What is JacketFlap

  • JacketFlap connects you to the work of more than 200,000 authors, illustrators, publishers and other creators of books for Children and Young Adults. The site is updated daily with information about every book, author, illustrator, and publisher in the children's / young adult book industry. Members include published authors and illustrators, librarians, agents, editors, publicists, booksellers, publishers and fans.
    Join now (it's free).

Sort Blog Posts

Sort Posts by:

  • in
    from   

Suggest a Blog

Enter a Blog's Feed URL below and click Submit:

Most Commented Posts

In the past 7 days

Recent Posts

(tagged with 'Privacy')

Recent Comments

JacketFlap Sponsors

Spread the word about books.
Put this Widget on your blog!
  • Powered by JacketFlap.com

Are you a book Publisher?
Learn about Widgets now!

Advertise on JacketFlap

MyJacketFlap Blogs

  • Login or Register for free to create your own customized page of blog posts from your favorite blogs. You can also add blogs by clicking the "Add to MyJacketFlap" links next to the blog name in each post.

Blog Posts by Date

Click days in this calendar to see posts by day or month
new posts in all blogs
Viewing: Blog Posts Tagged with: Privacy, Most Recent at Top [Help]
Results 1 - 25 of 37
1. The Day We Fight Back: Protest NSA Surveillance on Your Blog

Today, a broad coalition of interest groups, websites, and people around the world are joining together to fight back against government surveillance. We’re supporting the “Day We Fight Back” on WordPress.com and have created a banner that you can easily add to your WordPress.com blog to get involved, too.

The “Stop NSA Surveillance” banner shows support for this important cause and provides a link to a page of resources to help visitors to contact members of the US Congress to support much needed anti-surveillance legislation. For more information, please visit thedaywefightback.org.

How to add the banner to your site

Here’s how to add the banner to your site in three steps:

  1. In your WordPress.com dashboard, go to Settings  Protest NSA Surveillance.
  2. Click on the checkbox labelled Protest Enabled.
  3. Click on the Save Changes button for the change to take effect.

The banner will remain on your site until midnight on your blog’s time zone. Here’s what it will look like:

no-nsa


Filed under: Community, Privacy

10 Comments on The Day We Fight Back: Protest NSA Surveillance on Your Blog, last added: 2/11/2014
Display Comments Add a Comment
2. The annual banned books week roundup for 2013

salinger's 60 years later, banned in the US

For some reason last year I didn’t do my annual roundup of Banned Books Week websites. Here is a link to the source of the image above which is from the New Yorker’s article about the JD Salinger-evocative book 60 Years Later, Coming Through the Rye which is illegal to sell in the US. You can find more news articles about that situation at the author’s small Wikipedia page. You can look at past posts on this topic by checking out the bannedbooksweek tag here or here is a list of the annual posts: 2000, 2001, 2002, 2003, 2004, 2006, 2007, 2008, 2009, 2010 and 2011. I skipped 2005 and 2012.

As usual, you get a neat real-time look at what’s going on by following the Twitter hashtag. Do NOT look at the bbw twitter hashtag as I mistakenly did last night. As usual there are two “main” sites the ALA site at ala.org/bbooks and the bannedbooksweek.org site which is really nice looking this year. The BannedBooksWeek Twitter account is still moribund which is a damned shame. The Virtual Read Out doesn’t seem to have any new videos this year… yet?

Please remember if you are a librarian who has a book that is challenged, report it to the ALA so they can keep track of it.

Here is the list of organizations who are co-sponsors. Let’s look at their websites.

  • PEN American Center – has this post outlining what they’re up to this week and they appear to be extended their activities for a full month and this blog post (some reflections by Nick Burd, an author whose book had been challenged) is a well-written little capsule piece.
  • The language of the censor is the language of the tyrant, the absolutist, the one with no vision. It is the antithesis of art because it assumes that there is only one perspective, one reality, and that anything that fails to rhyme with it is a sin against nature. But the real sin against nature is to suffocate personal truths and experiences with wobbly doctrine and to disguise it as morally just. Art— particularly literature—exists to show us there are as many worlds as there are people. Each of these worlds come with its own laws. These laws vary from person to person, but if there is one that they have in common it is to share your truth. We owe it to our humanity and our short time among other humans to respect the truths that are shared with us. – Nick Burd

    Websites are working and the word is getting out. I was pleased with this year’s collections of content. What I’m concerned about, as per usual, are challenges and censorship that don’t even reach the physical items on the library shelves. What about this Salinger book? Worldcat shows 40 copies of it, a handful of which are in the US, and the reviews of it haven’t been so great anyhow. But the idea that the book wasn’t obtained and removed, it was never obtained in the first place (as we see with so much born-digital content that we can’t even get in lendable format) opens a door to all new ways that libraries can not get books. The old challenges (dirty cowboy? really? do not google that) remain and new ones appear.

    3 Comments on The annual banned books week roundup for 2013, last added: 9/25/2013
    Display Comments Add a Comment
    3. The FBI, and whether they’ve been here or not

    the fbi has not been here

    Hello, I was away for the summer. It seems that there has been some activity. If you’re here because you heard about my The FBI Has Not Been Here signs, here is a link to the page where I first mentioned them, back in 2005 or so. Back when this idea was getting batted around it was originally because the USA PATRIOT Act was concerning people, the idea that if you even got a National Security Letter not only would it compel you to turn over records, but it also prevented you from telling anyone other than your legal counsel. This sort of sucked and so people fought back. Most notably the people from Library Connection in Connecticut who got the gag order part of the USA PATRIOT Act declared unconstitutional. And you may have read about Brewster Kahle talking in the New Yorker about what it’s like to get a National Security Letter. Brewster is one of the strongest advocate for the right to privacy (and libraries’ right to defend their patrons’ privacy) and even he was sort of freaked out by this. Now that we’re looking into the face of the NSA looking into damned near everything and their heavy-handed tactics to get corporations to comply with them, it’s almost quaint thinking that we were just afraid of the USA PATRIOT Act. You can read more about the idea of “warrant canaries” here. I certainly didn’t think them up, just got a little traction with this one. Oh hey look there is this image over on Wikipedia’s warrant canary article. That’s nice.

