Protecting Patron Privacy: Safe Practices for Public Computers

Safe Practices for Public Computers

Nonfiction, Reference & Language, Language Arts, Library & Information Services
Cover of the book Protecting Patron Privacy: Safe Practices for Public Computers by Matthew Beckstrom, ABC-CLIO
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Matthew Beckstrom ISBN: 9781610699976
Publisher: ABC-CLIO Publication: June 11, 2015
Imprint: Libraries Unlimited Language: English
Author: Matthew Beckstrom
ISBN: 9781610699976
Publisher: ABC-CLIO
Publication: June 11, 2015
Imprint: Libraries Unlimited
Language: English

In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.

Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.

Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

More books from ABC-CLIO

Cover of the book Propaganda from the American Civil War by Matthew Beckstrom
Cover of the book History of Asian Americans: Exploring Diverse Roots by Matthew Beckstrom
Cover of the book Ulysses S. Grant: A Biography by Matthew Beckstrom
Cover of the book Crash Course in Family Literacy Programs by Matthew Beckstrom
Cover of the book Navigating the Whitewater Rapids of Entrepreneurial Success: Leading Small Business Growth by Matthew Beckstrom
Cover of the book Pro Wrestling: A Comprehensive Reference Guide by Matthew Beckstrom
Cover of the book Hidden Armies of the Second World War: World War II Resistance Movements by Matthew Beckstrom
Cover of the book Two Nations, Indivisible: A History of Inequality in America by Matthew Beckstrom
Cover of the book Fracking: A Reference Handbook by Matthew Beckstrom
Cover of the book Controversies in Affirmative Action [3 volumes] by Matthew Beckstrom
Cover of the book Passive-Aggression: Understanding the Sufferer, Helping the Victim, 2nd Edition by Matthew Beckstrom
Cover of the book Free Stylin': How Hip Hop Changed the Fashion Industry by Matthew Beckstrom
Cover of the book Lanza's Mob: The Mafia and San Francisco by Matthew Beckstrom
Cover of the book Planet of the Grapes: A Geography of Wine by Matthew Beckstrom
Cover of the book Public Library Collections in the Balance: Censorship, Inclusivity, and Truth by Matthew Beckstrom
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy