Chapter 1. The Privacy Landscape Chapter 2. Policy and Privacy Chapter 3. Networks and Infrastructure Chapter 4. Public Computers Chapter 5. Web Browsers and Websites Chapter 6. Mobile Devices Chapter 7. Apps Chapter 8. The Cloud Chapter 9. Tor, Outreach, and the Future of Privacy
Matthew Connolly is an application and web programmer at Cornell University Library, where he has worked for more than ten years on a variety of library services and tools for the public and library staff. He holds a Master of Engineering degree from Cornell, specializing in systems engineering. He has published articles in both popular and peer-reviewed journals and co-authored Using iPhones, iPads, and iPods: A Practical Guide for Librarians.
In light of recent headlines about the data breaches at Facebook,
Equifax, etc., public concern about the security of personal
information is at an all-time high. Libraries have a duty to take
precautions to protect patrons' privacy. This guide summarizes the
issues involved in user privacy. The threats to user privacy have
increased tremendously since records and library catalogs were
first computerized many years ago. Connolly (Cornell Univ. Library)
based on guidelines from the American Library Association. Most of
the book focuses on the technical aspects of strengthening a
library's technology infrastructure based on the policy chosen.
Securing browsers used by the public and library systems (patron
records, online public access catalogs, and ransomware, for
example) are of particular concern. In the last several years,
users have begun connecting their mobile devices to library
wireless networks, posing more complex issues for network security.
This book serves well as an overview of the subject for library
managers or library IT personnel; Connolly provides sources for
additional reading and guidance for those wishing to delve further
into a particular subject. Summing Up: Highly recommended. Graduate
students and all library professionals. * CHOICE *
Matthew Connolly's book not only describes not only why privacy matters but also gives easy-to-follow steps for protecting user privacy in all types of libraries. I implemented a few of the suggestions on my own devices. This book is recommended for all libraries and librarians. -- Emily J. M. Knox, assistant professor, School of Information Sciences, University of Illinois at Urbana-Champaign