    4 Comments on The FBI, and whether they’ve been here or not, last added: 9/11/2013
    Display Comments Add a Comment
    4. The global data privacy power struggle

    By Christopher Kuner


    Tension between different regulatory systems has long existed in certain areas (think of the disagreements between EU and US competition regulators regarding the aborted GE-Honeywell merger in the early 2000s). A similar power struggle is currently underway between different legal regimes regulating the collection, processing, and transfer of personal data (variously referred to in different legal systems as “data protection”, “data privacy”, or “information privacy” law), one that will shape the world in the 21st century.

    Data protection law has traditionally been viewed as a dreary subject of interest only to a few specialists. But whether it involves filling out government forms, purchasing items on the web, communicating with friends and relatives online, or checking in for a flight, almost every activity we engage in nowadays involves the processing of personal data. The growing importance of data processing is reflected in the large number of countries (approximately 100) around the world that have enacted data protection laws, and the countries and international organisations (including the European Union, the OECD, and the United States) that are currently in the process of revising them to meet the challenges posed by globalisation and the rapid growth of the Internet.

    Much personal data routinely flows across national borders, and the same data processing may result in the application of multiple laws. The ease with which data flows internationally also means that data privacy law has become a point of competition between different legal systems, with each one striving to achieve the seemingly impossible goal of simultaneously protecting the privacy of individuals, striking a balance between privacy and other important values (e.g., public security), and furthering economic growth.

    This competition has been most pronounced between the European Union, which has recently asserted that other countries should follow the “gold standard” of its data protection legislation, and the United States, which believes that its system is even better. Such international regulatory spats illustrate that nations too often view the subject largely as a way to score political points, and that they have failed to grasp some basic facts about the processing of personal data:

    • Protection of data privacy is not just a transatlantic issue. Data protection laws have been enacted all over the world, including by regional organizations (APEC, ECOWAS, and others) and dozens of nations in Africa, Latin America, and Asia.
    • It is also not just an online issue. Nearly every economic and social activity nowadays involves the processing of personal data, including the most basic ones. Too often regulatory attention focuses on the online “flavour of the month” (e.g., social networks, search engines, etc.), and fails to recognize that data processing has become embedded in every aspect of society.
    • And it is not just an economic issue, but one that can help further important developmental goals as well. For example, the UN Secretary General has begun an initiative called “Global Pulse” involving projects such as the use of data analytics to better understand the global state of various infectious diseases, and using a centralized text messaging system to allow mobile phone users to report on people trapped under buildings following an earthquake, among others. Data protection law is currently not conceived to facilitate the large-scale use of data mining for purposes related to development, public health, and similar goals, but these uses will greatly increase in coming years, and will challenge our assumptions about the purposes and structure of regulation.


    Part of the problem is that while data protection and privacy issues have global ramifications, the legal framework for them is still very much a matter of local or, at best, regional regulation. While some regional organizations (in particular the Council of Europe) are attempting to become more global, there are substantial differences in the way the subject is viewed in different countries and legal systems. In contrast to some other areas of the law, there is also a lack of legal instruments and institutions of a global scope covering privacy and data protection.

    Legal regulation of data processing often stands in tension with economic pressures that encourage the processing and transfer of personal data, and political pressures that inhibit the development of coordinated and coherent regulation. States are only too happy to adopt legal requirements for the private sector that they are unwilling to comply with themselves (e.g., with regard to data processing for law enforcement purposes), and technology to process personal data advances faster than the law can keep up with.

    From being considered a niche area, data protection law has evolved to the point that it is hard to find areas of human endeavour that it does not concern. The way that the struggles over data protection are resolved in the coming years will determine the kind of world we live in, and the kind of Internet we have.

    Dr. Christopher Kuner is editor-in-chief of the journal International Data Privacy Law. He is author of European Data Protection Law: Corporate Compliance and Regulation, and the forthcoming book Transborder Data Flow Regulation and Data Privacy Law in which he elaborates some of the topics discussed here. Dr. Kuner is Senior Of Counsel at Wilson Sonsini Goodrich & Rosati in Brussels, and an Honorary Fellow of the Centre for European Legal Studies, University of Cambridge.

    Combining thoughtful, high level analysis with a practical approach, International Data Privacy Law has a global focus on all aspects of privacy and data protection, including data processing at a company level, international data transfers, civil liberties issues (e.g., government surveillance), technology issues relating to privacy, international security breaches, and conflicts between US privacy rules and European data protection law.

    Subscribe to the OUPblog via email or RSS.
    Subscribe to only law and politics articles on the OUPblog via email or RSS.
    Image credit: Laptop keyboard with fingerprint enlarged by magnifying glass – computer criminality concept. Image by Jirsak, iStockphoto.

    The post The global data privacy power struggle appeared first on OUPblog.

    0 Comments on The global data privacy power struggle as of 1/28/2013 9:10:00 AM
    Add a Comment
    5. Privacy in the App World: Learn About It Now

    iphone home screen Over the past few weeks there have been several news stories about the ways in which mobile device apps can, and do, infringe on the privacy of users. The news pretty much broke when it was discovered that the social app, Path, was copying user address books without notifying users of that. Since the Path news came to light, people have discovered that that app was, and is, not the only app copying user information without notice.

