment by Marshall Breeding emphasizes the importance of maintaining online patron privacy on library websites. It covers key aspects such as the use of HTTPS, encryption, and privacy protection measures against vulnerabilities like tracking bots and unsecured transactions. The significance of enforcing privacy policies and secure site verification is highlighted to safeguard patron interactions and data. The article also discusses the impact of HTTPS on search engine ranking and user trust, emphasizing the need for libraries to prioritize privacy and security measures.

  • Online privacy
  • Library websites
  • HTTPS encryption
  • Privacy protection
  • Data security

Uploaded on Oct 02, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Online Patron Privacy Online Patron Privacy Assessment of library websites Marshall Breeding Independent Consultant, Author, and Founder and Publisher, Library Technology Guides https://librarytechnology.org/ https://twitter.com/mbreeding ASIS&T WorkShop October 29, 2021

  2. Privacy Policy Valid digital certificate Operate all web services using https Share web traffic only when consistent with privacy policy Online Privacy Checklist Google analytics? Only using anonymized configuration Eliminate crossover with advertising networks Enforce privacy protection options when using federated authentication services (RA21, Seamless Access, OpenAthens)

  3. Lack of encryption enables eavesdropping and compromises the security of patron interactions Privacy Vulnerabilities Tracking bots exposes patron interactions with advertising ecosystem Unsecured SIP2 transactions expose items borrowed and returned by library patrons

  4. Important to use https to protect the privacy of users Data transmitted with http is not encrypted and can be intercepted Security and Privacy Browsers show warnings for http sites as untrustworthy Sites not using https are penalized in search results by Google (and other search engines) Not enough to enable https, but must also redirect any http request to https

  5. Browser privacy warning

  6. Secure site verification

  7. Based on library website URLs maintained in libraries.org directory Uses Perl lwp:Useragent libraries to test status and capture home page Validates https and http redirection Scans pages for Google Analytics tags advertising tags or trackers DoubleClick Facebook Connect Key loggers Privacy and Security Scanner

  8. Privacy scan: US Academic Libraries https://librarytechnology.org/libraries/security/report/

  9. Privacy scan: US Academic Libraries https://librarytechnology.org/libraries/security/report/

  10. US Academic Libraries (Mar 2017)

  11. US Academic Libraries (Oct 2019)

  12. US Academic Libraries (Jan 2020)

  13. US Academic Libraries (Sep 2020)

  14. US Academic Libraries (Mar 2021)

  15. US Academic Libraries (Oct 2021)

  16. Privacy scan: US Public Libraries https://librarytechnology.org/libraries/security/report/

  17. Privacy scan: US Public Libraries https://librarytechnology.org/libraries/security/report/

  18. US Public Libraries (Mar 2017)

  19. US Public Libraries (Oct 2019)

  20. US Public Libraries (Jan 2020)

  21. US Public Libraries (Sep 2020)

  22. US Public Libraries (March 2021)

  23. US Public Libraries (Oct 2021)

  24. Advertising networks Use third party cookies as mechanism to identify users and transfer interest data Advertising networks aggressively collect personal data Track users across web sites Imperative for libraries: create a firewall between library resources and advertising data Major breach in privacy if content searched or viewed on a library site follows the user into the advertising ecosystem

  25. Advertising trackers

  26. https://themarkup.org/series/blacklight https://themarkup.org/series/blacklight https://www.ghostery.com/

  27. https://themarkup.org/blacklight

  28. Key loggers: antithetical to Privacy

  29. Privacy and Security Report Card

  30. Privacy and Security Report Card

  31. Social plug-ins? https://www.webnots.com/6-factors-to-check-before-using-social-sharing-plugin-in-wordpress/

  32. Self-service kiosks and peripherals SIP2 protocol used for self-check and other remote transactions is not encrypted by default Exposes very specific personally identifiable data regarding patrons and content items Susceptible to network eavesdropping All remote transactions should be encrypted via https, VPN, or other encryption tunneling methods RFID readers may also enable exposure of transactions or of items held by patrons

  33. Most library websites use https, though exceptions remain The technical characteristics of a very large portion of public and academic libraries in the US are inconsistent with strict protection of patron privacy Most library websites remain entangled with analytics and advertising network bots that may track patron use Observations Concern that technical behavior of library websites does not conform to organizational privacy policies or professional value related to privacy Difficult to maintain a pristine privacy environment while using technical components inherent to the commercial advertising ecosystem. Libraries should validate privacy conformance (in-house, vendor, consultant)

  34. Library Privacy Resources Library Freedom Project https://libraryfreedom.org/ LDH Consulting Services https://ldhconsultingservices.com/ ALA Privacy Tool Kit http://www.ala.org/advocacy/privacy/toolkit/

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#