<div dir="ltr"><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large"><br clear="all"></div><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large">Dear Libs-OR Community,</div><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large"><br></div><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large"><div dir="ltr"><div class="gmail_default">The January edition of Multnomah County Library's IF Newsletter is now available. This month we bring you an extended issue to sync up with <a href="https://staysafeonline.org/programs/data-privacy-week/" target="_blank">Data Privacy Week</a>. The newsletter gathers articles and resources relating to privacy, data and intellectual freedom in libraries.<br></div><div class="gmail_default"><br></div></div><div>Thanks for reading!</div><div dir="ltr"><div class="gmail_default">- Multnomah County Library's Intellectual Freedom Committee</div></div></div><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large"><span id="gmail-docs-internal-guid-2baea49f-7fff-0607-4884-8cdc7c53a95f"><p dir="ltr" style="line-height:1.2;margin-top:16pt;margin-bottom:0pt"><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(11,83,148);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Rights, Responsibilities & Reactions</span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(0,167,151);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Intellectual Freedom Newsletter –</span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(255,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> </span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">January 2023</span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(11,83,148);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Special Edition </span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">–</span><span style="font-size:22pt;font-family:"Open Sans",sans-serif;color:rgb(11,83,148);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> Privacy </span></p><p dir="ltr" style="line-height:1.56;text-indent:0.75pt"></p><hr><p></p><p dir="ltr" style="line-height:1.56"><span style="font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Privacy is interwoven into library services and a key tenet of intellectual freedom. With more digital connections there is a need for awareness of how personal information and other data is gathered and shared, and ways to protect and limit access to that information. In alignment with</span><a href="https://staysafeonline.org/programs/data-privacy-week/" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Open Sans",sans-serif;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap"> Data Privacy Week</span></a><span style="font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, the January edition of the Intellectual Freedom Newsletter highlights some of the ways that data and privacy intersect in libraries and with intellectual freedom. Plus, this newsletter takes a broader look at privacy in connection to technology, health data and legislation, including links to guides and resources for managing online data.</span></p><p dir="ltr" style="line-height:1.38"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Intellectual Freedom and Privacy in Libraries</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">ALA on Privacy: </span><a href="https://www.ala.org/advocacy/privacy" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Privacy | Advocacy, Legislation & Issues</span></a></p></li><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:circle;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">see also ALA’s </span><a href="https://www.ala.org/advocacy/privacy/fieldguides" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Privacy Field Guides</span></a></p></li></ul><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Learn about the </span><a href="https://www.ala.org/advocacy/patriot-act" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">USA PATRIOT Act </span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">and why it is relevant to libraries</span></p></li></ul><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Privacy and Confidentiality in Libraries</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The </span><a href="https://journals3.oregondigital.org/olaq/issue/view/vol27_iss1" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Winter 2022 issue</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> of the Oregon Library Association Quarterly is dedicated to privacy and confidentiality.</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><a href="https://syllabusproject.org/undercover-at-the-library/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Undercover at the Library</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> offers a look back at the development of privacy in libraries (</span><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Syllabus Project, 13 min). For a more in-depth history of privacy in libraries, check out </span><a href="https://dataprivacyproject.org/wp-content/uploads/2018/04/zine_for_printer_printing_order.pdf" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">How Did We Get Here?: A Zine About Privacy at the Library</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> from the </span><a href="https://dataprivacyproject.org/" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Data Privacy Project</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">, an organization that offers tutorials for library workers. </span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Refer to Multnomah County Library’s </span><a href="https://multcolib.org/privacy-and-confidentiality-library-records" style="background-color:transparent;font-size:12pt;text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">policy on privacy and confidentiality</span></a> for how the library protect's patrons privacy and data.</p></li></ul><p dir="ltr" style="line-height:1.38"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Privacy and Technology</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The National Cybersecurity Alliance offers an overview of data privacy with </span><a href="https://staysafeonline.org/online-safety-privacy-basics/what-is-data-privacy/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">What Is Data Privacy?</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (6 min). Follow these basic steps to protect your data privacy: </span><a href="https://staysafeonline.org/programs/data-privacy-week/individuals/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Data: The Story of You</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (4 min). Find links to the privacy/security settings for a variety of online platforms and services: </span><a href="https://staysafeonline.org/resources/manage-your-privacy-settings/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Manage Your Privacy Settings</span></a></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Mozilla’s </span><a href="https://foundation.mozilla.org/en/privacynotincluded/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">*Privacy Not Included</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> project provides information on the data privacy and security features of a variety of smart devices and apps.