    As the Washington Post noted in their article on the FTC report regarding privacy, apps, and children the landscape in the area of apps and privacy is something like the digital wild west. It’s all new territory and developers and users are learning what works and doesn’t work and how to marry safety and privacy with business. Many of us are now at least a bit savvy about user privacy in a web-based social media world. A world in which Facebook changes its privacy features on what seems like a weekly basis and Google is making changes to their privacy policy on March 1. Now is the time to become savvy about privacy in a mobile device/app world and to have conversations with teens about how they stay safe in these environments. A good way to get started is to:

    • Read the articles linked above to become familiar with the issues and also take a look at this short slideshow, from Larry Magid of SafeKids.com, about ways to make sure your privacy is protected in the app world.
    • Start talking with teens about the apps they use and how they can guarantee that when they use them their privacy is protected. Brainstorm ways that they can check-out how an app does and doesn’t use personal information. Perhaps setup a project in which teens do some research in order to find out what apps have the best privacy track record and which are lacking.
    • Become familiar with apps. If you haven’t used apps on a smartphone or tablet make sure you spend some time doing just that. Ask friends, teens, or colleagues if you can take a look on their devices if you don’t have one yourself. The only way to really be informed is to have some first-hand experience. A great way to find out what apps are worth checking out is via the YALSA App of the Week column on this blog.
    • Don’t assume that because of these breaches that all apps are bad and people should just stop using them. That’s not true, all apps aren’t bad. And, people aren’t just going to stop using them. Apps provide a great deal of useful tools and information to children, teens, and adults. We all just have to get really smart about what’s going on behind the scenes. In his New York Times article Nick Bilton gets to this point very well when he states, “The argument that if consumers care about their privacy they shouldn’t use these technologies is a cop-out. This technology is now completely woven into every part of society and business. We didn’t tell people who wanted safer cars simply not to drive. We made safer cars.”

    Now is the time to gain the skills and

    Add a Comment
    6. the Kindle lending experience from a patron’s perspective “a wolf in book’s clothing”

    Cuneiform tablet on Kindle
    [Kindle image by Tim Spalding, thanks Tim!]

    I went to a staff meeting on Friday at the local library where I sometimes work. We did some strategic planning, some walking around the building looking at stuff that could be improved, and some “how to download various digital media format” exercises. We use Overdrive via Listen Up Vermont which gives us access to audiobooks and ebooks in EPUB and Kindle formats. I’m pretty okay at this sort of thing so we clicked around and saw how stuff worked and had a few little glitches but basically stuff was okay. I’ve been following the Amazon book lending story through the blogs the past few weeks and I’ve been skeptical but more curious than anything. I don’t have a Kindle but I’ve seen how popular they are and I was curious how this would all work. Well, as some bloggers have pointed out, it sort of doesn’t. Or, rather, it seems to require compromises to our systems and more importantly to our professional values. I’m hoping these issues can be resolved, but honestly if we can’t lend with some modicum of patron privacy, we shouldn’t be lending.

    This is all leading up to an email exchange I had with a reader who was wondering the best way to raise concerns with his librarian about the user experience of borrowing a Kindle book from his library to use with the Kindle app on a non-Kindle device. Apparently, while the process to obtain the book wasn’t too difficult, the process to actually get RID of the book once returned [without a lot of pesky "hey maybe you should BUY this" cajoling] was actually fairly difficult. The default settings are, not surprisingly, strongly urging that the patron purchase (not renewal, not some sort of overdue notification) the book that they have just “returned.” I’ll let the patron speak for himself on this process. His name is Dan Smith and this is reprinted with his express permission.
    ______

    My first experience at “borrowing a Kindle book from the library” has left me with a bad taste in my mouth. It did not feel like borrowing a book from a library. It felt like a salesperson had sold me a book with a “no-risk free home trial” and was pestering me to buy it at the end of the trial period.

    I feel that Amazon’s commercial promotion is excessive, and imposes inappropriately on public library patrons. Would you allow distributor’s rep to stand in the hall, grabbing people on their way to the return slot, saying “Stop! Why RETURN it when you can BUY it instantly for just $12.95?”

    Yes, some of the irritations can be sidestepped, and as a savvy user I now know how. But Amazon took advantage of my innocence.

    FIrst, the book was all marked up! Dotted underlines here and there on almost every page. It was like taking out a library book and finding someone had gone over it with a highlighter! Amazon allow “library” ebooks to be marked and annotated. Instead of cleaning them up for the next patron, it leaves them in place, and encourages you make your own marks for other people to see. I thought this was just some misguided idea about social networking, but it’s more sinister than that.

    I turns out that there is a global setting, “Popular Highlights,” which controls whether you see these marks. B

    15 Comments on the Kindle lending experience from a patron’s perspective “a wolf in book’s clothing”, last added: 11/15/2011
    Display Comments Add a Comment
    7. Privacy law: a 10 minute tutorial

    By Mark Warby


    My mum told me the other day that she found all this publicity about privacy, super-injunctions, and Twitter most confusing. So do I, because the way it is reported seems to bear little resemblance to the world I thought I worked in and knew. So in case anybody else out there is befuddled I thought I would have a go at clarifying things by providing a glossary. Here are some of the key terms, and some definitions. In some cases I have offered alternatives, to help understanding.

    A bit of cross-referencing is necessary here, so I have used asterisks to mark out terms you will find explained elsewhere in the glossary.

    Privacy law glossary

    Apply to the court: (1) what a person has to do if they want to obtain an injunction* (2) what any person has a right to do if served with or notified of an injunction* with which they disagree, and want to challenge (3) an expensive and uncertain alternative to Contempt of Court no 2* (4) see Waste of time and money.

    Appeal: (1) what any person can seek to do if a court makes an order that affects them with which they disagree (2) see Apply to the Court no 3 (3) see Apply to the Court no 4.

