Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
Representatives from CNI member organizations gather twice annually to explore new technologies, content, and applications; to further collaboration; to analyze technology policy issues; and to catalyze the development and deployment of new projects. Each member organization may send two representatives. Visit https://www.cni.org/mm/spring-2017 for more information.
View analytic
Tuesday, April 4 • 1:00pm - 2:00pm
Protect Researcher Privacy in the Surveillance Era

Sign up or log in to save this to your schedule and see who's attending!

With the combination of Wireless, Proxy, and ILS data, libraries today have a 360 degree, highly granular view of researcher activity. These data are valuable for operational decisions, however they have immense privacy implications. We will examine these data, their beneficial uses, and the necessary steps needed to protect researchers.

This presentation will be most relevant for libraries with: centralized wireless; centralized authentication; e.g. CAS, LDAP, Shibboleth; EZProxy or other web proxy to electronic resources, and designated patron type (faculty, undergraduate, etc.) information either in the ILS or in the CAS/LDAP/Shibboleth.


Speakers
SK

Sam Kome

Director of Strategic Initiatives & Information Technology, Claremont Colleges


Tuesday April 4, 2017 1:00pm - 2:00pm
Enchantment A-B