Risks vary from person to person. For example, a Visa card data breach impacts anyone who uses these cards, but a person who does not have a credit card will not need to worry about this. Patrons that use social media need to consider their privacy settings on those sites, as well as the terms of service of those companies. Journalists may need to protect who they contact, in addition to the content of their conversations. Depending on your risk, you’ll need different privacy "armor" that's appropriate for your particular situation.
To help figure out patrons’ risks and needs, we recommend asking the following questions:
Luca, a single parent with limited digital literacy skills and limited English skills, relies on the library for access to computers and the Internet.
Jo, an artist who regularly comes to the library to do research about strange and sensitive subject matter on both library computers and her own laptop.
Sara is leaving a difficult family situation and uses the library computers and wifi to access social media, look for housing, and read the news.
Xav, an outspoken, politically minded twenty-something, uses the library computers to search for jobs.
Luca, a single parent with limited digital literacy skills and limited English skills, relies on the library for access to computers and the Internet. Today, she’s using the library to renew her unemployment insurance and food stamps, both of which ask her to provide sensitive information.
Cyberthieves could intercept her information and steal her identity, and siphon benefits away from her.
Getting her identity back and correcting her records would cost thousands of dollars and many, many hours.
Because Luca is not very familiar with internet technology, she’s doing little to protect herself.
Make sure she’s visiting official unemployment insurance and food stamp websites—as opposed to fake ones—and that these sites are encrypted.
She could also take steps to erase her browser history in order to ensure that no cyberthief could access her data by those means.
Learning how to create strong passwords is essential to her safety.
Finally, we recommend she makes sure to log off of the library computer terminals to ensure no one can access her accounts.
Jo, an artist who regularly comes to the library to do research about strange and sensitive subject matter on both library computers and her own laptop, is currently researching new forms of biowarfare for an upcoming art project. Jo is combing the library catalog for books and electronic resources available through the library, as well as conducting general web research to find out more information on these topics.
Because Jo’s project deals with topics that have been associated terrorist activity, the most likely entity interested in accessing their library searches and Web search history are law enforcement and national security agents wishing to protect citizens from terrorists.
The likelihood of government officials gaining access is not very high, because Jo is already protecting themself by using Tor, a service that allows users to anonymize http requests.
We also recommend that Jo avoid logging into any websites when conducting research to avoid any companies.
Sara is leaving a difficult family situation and uses the library computers and wifi to access social media, look for housing, and read the news.
Because things got really bad at home, she is worried that a particular family member will try to track her down and intimidate, bully, or physically harm her. The likelihood of this happening is high: for the past year, the family has depended on a family plan with their mobile phone provider. During that time, the whole family enabled phone tracking features. In addition, her family regularly shared passwords, making it possible for different members to post social media accounts in the account holder’s name.
The best recommendation for Sara is to immediately change any account passwords that were formerly shared and set up two-factor authentication on sensitive accounts, such as social media accounts, in order to keep her personal communications to herself.
She is also advised to open a new cell phone account not connected to her family, since call logs and messages are typically available to the account holder.
She should also change location settings so that any device that takes pictures does not store and share location information, such as in posted photos, and could consider making her social media pages private.
As an additional precaution, she could consider using a device lock, to prevent anyone from tampering with her phone.
Xav, an outspoken, politically minded twenty-something, uses the library computers to search for jobs. He contributes to many different fora for heated political debates. On Reddit boards, Facebook, and newspaper comments sections, he regularly expresses his opinion in animated way, including in capital letters. Xav also regularly posts personal pictures, such as shots of him partying on the weekend with friends, and has been known to provide status updates about his health.
Unfortunately, Xav’s public and polemical visibility online could be a liability: data analysis tools run by both lenders and potential employers could sift through social networks and other public fora and classify Xav a high risk-individual. This in turn could make it harder for him to get a job, a reasonable rate for a credit card, or obtain a loan. While it’s not easy to tell when he’s been data profiled, the threat of being discriminated against for merely being outspoken is nevertheless a possibility.
It’s recommended that he protect himself from the data profiling by employers and financial institutions by ensuring he is posting anonymously to online fora and changing social media settings to private.
Always use strong passwords. A strong password is something that’s hard to guess by someone who knows you and by a computer. You can use a password manager to both generate and store hard-to-remember passwords for you. You can also test password strength—not your real passwords, but similar kinds of passwords—on password testing sites like this one.
Use sites that are secure (e.g., use HTTPS) for personal transactions. Websites that are encrypted prevent anyone else but you—the sender making the request to visit a particular website—and the website itself from seeing the data traveling between your computer and the website. Many people come to the library because it is the only place they are able to conduct all sorts of very personal business, such as applying to a job, renewing unemployment insurance, and banking online. Any time you have to submit data you care about and don’t want anyone else but the recipient to see, make sure you see the HTTPS or padlock icon in the browser’s address bar.
Log out of a library terminal before walking away. When you are still logged into a terminal and walk away from your session, the person who sits down at the computer next may be able to see your web history, any sites that you are still logged into, and any documents you may have stored in the computer’s temporary drive.