    Contempt of court: (1) speech or act which defies an order of the court, or defeats or undermines its purpose (2) see Making a Mockery.*

    Court of Appeal: (1) one of the Houses of Parliament (2) Twitter (3) place staffed by Judges* to which you can go to obtain a fair hearing and challenge an injunction you disagree with (4) see Apply to the court nos 3 and 4.

    Democracy: system of government using. See Votes.*

    Fair hearing: (1) a fundamental human right (2) what people go to a court to get, when asserting their rights (3) reading Twitter, not consulting the people affected, deciding unilaterally what is right or wrong, and announcing it to the world.

    Freedom of expression: (1) unequivocally good thing in all possible circumstances, when exercised by the print media or online (2) one fundamental right which may come into conflict with another, namely privacy*, so that a delicate balance has to be struck.

    Gagging order: bad thing; order of a Judge that prohibits something being said that ought to be made known.

    Hemming: fearless campaigner for the freedom to use parliamentary privilege to name with impunity well-known people who have obtained injunctions* from Judges* to prevent disclosure of information in the public interest* (2) not.

    Injunction: (1) court order which prohibits things being said or done which the court considers ought not to happen (2) gagging order* made by a Judge.*

    Issuing: (1) what celebrities do with injunctions, apparently (2) the act of starting legal proceedings, preliminary to asking a court to rule on a claim.

    Judge: (1) person who makes it up as they go along, treats freedom of speech with contempt (2) fantasist with delusions of omnipotence (see also Unelected*) (3) individual appointed by the state to decide disputes about legal rights after a fair hearing.*

    King Canute: see Judge no 2*. See also next section.

    Making a mockery: (1) an exercise of freedom of speech* on Twitter or otherwise which involves deliberately disobeying a court order, undermining its effect, and so demonstrating Judges to be King Canute* (2) see Contempt of Court.*

    Parliamentary privilege: fundamental right of any MP to do with impunity an act which would be a contempt of court*.

    Privacy rights: (1) bad thing; synonym for adulterous

    0 Comments on Privacy law: a 10 minute tutorial as of 6/22/2011 2:14:00 AM
    Add a Comment
    8. Hey remember the USA PATRIOT Act?

    The ACLU has made a useful post talking about the Department of Justice’s released statistics about their surveillance activities. Surveillance is up. Section 215 is sunsetting. Osama is dead. What now?

    The government more than quadrupled its use of secret court subpoenas, known as 215 orders, which give the government access to “any tangible thing,” including a wide range of sensitive information such as financial records, medical records, and even library records. In 2010, the FBI made 96 applications, up from just 21 in 2009.

    4 Comments on Hey remember the USA PATRIOT Act?, last added: 5/11/2011
    Display Comments Add a Comment
    9. privacy and library data: email, IPs and &c.

    I’ve been reading with interest the news stories lately about Epsilon. For those of you who don’t know Epsilon is a company that does marketing. Many companies give Epsilon customer lists and Epsilon uses that information to, say, email you about the latest Hilton Honors promotions. Except that there was a data breach and Epsilon lost up to 250 million email addresses

    along with information such as who those people were customers of. So, for example, they’d have my email address and the knowledge that I was a Hilton Honors member. So, a lot of people got emails in the last mont from companies saying “Um, be especially on the lookout for phishing attacks” and a lot of people were asking “Why did Epsilon have my email address in the first place, didn’t I sign a privacy policy with Company X?” And the answer is complicated. When you let Hilton Honors use your information to send you marketing information you are, in a way, letting them give the email address to marketing companies.

    The reason I care about this at all is two reasons. One, there is a useful analog with libraries and how they handle their email lists of patrons. Obviously patron data is private and comes under whatever privacy laws a state has and whatever policies the library has. But is a library allowed to market to patrons? Or give these lists to peopl to market on the library’s behalf? This was the concern when the public library in Dixon California emailed patrons to let them know about ongoing library renovation plans and asked them to consider making donations. People who are not pleased with the library renovations, the Dixon Carnegie Library Preservation Society, is arguing that the librarian acted improperly when they gave patron email addresses to a consulting company without patron consent. Now let me just state I pretty well side with the library on this one, but it’s sure to be an increasingly contentious topic as libraries have more and more diffrent kinds of patron data to keep private.

    And the second reson is just a cautionary tale. Many people with iphones are aware by now that the phone tracks where you go. I mean it has to in order to be a phone, but it stores this data in unencrypted form on both the phone and the synced compueter, forever. This means that anyone with access to a simple open source tool such as this one can make lovely maps like the one above. Good to know, and good to understand. As libraries move more towards mobile applications and mobile awareness generally, understanding how this sort of data works will be an important part of making sure we know how, when and why to keep it private.

    5 Comments on privacy and library data: email, IPs and &c., last added: 4/23/2011
    Display Comments Add a Comment
    10. The New Art of Conversation - Nicola Morgan

    In the last week, two blog posts that I've commented on have found themselves in The Guardian. One was Lucy Coats' trenchant post on ABBA about A Certain Person and his unpleasant brain injury comment. The other was independent bookseller Vanessa Robertson's equally trenchant piece about World Book Night. I’m interested in what happened to them and the appended comments and in what this means for all of us.

    After Vanessa's WBN post, I'd left a comment, among many comments from other people, and mine was picked up by a journalist and quoted (well, half of it) in her subsequent Guardian piece. No other comment was quoted by name. In the Guardian, my quote was prefaced by the statement, "Author Nicola Morgan was among those happy to air objections..." This implied that I'd been asked by the journalist. Actually, she had tried to contact me but my phone was off while I was doing school talks and by the time I got her message it was too late: her deadline had passed. One might think that because I’d commented, I was de facto “happy”. Well, yes: I was happy to comment amongst all the other commenters but the small but important difference now was that my comment had appeared on another forum, in print, with another headline, and taken out of its original discussion. It had been, in effect, re-contextualised by someone else. I am not annoyed, because I utterly stand by what I said, and the journalist's piece was good. But it got me thinking.