</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Learn about the default settings for different devices, social media platforms and software that compromise privacy and gather personal data: </span><a href="https://www.nytimes.com/2022/07/27/technology/personaltech/default-settings-turn-off.html" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">The Default Tech Settings You Should Turn Off Right Away</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (New York Times, 7 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The New York Times details how sharing your email creates a digital breadcrumb: </span><a href="https://www.nytimes.com/2023/01/25/technology/personaltech/email-address-digital-tracking.html" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Everyone Wants Your Email Address. Think Twice Before Sharing It.</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (9 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Popular Science provides an overview of privacy settings on school devices: </span><a href="https://www.popsci.com/diy/student-data-privacy/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">The Opt Out: School devices are sharing your family's data, but you can stop them</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (11 min). </span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Consumer Affairs presents insights on apps geared towards kids: </span><a href="https://www.consumeraffairs.com/news/your-kids-school-apps-may-be-invading-their-privacy-011323.html" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Your kids' school apps may be invading their privacy</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (4 min). </span></p></li></ul><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Internet Privacy and Legislation</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The American Data Privacy and Protection Act is a bipartisan attempt at federal data privacy legislation that is expected to be revisited by Congress in 2023: </span><a href="https://jolt.law.harvard.edu/digest/american-data-privacy-and-protection-act-latest-closest-yet-still-fragile-attempt-toward-comprehensive-federal-privacy-legislation" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">American Data Privacy and Protection Act: Latest, Closest, yet Still Fragile Attempt Toward Comprehensive Federal Privacy Legislation</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (Harvard’s Journal of Law and Technology, 6 min). In an opinion piece in the Wall Street Journal, President Biden highlights how protection of privacy is key to reigning in big tech and protecting consumers: </span><a href="https://www.wsj.com/articles/unite-against-big-tech-abuses-social-media-privacy-competition-antitrust-children-algorithm-11673439411?page=1" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Republicans and Democrats, Unite Against Big Tech Abuses</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (6 min). </span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:4pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">An overview of new data privacy laws being enacted at the state level and the implications of those statutes: </span><a href="https://www.reuters.com/legal/legalindustry/us-data-privacy-laws-enter-new-era-2023-2023-01-12/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">U.S. data privacy laws to enter new era in 2023</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (Reuters, 12 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:4pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Wired magazine offers a more in-depth look at California’s Kids Online Safety Act (KOSA): </span><a href="https://www.wired.com/story/california-aadc-kids-privacy-age-checks/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">The US May Soon Learn What a ‘Kid-Friendly’ Internet Looks Like</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (10 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:4pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Civil society groups, including the ACLU and GLAAD, are raising concerns about </span><a href="https://www.cnbc.com/2022/11/28/kids-online-safety-act-may-harm-minors-civil-society-groups-warn.html" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">potential harm to minors from KOSA</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> through collection of data and limiting access to certain topics (CNBC, 7 min). </span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:4pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">A look at how centering queer experiences in the digital world can improve privacy policy for all: </span><a href="https://publicknowledge.org/hiding-out-a-case-for-queer-experiences-informing-data-privacy-laws/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Hiding OUT: A Case for Queer Experiences Informing Data Privacy Laws</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (Public Knowledge, 24 min).</span></p></li></ul><p dir="ltr" style="line-height:1.38"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Health Data</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:10pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Consumer Reports delves into what data the Health Insurance Portability and Accountability Act (HIPAA) protects and doesn’t protect: </span><a href="https://www.consumerreports.org/health-privacy/guess-what-hipaa-isnt-a-medical-privacy-law-a2469399940/" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Guess What? HIPAA Isn’t a Medical Privacy Law</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (20 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">More on how health apps share personal data: </span><a href="https://www.washingtonpost.com/technology/2022/09/22/health-apps-privacy/" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Health apps share your concerns with advertisers. HIPAA can’t stop it.</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (Washington Post, 7 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">The post-Roe era highlights data privacy concerns: </span><a href="https://www.washingtonpost.com/technology/2022/05/04/abortion-digital-privacy/" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">For people seeking abortions, digital privacy is suddenly critical</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (The Washington Post, 10 min).</span></p></li></ul><br><p dir="ltr" style="line-height:1.8;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Data Privacy In the News</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.8;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">With legacy systems and other vulnerabilities, cyberattacks can go beyond compromising data to hindering government operations: </span><a href="https://www.nytimes.com/2022/11/28/nyregion/suffolk-county-cyber-attack.html" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">How a Cyberattack Plunged a Long Island County Into the 1990s</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (New York Times, 11 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Household robots were programmed to gather images for AI training, creating a breach in consumer data privacy: </span><a href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">A Roomba recorded a woman on the toilet. How did screenshots end up on Facebook?