Loading…
Representatives from CNI member organizations gather twice annually to explore new technologies, content, and applications; to further collaboration; to analyze technology policy issues; and to catalyze the development and deployment of new projects. Each member organization may send two representatives. Visit https://www.cni.org/mm/spring-2017 for more information.
Back To Schedule
Tuesday, April 4 • 1:00pm - 2:00pm
Protect Researcher Privacy in the Surveillance Era

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

With the combination of Wireless, Proxy, and ILS data, libraries today have a 360 degree, highly granular view of researcher activity. These data are valuable for operational decisions, however they have immense privacy implications. We will examine these data, their beneficial uses, and the necessary steps needed to protect researchers.

This presentation will be most relevant for libraries with: centralized wireless; centralized authentication; e.g. CAS, LDAP, Shibboleth; EZProxy or other web proxy to electronic resources, and designated patron type (faculty, undergraduate, etc.) information either in the ILS or in the CAS/LDAP/Shibboleth.


Speakers
avatar for Sam Kome

Sam Kome

Director, Strategic Initiatives & Information Technology, Claremont Colleges Library
Sam Kome creates, designs, plans, prioritizes, directs, implements, and assesses projects and teams emanating from the strategic initiatives included in the Claremont Colleges Library’s strategic plan. He oversees the library’s information technology needs and systems integration... Read More →


Tuesday April 4, 2017 1:00pm - 2:00pm MDT
Enchantment A-B