    In Lucy's post, one commenter's remark was also taken and used in the Guardian piece on that subject, and later, on ABBA, that commenter expressed a similar surprise to mine. I’m not criticising journalists, by the way. There may be an issue of asking permission but I’m not interested in that just now. Ditto any copyright issues to do with quoting from blogs.

    So what am I saying? I am saying that the internet has changed something about conversation. Blogs, unless actually private and hidden, are public, and when we comment, although it might feel like a discussion where we're all in the room, we are putting our views out there in a very public way. We cannot then control where our comments will appear. And it's permanent. The internet doesn’t forget. The internet has blurred the once clear divide between the spoken word and the printed word. It's more permanent than either and possibly more powerful.

    In a good old offline conversation, you know who is there, who is listening - unless you are being bugged - and you know it is unlikely your words will find themselves discussed in public elsewhere. You can make mistakes, change your mind, clarify what you mean if someone doesn't understand. No one can take your words out of context because all those in the discussion know the context. The discussion is also moderated by those in it. It is controlled and yet can be wild and free ranging. There is little at stake other than the opinions of those present.

    In an online conversation, the new conversation, all that is different. There is much more at stake, much more that can go wrong, much less control. You don't know who's listening and you don't know what will happen to your words, except for one thing: they will remain.

    We also need to realise that Facebook and Twitter conversations are now watched by journalists. You make comments on Facebook and those comments can be quoted or passed on to people outside your FB circle. I have heard of people having to "defriend" others because they are worried that those people, not being actual friends, may use their comments against them. And I worry about the unguarded comments that some people make on Facebook, because FB sometimes feels like a party, with a

    11 Comments on The New Art of Conversation - Nicola Morgan, last added: 2/18/2011
    Display Comments Add a Comment
    11. Privacy Please: It’s Your Right

                You go to the hospital, lets say the emergency room they have you laying on a narrow bed, your barely dressed and afraid to move; and people are coming in and out like it is the local supermarket. You have the right for privacy and you should demand it.

    Image via Wikipedia

     

    The worst is when they are not too sure why your have hives and a fever, they seem to bring in several medical students and now they are discussing your situation. WHY!

    After they leave the curtained area, you ask the person with you, or the nurse why is it necessary that so many people have to come parading around you. If told that this is a teaching hospital, inform them that you don’t recall signing anything that said you could be put on display. You want to be diagnosed, cured and sent home!

                How about the pregnant woman, who goes into labor and constantly being checked on, by a different person every hour; or they look in through the little square glass window. Where is your right to privacy? The longer your labor the more faces you will see.

                So the next time you find yourself staying in a hospital, let them know how you feel; it is your right to have privacy. It does not matter if you’re in the Emergency Room, Recovery Room, or you have been admitted and people just wonder in and out. If after speaking the staff, ask for a supervisor; and voice how you feel.

                Some people are afraid to complain, but you should not; others will wait until they are home to complain, as not to be treated rudely during your stay. If it is your intention to file a complaint after you are discharged, make sure you take down names, along with the date and shift that they worked.

                Service is very important, and if your feel that your personal privacy was invaded; you have the right to let the Board of Directors and supervisor know!

    Add a Comment
    12. Ten Things I Hate About Our World

    The ten things I hate about our world the way it is today, often interact with each other.  There are:

                  1)  Corrupt political systems

                  2)  Corrupt Criminal Justice System

                  3)  Corporate Corruption

                  4)  Poverty

                  5)  Pollution

                  6)  Greed

                  7)  Abuses of all kinds, people and animals

                  8)  government waste and oppression

                  9)  Political Correctness

    Our political leaders are responsible for many ills of our world. They are the ones who are elected to oversee our welbeing, and ironically it is their own welbeing that they end up overseeing. The addiction to power, wealth and control, rots their common sense, and concern for those who look up to them. They get submerged into self concern and greed. They quickly forget the purpose of their authority as soon as they are given the freedom to rule.

    Corporate big wigs work together with politicians in schemes that will reap them fortunes at the expense of those they are in charge of overseeing. All this self interest leads into a chain reaction of all the other things. Political power is what steers every facet of society.  Nothing can be done without government  being involved in some way.

    There is no such thing as privacy or freedom anymore. The evils of governments the world over have managed to destroy the world, by allowing corporations to manipulate and pollute at will, for their own benefit. Our social security numbers are used to track our every move. We can not get utilities turned on without giving our social security numbers. We now can not even stay at a hotel, rent a car or make a phone call on a public phone without having a credit or bank card.

    All these agencies and companies sell our personal information to each other, If we move to another State and get a new phone number, all these people phone us before we even unpack.  We are all being SPIED on, all the time.  Our personal information is spread across the computer for the world to find. If a hit man were looking for us, they would have no trouble finding us.

    Everyone wants a credit or bank card instead of cash. That way they have access to your bank funds, and they legally commit fraud by taking out more then you allow them to, and they get away with it. The banks are in it with them. If you tell a store, or car rental etc. not to take out more than a certain amount for whatever, because you know that you will bounce checks and be in a mess if they do, they agree to not do it, then they do it anyway.

    They invent charges that they did not tell you about, and simply get them out your account. When your checks begin to bounce and you, try to talk to the bank, they only say that “YOU gave the company your account number or bank card, and they have nothing to do with it.” The bank rips you off with high over drawn fees, and the people who demand the cards, take what they want and never get punished for it. We are cohurst into becoming victims, and we can’t do anything about it. But let us steal like that from them, and we go straight to prison for years.

    Many employers are now getting in on this band wagon. They require direct deposit in order to pay you your wages. We do not have the freedom for ourselves, to decide if we want to pay cash to avoid all the rip off schemes that are being used, by way of credit and bank cards.