</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (MIT Technology Review, 40 min).</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.56;margin-top:0pt;margin-bottom:0pt" role="presentation"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Facial recognition technology is being used at some US airports: </span><a href="https://www.washingtonpost.com/technology/2022/12/02/tsa-security-face-recognition/" style="text-decoration-line:none"><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">TSA now wants to scan your face at security. Here are your rights.</span></a><span style="font-size:12pt;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (Washington Post, 10 min).</span></p></li></ul><br><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:14pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">In-depth takes on privacy and data:</span></p><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt"><span style="font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">For a deeper dive into privacy, check out these recently published books:
</span></p><ul style="margin-top:0px;margin-bottom:0px"><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><a href="https://multcolib.bibliocommons.com/v2/record/S152C1847200" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Seek and Hide: The Tangled History of the Right to Privacy</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> by Amy Gajda</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><a href="https://multcolib.bibliocommons.com/v2/record/S152C2020423" style="background-color:transparent;font-size:12pt;text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age</span></a><span style="background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;font-size:12pt;vertical-align:baseline;white-space:pre-wrap"> by Danielle Keats Citron</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:11pt;font-family:"PT Serif",serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.38;margin-top:0pt;margin-bottom:0pt" role="presentation"><a href="https://multcolib.bibliocommons.com/v2/record/S152C2029236" style="text-decoration-line:none"><span style="font-size:12pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Data Cartels: The Companies that Control and Monopolize Our Information</span></a><span style="font-size:12pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> by Sarah Lamdan</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.5;margin-top:0pt;margin-bottom:0pt" role="presentation"><a href="https://multcolib.bibliocommons.com/v2/record/S152C1962407" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Library Patrons' Privacy: Questions and Answers</span></a><span style="font-size:12pt;color:rgb(71,71,71);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> by Valenti, Lund and Beckstrom</span></p></li><li dir="ltr" style="list-style-type:disc;font-size:12pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre"><p dir="ltr" style="line-height:1.5;margin-top:0pt;margin-bottom:6pt" role="presentation"><a href="https://multcolib.bibliocommons.com/v2/record/S152C2021201" style="text-decoration-line:none"><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Our Data, Ourselves: A Personal Guide to Digital Privacy</span></a><span style="font-size:12pt;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> by Jacqueline Lipton</span></p></li></ul><p dir="ltr" style="line-height:1.2"><span style="font-size:13pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-weight:700;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Additional Intellectual Freedom Reading and Resources</span></p><p dir="ltr" style="line-height:1.56;margin-top:10pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">ALA Intellectual Freedom Blog: </span><a href="https://www.oif.ala.org/oif/" style="text-decoration-line:none"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">https://www.oif.ala.org/</span></a><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> A blog dedicated to intellectual freedom issues, and includes the </span><a href="https://www.oif.ala.org/oif/category/intellectual-freedom-news/" style="text-decoration-line:none"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Intellectual Freedom News</span></a><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> –a weekly roundup of IF related articles that are divided into key IF topics. </span></p><p dir="ltr" style="line-height:1.56;margin-top:10pt;margin-bottom:0pt"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Oregon Library Association’s </span><a href="https://libguides.osl.state.or.us/iftoolkit/home" style="text-decoration-line:none"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">Intellectual Freedom Toolkit</span></a><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"> (published February 8, 2022). A range of tools and resources relating to IF challenges and policies created by the OLA Intellectual Freedom Committee. </span></p><p dir="ltr" style="line-height:1.56"></p><hr><p></p><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-style:italic;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">Rights, Responsibilities & Reactions </span><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">is a monthly roundup of Intellectual Freedom News compiled by the Multnomah County Library Intellectual Freedom Committee. We welcome suggestions of articles to include at </span><a href="mailto:lib.ifc@multco.us" style="text-decoration-line:none"><span style="font-size:11pt;font-family:"Open Sans",sans-serif;background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;text-decoration-line:underline;vertical-align:baseline;white-space:pre-wrap">lib.ifc@multco.us</span></a><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap">. </span></span><br></div><div class="gmail_default" style="font-family:arial,sans-serif;font-size:large"><span><span style="font-size:11pt;font-family:"Open Sans",sans-serif;color:rgb(0,0,0);background-color:transparent;font-variant-numeric:normal;font-variant-east-asian:normal;vertical-align:baseline;white-space:pre-wrap"><br></span></span></div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div dir="ltr"><font size="4"><b>Jennifer Keyser </b>(she/her)</font><div><div style="color:rgb(34,34,34)"><font size="4"><b>Policy Coordinator Librarian</b><br>Monday - Friday</font></div><div style="color:rgb(34,34,34)"><font size="4">971-429-4699<br></font></div></div><div><font size="4">Multnomah County Library</font></div><div><a href="http://multcolib.org" target="_blank"><font size="4">multcolib.org</font></a></div><div><br></div><div><img src="https://multcolib.org/sites/default/files/MultCoLib_2LineLogo_RGBemail_sig2.png"><br></div></div></div></div></div></div>
<img width="72" height="22" src="https://multco.us/sites/all/themes/multco/logo.png"><font style="font-size: 11px;">This email was encrypted for your privacy and security</font>