Protecting patron privacy : safe practices for public computers / Matthew Beckstrom ; Foreword by Barbara Jones.

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost any...

Full description

Saved in:
Bibliographic Details
Main Author: Beckstrom, Matthew (Author)
Format: Book
Language:English
Published: Santa Barbara, California : Libraries Unlimited, An Imprint of ABC-CLIO, LLC, [2015]
Subjects:
LEADER 03184cam a2200457 i 4500
001 b2247896
005 20170630115258.0
008 150210s2015 caum b a001 0 eng
010 |a 2015004049 
019 |a 893456899 
020 |a 9781610699969  |q (pbk. ;  |q alk. paper) 
020 |a 1610699963  |q (pbk. ;  |q alk. paper) 
020 |z 9781610699976  |q (ebook) 
035 |a (OCoLC)893455660  |z (OCoLC)893456899 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDX  |d BTCTA  |d YDXCP  |d BDX  |d OCLCF  |d NBU  |d CDX  |d SOI  |d NDS  |d VP@  |d OCLCQ  |d SCL 
042 |a pcc 
043 |a n-us--- 
049 |a SCLL 
050 4 |a Z678.93.P83 B43 2015 
100 1 |a Beckstrom, Matthew,  |e author. 
245 1 0 |a Protecting patron privacy :  |b safe practices for public computers /  |c Matthew Beckstrom ; Foreword by Barbara Jones. 
264 1 |a Santa Barbara, California :  |b Libraries Unlimited, An Imprint of ABC-CLIO, LLC,  |c [2015] 
300 |a xi, 104 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Privacy and how it is lost -- Staff procedures and policy -- Patron education -- Network security and devices -- Windows settings and applications -- Browser settings and plug-ins. 
520 |a Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research -- if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications. 
650 0 |a Public access computers in libraries  |z United States. 
650 0 |a Internet access for library users  |z United States. 
650 0 |a Privacy, Right of  |z United States. 
650 0 |a Internet  |x Security measures. 
650 0 |a Data protection. 
852 |b Books - Level 2  |h Z678.93.P83 B43 2015  |0 f9de9fa0-a99c-11ea-b550-3a67fadbd8b9 
907 |a .b22478966  |b 170630  |c 181210 
913 |a - 
945 |g 1  |i 0114404479474  |j 0  |l beat   |o -  |p $0.00  |q    |r    |s -  |t 0  |u 0  |v 0  |w 0  |x 0  |y .i20390658  |z 170710 
994 |a C0  |b SCL 
998 |a beat  |b 170710  |c m  |d a  |e -  |f eng  |g cau  |h 0 
999 f f |i c8c08e7a-a996-11ea-8da7-1466fadbd8b9