    Landlords are also culprits of greed. They charge a non refundable fee to fill our an application to rent an apartment. If ten people fill out the application and they find reason to deny them, they keep all that free money for themselves. They charge between $20.00 to $50.00, and sometimes even more for this rip off game.

    Landlords now require tenants to sign a lease that is usually for a year. This is holding the tenant HOSTAGE to the lease, so the landlord can be guaranteed rent money for a year, whether the tenants wants to stay there that long or not. If the tenant moves out they break the lease, and the landlord can garnish their pay check to get the rest of the rent money for the remainder of the lease. 

    That is not enough greed on the part of the landlord. They also require a large deposit, and the first and last months rent, before the tenant can even move in. If you want your beloved pet to move in with you, they can refuse that you have a pet, or they charge you an outrageous deposit, and an added amount on your rent, to keep a pet. A poor person can not afford all these fees and rip offs.

    Landlords have all sorts of loop holes to do as they please. They can make up things to evict you, and it’s your word against the landlords, and the courts always side for the landlord. Once you are evicted, you are placed on a black list so that other landlords can charge you higher rent for being on the list,and slumlords become like vultures who come to the rescue of those on the list, allowing them to move into their deplorable housing  as if you are a criminal, and they are giving you a break. Then they charge the same rents as the decent apartments go for.

    Landlords keep your deposit, claiming all sorts of damages that were not your fault. The courts also side for landlords if you dare to take them to court to get your deposit back.  Judges don’t even want to hear witnesses or look at pictures that you may provide to defend your side. They don’t care. Landlords are Slave master to Tenant Slaves. Then they wonder why former tenants come back to break out windows and destroy the place.

    Everyone is trying to ride the gravy train on the backs of those who are just trying to do their best to survive. Deceitfulness and greed has spread like a cancer everywhere. Poverty and homelessness has become epidemic. It has become a dog eat dog world, and the strong survive. The root of all evil has taken over with the “love” of money.

    Poverty is the result of those who commit evil. Poverty is created because of GREED. Those who have financial security resent sharing with those who struggle to survive. There is no fairness or justice for the poor. Instead of seeking ways to repair the damage man has done on this earth, the wealthy in politics waste billions to fight useless wars, and explore space.  They do not even appreciate the beautiful earth we have right here. They want to go and find another planet that they can destroy, like they are doing to this one.  Those are the things I hate about this world.

    Add a Comment
    13. some odds and ends from the mailbag

    As per usual I’ve returned from holiday travelling with a lot of cool links to share and the admission that I’m behind on my blog reading — and this is me who is never behind, this is all deeply distressing to me — and I bet you are too. Anyhow, some things I’ve enjoyed reading over the past few days. I’m putting a Computers in Libraries column to bed today and it’s talking about widgets. I like talking about widgets.

    • Phone box becomes mini-library – small community in Somerset turns old phone box into a lending library/free box for books.
    • Portsmouth (NH) public library is having a documentary showing of DIY Nation + artist get together this weekend which looks like fun and a nifty type of program to boot. Plus I sort of stupidly like that they can link right to the book in their catalog. It’s 2009, how many of us can do that yet?
    • One line update/coda to the Des Moines photography situation from the DMPL marketing manager “At this month’s meeting, our board voted to remove the requirement that permission be granted for photos to be taken in our library.” Woo!
    • Curious to know what’s going to happen at the Hayward (CA) libraries when they go to a Netflix model for lending [pay up front, then no overdue fees]. Looking forward to seeing the crunched numbers at the end of this.
    • In another neat model, ArchivesNext reports on the Amsterdam City Archives’ “you ask we scan” approach to digitization. There are some linked slideshows and further data. Interesting model.

    0 Comments on some odds and ends from the mailbag as of 1/1/1900
    Add a Comment
    14. The Age Of Privacy For Young People Is Far From Over

    In my post-baby-sleepless-yet-attempting-to-work daze, I've been waiting for a story to move me to post again on Ypulse. I guess I should thank Mark Zuckerberg, and the audaciousness of his statement about "The Age of Privacy" being over for... Read the rest of this post

    Add a Comment
    15. ANGRY JENNIE

    Two book-related things today that have me all in a dither:

    1. Amazon hasn't put the MacMillan titles back yet. There's a book I need for class and I need it next week. None of the local library systems I use carry it. I can't get to an independent until this weekend, when we're supposed to get 17 inches feet of snow, so even if they ARE open, I won't be able to get there. I could get to Barnes and Noble tomorrow night, but they don't have it at the store, so I had to order it from their website. And pay shipping. (I have Amazon Prime. I don't pay for shipping.) Grrrrrrrrrrrrrrrr.

    2. I live within walking distance of a branch of my local library. Given that I spend all day every day at a different library in a different system, I usually don't browse. I usually just look up books that my work-system doesn't own or has a long wait for, and put them on hold in my home-system. I went to pick up a book after work today (Yes, I went from one library to another. I am that nerdy.) Now, they have all the hold books on shelves near the check out desk so you can just go over and find yours and bring it up to the desk. I know this is a hot new trend in libraries right now but...

    I will probably STOP using the Arlington libraries because of this. It is such a HUGE breach of reader's privacy and given that I pretty much ONLY use them for hold books and I just can't agree to this system... bad bad bad. Yes, they shelve the books spine down, so it's harder to see what the books are, but that just makes it easier to see who has a book on hold and it's not that hard to flip through and see who's requesting what.

    Personally, I'm not very private in my reading habits (which you know, as I blog about EVERYTHING I read right here) but the principle of the thing has me very shaken up and upset and pissed off.

    I'm more annoyed at the Amazon/MacMillan thing because they're private businesses and while they're both being stupid, well, it's business and they can do that.

    The library, however, is breaking the ALA's Code of Ethics:

    We protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted.

