{"id":8141623622,"title":"Protecting Patron Privacy: Safe Practices for Public Computers","handle":"protecting-patron-privacy","description":"\u003cspan style=\"color: #741b47;\"\u003e\u003cstrong\u003eMatthew Beckstrom \u003c\/strong\u003e\u003c\/span\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cstrong\u003eISBN-13:\u003c\/strong\u003e 9781610699969 \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e104 pages • \u003cspan\u003e6\u003c\/span\u003e\u003cspan\u003e⅛\u003c\/span\u003e \u003cspan\u003ex 9¼\u003c\/span\u003e \u003cbr\u003e\u003cstrong\u003eYear Published:\u003c\/strong\u003e 2015\u003c\/p\u003e\n\u003cp\u003eProtect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.\u003c\/p\u003e\n\u003cp\u003eIn a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.\u003c\/p\u003e\n\u003cp\u003eLogically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.\u003c\/p\u003e","published_at":"2016-08-19T14:00:00-04:00","created_at":"2016-08-19T14:00:39-04:00","vendor":"Libraries Unlimited","type":"Book","tags":["Publisher_Libraries Unlimited","Subject_Information Systems \u0026 Technology","Subject_Librarianship"],"price":7000,"price_min":7000,"price_max":7000,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":26926873798,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"9781610699969","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Protecting Patron Privacy: Safe Practices for Public Computers","public_title":null,"options":["Default Title"],"price":7000,"weight":200,"compare_at_price":null,"inventory_quantity":0,"inventory_management":"shopify","inventory_policy":"continue","barcode":"9781610699969"}],"images":["\/\/cdn.shopify.com\/s\/files\/1\/1418\/6818\/products\/9781610699969.jpg?v=1533235725"],"featured_image":"\/\/cdn.shopify.com\/s\/files\/1\/1418\/6818\/products\/9781610699969.jpg?v=1533235725","options":["Title"],"content":"\u003cspan style=\"color: #741b47;\"\u003e\u003cstrong\u003eMatthew Beckstrom \u003c\/strong\u003e\u003c\/span\u003e\n\u003cp\u003e\u003cstrong\u003e\u003cstrong\u003eISBN-13:\u003c\/strong\u003e 9781610699969 \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e104 pages • \u003cspan\u003e6\u003c\/span\u003e\u003cspan\u003e⅛\u003c\/span\u003e \u003cspan\u003ex 9¼\u003c\/span\u003e \u003cbr\u003e\u003cstrong\u003eYear Published:\u003c\/strong\u003e 2015\u003c\/p\u003e\n\u003cp\u003eProtect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.\u003c\/p\u003e\n\u003cp\u003eIn a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.\u003c\/p\u003e\n\u003cp\u003eLogically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.\u003c\/p\u003e"}

Protecting Patron Privacy: Safe Practices for Public Computers

Product Description
Maximum quantity available reached.
Matthew Beckstrom

ISBN-13: 9781610699969

104 pages • 6 x 9¼ 
Year Published: 2015

Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users.

In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research—if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices.

Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.

Sku: 9781610699969

Related Products