    So, I will be writing a letter to the director of the system and seriously rethinking my library use (Because, I do spend all day at another system, so I'm a bit privileged here, I know.)

    But here's the thing-- just two years ago, Arlington libraries had a PR flap about this very thing. And, unlike the branch in the article, these books had no covering, the only concession made to privacy was the books being shelved spine down, which may have not had anything to do with privacy at all-- it makes finding your name (and your neighbor's) much easier...

    9 Comments on ANGRY JENNIE, last added: 2/6/2010
    Display Comments Add a Comment
    16. Spies Among Teens

    A couple of days ago a news story broke about a suburban Philadelphia school spying on students in their homes using the webcams on school-issued laptops. The story has gotten a lot of play, rightly so, and it looks like the FBI is going to investigate.

    There’s no doubt it’s creepy if school officials can spy on students without the students, or the parents, knowing about it. As I’ve been thinking about this story over the past couple of days I’ve been thinking about how so many adults that I talk to are worried about teen privacy. These conversations always focus on making sure teens know how to be safe and smart about their online privacy. But, what do we do when it is the adults who are supposed to be teaching teens privacy skills, that abuse a teen’s privacy?

    There’s no doubt it’s creepy if school officials chose to spy on students without letting parents or the teens know about the decision. Yet, if the officials had let the parents know that this was going to happen, would it have been right, even then to go forward with the spying? I’m always talking with teachers and librarians about how we have to show respect for teenagers and that one sign of that respect is trust. What kind of trust can we build with teens if adults in their world find it OK to spy on them, perhaps in their most private moments?

    There’s no doubt it’s creepy if school officials chose to spy on students. What if instead of turning on the cameras remotely, parents and school officials actually talked with the teens in the community about what’s going on in their adolescent lives? Is it really so hard to do that? Is it really so scary to have a conversation with a teen (or group of teens)?

    Imagine if you were a teen in this PA community and learned that the school issued laptop was possibly being used as a device to secretly watch you. What would you think about the adults in the community? How would you feel about your privacy? Who would you feel comfortable trusting?

    Of course, I do have to say, that we don’t know the full story, yet. But, doesn’t it give you pause that school personnel have the capability to spy remotely?

    As you think, check-out these articles on the same story:

    bookmark bookmark

    Add a Comment
    17. Privacy through Passwords

    This week is  Choose  Privacy Week. To celebrate I wanted to write a post about passwords.

    First, how many of you use the same password for every site you log into? Do you have the same user name as well?

    I know often times we hear IT and other computer professionals tell us to never use the same password, but in reality we are often over worked, and have more important things to do with our brain cells than memorize a bunch of silly passwords (like memorize a bunch of book titles) Right?

    I used to feel the same way until I read a blog post about how easy it is to guess one’s password.  Follow the link to see how easy your password is to hack, and then check back here for tips to make your password more secure.One of the simplest tricks I’ve heard it to establish a base password like “password” that you memorize, then add something for each site you visit. For example if you set up a password for Google you can use “passwordg”* or “googlepassword”* Making each password you set up unique, but still memorable.  Since most websites require you to use a combination of letters and numbers you might consider including these elements in your password base. *Note Password is just an example and not a very good choice for a password base

    Another tip is to use a passcard to create a truly random and secure password. This is ideal for create a password for secure information like your online banking profile, or library’s personal files. You generate a unique grid of random letters and digits on it can print this out to carry in your wallet.  Select a pattern to use from the card as your password. This is more secure than just writing down the password, because hackers/snoops would still have about 10,000 password options to choose from the card, and they probably won’t readily know your user name.

    If you want to be extremely secure, or are extremely forgetful you can use a password management add-on for your browser. Its recommended that you use a password to protect all your stored passwords, and make the password to the management software separate and unique from one your normally use to prevent it from being easily hacked.

    Top Password management software are:

    Do you have any tips to share to keep your information secure?

    bookmark bookmark

    Add a Comment
    18. miss manners misses

    I was interested to read the Miss Manners column where someone complains about a rude librarian. I usally enjoy Miss Manners but was a little bummed to see her playing out old tired stereotypes, but I did enjoy the comments (yes, one of which is mine) telling her that librarianship is more complicated than she thinks.

    6 Comments on miss manners misses, last added: 5/25/2010
    Display Comments Add a Comment
    19. Care/Don’t Care

    Yesterday Twitter (and the web in general) was abuzz with news and reports related to technology, and in particular young people and technology. Was all the news worth paying attention to? Was all the news care-worthy? Here are some thoughts:

    Care: Reputation Management and Social Media
    The Pew Internet in American Life Project released a report about reputation management and social media. The focus of the report is on how people, of all ages, manage what others know about them through social network environments.

    graph of percent taking steps to limit personal info online A key finding in the Pew study is that young adults – defined in this instance as 18 to 29 – are very likely to change their privacy settings within social media environments. This age group, more than older users of social media, do know the impact that the information they make available online has on their reputation. While this doesn’t mean that we as librarians and educators don’t need to educate young people about privacy implications of what they post online, it does suggest that conversations with teens about online privacy need to be framed not around “you need to be private” with an assumption that young people don’t know that already, but instead focus on, “here’s how to be private” with an understanding that making decisions about and knowing how to use privacy settings in social networks affectively might be difficult.

    The implications section of the Pew report includes this text:

    “Young adults, perhaps out of necessity, are much more active curators of their online identities when compared with older adults. When they change privacy settings, delete tags and comments, and request that information about them be removed, they are demonstrating a desire to exert control over the content they share and the tide of information that others post about them online. However, certain privacy controls on social media sites have become increasingly difficult to navigate. These changes, instituted after the data for this report was gathered, raise questions about the efficacy of users’ current efforts to restrict access to the information posted to their profiles.”

    And that leads me to

    Care: Facebook Updates Privacy Settings – Again
    For the past several weeks, Facebook has been in the news as the result of new services added to the social network. The new services are supposed to give users a better experience, however the launch of these services once again complicated the privacy settings on Facebook, they were pretty complicated already, and caused many to question what Facebook was up to.

    Because of the dissatisfaction of users with the privacy implications of the most recent Facebook update, Mark Zuckerberg, the founder and CEO of the company, announced yesterday that the privacy settings on the site would be simplified.

    Add a Comment
    20. Last Week in Review: Facebook = Fridge

    In reviewing the youth marketing landscape over the past week, any debate over the rise of social networking ended as Facebook exceeded half a billion users. Within the month of August, the number of people on Facebook will be greater than the... Read the rest of this post

    Add a Comment
    21. WIR – Where's Waldo?

    The biggest thing to hit the world of youth last week was the release of Places on Facebook, heralded as the mainstreaming of location sharing and instantly spawning a litany of Facebook Places privacy 'how-to' tutorials. As reported in the WSJ,... Read the rest of this post

    Add a Comment
    22. Ypulse Monthly Events Roundup: The Digital Privacy Forum, KidScreen Summit & More

    Today we're bringing you our monthly roundup of cool youth media and marketing events you or colleagues from your company may want to attend. If your company hosts an event relevant to the youth media or marketing space that you'd like Ypulse to... Read the rest of this post

    Add a Comment
    23. WIR – Privacy Redux

    Last week, the organizers of the PivotCon conference generously offered Ypulse a press pass to their NYC brand marketing event. The two-day event focused on the emerging Millennial consumer and new frontiers of social media marketing and provided... Read the rest of this post

    Add a Comment
    24. How to maintain your privacy on Facebook

    Privacy settings on Facebook are important and I cannot stress this enough. No matter whether it’s for games or work or marketing, setting your privacy right can avoid some embarrassing moments and data/identity theft.

    Facebook by default sets all Privacy Settings to Public. i.e. viewable by everyone. That means, if you have never visited your Privacy Setting page and customised it, anyone and everyone in the world can see all your information. If you’re someone who has no data on Facebook then great, don’t worry about it! But, if you have personal data, you better get cracking on customising it.

    So how do you set your privacy right?

    1. Click on the ‘Account’ tab on the right-top-corner of the page.
    2. Choose and click on ‘Privacy Settings’
    3. Privacy Settings

    4. Choose Your Privacy Settings. Spend some time on this page checking through your information. It’ll definitely be worth your time.
      Setting up privacy 1
      Click on ‘Customise settings’ to control who views your posts or shares. If you have created ‘Lists’ for your friends, doing this would be easier. Read my article Creating Lists on Facebook for more on Lists.
    5. This page has three main sections – Things I share, Things others share, Contact Information. Click on the drop down next to each sub-section and select the ‘Custom’ option.
      007 Setting up privacy 2
    6. In the pop-up that appears you can select who should see this type of data and who shouldn’t. You can also specify certain people by name or by list.
      008 Setting up privacy 3If you play games on Facebook, remember to add your ‘game list’ in the ‘Hide this from’ section for all sub-sections so your data is safe from gamers and strangers.
    7. Set-up your custom settings for all the sub-sections.
    8. Once you’re done. Click on the ‘Preview My Profile’ button (towards the top of the page) and check to see what information is visible and if you are comfortable with the world seeing that.
    9. It is a good idea to go through the settings for the following on your privacy page too -

    Basic Directory Information
    Applications and Websites
    Block Lists

    Add a Comment
    More from this Blog | Email This | Add a Tag
    25. Protecting Your Privacy Before You Get "The Call"
    Blog Icon
    2 Comments | Previous | Top |
    By: Susan Bradley, on 1/21/2011
    Blog: Mermaid's Musings (Login to Add to MyJacketFlap)
    JacketFlap tags:  stalking, privacy, Add a tag

    I read a discussion forum today about an author's struggle with privacy. We're not talking, "Hey I want to hide from my fans" but more of "Why are you showing up on my doorstep and how do you know where I live?".

    For years we write. We query.We get rejected, defeated, and heartbroken because we haven't found an agent or publisher. We keep our eyes on the prize though. A gorgeous, solid, hardback book with a stunning, artistic cover and our name written in bold letters. Finally an author's Holy Grail has been achieved.

    But now what? Hopefully, you'll sell the book, gather a few fans here and there. During this euphoric time in your life, the googling will start. People that love your work want to know more about YOU. So they search and with an overload of cyber information at their disposal, it should be easy to find out everything from your favorite meal to where your children go to school.

    It's a scary, scary thought. Hell, it's scary even if your not famous. Stalking occurs for a variety of reasons and not just to famous people.

    It's important to be savy now, before you get 'The Call' and before you're on the NYTimes bestseller list.

    Some of the suggestions were:

    *Have your personal information removed from spokeo.com
    *Use a PO Box or have all fan mail come through your publisher
    *Have an unlisted phone number
    *Have multiple phone numbers. One for personal use and one you can give out and change easily if you need to.
    *Have multiple e-mail addresss. One for personal relationships, another for fans, journalists, etc
    *Don't post information or pictures of your children on the web
    *Use a Facebook Fan Page rather than a personal page
    *Have all your Facebook setting set to friends and family only
    *Don't link to your family on Facebook and review your privacy settings or turn some information off like the city you live in
    *Have home security
    *When asked where you live for book jackets, press release, etc. give a vague geographic location or state like MidWest, Texas, New England

    With all the info out there, it's important to protect our privacy and loved ones now and not wait until our name appears on a book cover.

    2 Comments on Protecting Your Privacy Before You Get "The Call", last added: 1/23/2011
    Display Comments Add a Comment
    More from this Blog | Email This | Add a Tag

    View Next 11 Posts