For the Sake of One Child: Privacy, Anonymity, and Confidentiality in Libraries

Q2 Arts and Humanities Journal of Information Ethics Pub Date : 2012-04-01 DOI:10.3172/JIE.21.1.12
Martin L. Garnar
{"title":"For the Sake of One Child: Privacy, Anonymity, and Confidentiality in Libraries","authors":"Martin L. Garnar","doi":"10.3172/JIE.21.1.12","DOIUrl":null,"url":null,"abstract":"What are the ethical considerations of providing anonymous access to the Internet in an age when child pornographers are using this technology to share illegal materials? The perennial dilemma of an open society is striking a balance between liberty and safety. Too much liberty, and people are free to commit horrible acts. Too much safety, and people are constrained in what they can think, say, and do. The balance tilts toward safety in times of war, or when fears (real or perceived) take hold in the popular imagination. When threats to children are involved, safety almost always wins out over liberty, as the concept of protecting even one child from harm, regardless of the cost, is a powerful rhetorical tool. As a 2007 case in Colorado will demonstrate, this balance poses a challenge for libraries offering public access to the Internet, especially if that access may facilitate criminal activity.While librarians often talk about protecting user privacy, it is user ano - nymity and confidentiality that are ultimately at stake. Distinctions among the three terms are necessary before continuing. A private act is not known to anyone except the person committing the act. Others can know about an anonymous act, but the actor's identity is unknown. Confidential acts are known by those, and only those, who need to know the actor's identity. A truly private act in a library is to take a book offthe shelf, read it in the library, and replace it without being observed by anyone. Even if an item is checked out using a self- check system and is never handled by a library employee, the library creates and keeps a confidential record for as long as the item is in use. Anonymous uses of the library include reading materials in view of others, whether staffor other users, and using computers that do not require a personally identifiable login.Colorado and ConfidentialityLibrary users in Colorado have good reason to expect protection of their confidentiality. As noted in its own annotations, the Colorado Constitution provides stronger privacy protections than the Constitution of the United States: \"The Colorado proscription against unreasonable searches and seizures protects a greater range of privacy interests than does its federal counterpart\" (Colo. Const. art. II, § 7). Additionally, an expectation of confidentiality in libraries is explicitly spelled out in the Colorado Revised Statutes: \"[A] publiclysupported library shall not disclose any record or other information that identifies a person as having requested or obtained specific materials or service or as otherwise having used the library\" (emphasis added) (Privacy of User Records, 2010; see Appendix A for the complete statute). The law provides the usual exceptions for responding to court orders and for \"reasonable\" administration of the library, but it is important to note the sweeping scope of what is protected. This legislation was adopted following John Hinckley Jr.'s attempted assassination of President Ronald Reagan. When Hinckley was arrested in 1981, one of the pieces of identification found in his wallet was his Jefferson County (Colorado) library card (Falsone, 1987). The library was then inundated with requests from journalists for Hinckley's records to see what he had checked out. Though the library initially refused to release this information, the county attorney advised that the requests had to be filled under the Colorado Open Records Act (2010). In response , the Colorado library community studied the confidentiality laws of other states and worked toward the eventual adoption of the Colorado Privacy of User Records legislation in 1983 (Falsone, 1987).A subsequent court case further strengthened expectations of confidentiality in Colorado libraries. In Tattered Cover, Inc. v. City of Thornton (2002), the Colorado Supreme Court found that bookstores could not be compelled to release information about a criminal suspect's purchases because the law enforcement agency had not demonstrated sufficient need for the records. …","PeriodicalId":39913,"journal":{"name":"Journal of Information Ethics","volume":"21 1","pages":"12-20"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Ethics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3172/JIE.21.1.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Arts and Humanities","Score":null,"Total":0}
引用次数: 4

Abstract

What are the ethical considerations of providing anonymous access to the Internet in an age when child pornographers are using this technology to share illegal materials? The perennial dilemma of an open society is striking a balance between liberty and safety. Too much liberty, and people are free to commit horrible acts. Too much safety, and people are constrained in what they can think, say, and do. The balance tilts toward safety in times of war, or when fears (real or perceived) take hold in the popular imagination. When threats to children are involved, safety almost always wins out over liberty, as the concept of protecting even one child from harm, regardless of the cost, is a powerful rhetorical tool. As a 2007 case in Colorado will demonstrate, this balance poses a challenge for libraries offering public access to the Internet, especially if that access may facilitate criminal activity.While librarians often talk about protecting user privacy, it is user ano - nymity and confidentiality that are ultimately at stake. Distinctions among the three terms are necessary before continuing. A private act is not known to anyone except the person committing the act. Others can know about an anonymous act, but the actor's identity is unknown. Confidential acts are known by those, and only those, who need to know the actor's identity. A truly private act in a library is to take a book offthe shelf, read it in the library, and replace it without being observed by anyone. Even if an item is checked out using a self- check system and is never handled by a library employee, the library creates and keeps a confidential record for as long as the item is in use. Anonymous uses of the library include reading materials in view of others, whether staffor other users, and using computers that do not require a personally identifiable login.Colorado and ConfidentialityLibrary users in Colorado have good reason to expect protection of their confidentiality. As noted in its own annotations, the Colorado Constitution provides stronger privacy protections than the Constitution of the United States: "The Colorado proscription against unreasonable searches and seizures protects a greater range of privacy interests than does its federal counterpart" (Colo. Const. art. II, § 7). Additionally, an expectation of confidentiality in libraries is explicitly spelled out in the Colorado Revised Statutes: "[A] publiclysupported library shall not disclose any record or other information that identifies a person as having requested or obtained specific materials or service or as otherwise having used the library" (emphasis added) (Privacy of User Records, 2010; see Appendix A for the complete statute). The law provides the usual exceptions for responding to court orders and for "reasonable" administration of the library, but it is important to note the sweeping scope of what is protected. This legislation was adopted following John Hinckley Jr.'s attempted assassination of President Ronald Reagan. When Hinckley was arrested in 1981, one of the pieces of identification found in his wallet was his Jefferson County (Colorado) library card (Falsone, 1987). The library was then inundated with requests from journalists for Hinckley's records to see what he had checked out. Though the library initially refused to release this information, the county attorney advised that the requests had to be filled under the Colorado Open Records Act (2010). In response , the Colorado library community studied the confidentiality laws of other states and worked toward the eventual adoption of the Colorado Privacy of User Records legislation in 1983 (Falsone, 1987).A subsequent court case further strengthened expectations of confidentiality in Colorado libraries. In Tattered Cover, Inc. v. City of Thornton (2002), the Colorado Supreme Court found that bookstores could not be compelled to release information about a criminal suspect's purchases because the law enforcement agency had not demonstrated sufficient need for the records. …
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
为了一个孩子:图书馆的隐私、匿名和保密
在一个儿童色情业者利用这项技术分享非法资料的时代,提供匿名上网服务有什么道德考量?一个开放社会的长期困境是如何在自由与安全之间取得平衡。太多的自由,人们就会自由地做出可怕的行为。过于安全,人们的所思、所言、所行都会受到限制。在战争时期,或者当恐惧(真实的或想象的)在大众的想象中占据主导地位时,平衡倾向于安全。当涉及到对儿童的威胁时,安全几乎总是胜过自由,因为不惜代价保护哪怕一个孩子不受伤害的概念是一种强有力的修辞工具。正如2007年科罗拉多州的一个案例所表明的那样,这种平衡对提供公共互联网访问的图书馆提出了挑战,特别是如果这种访问可能会促进犯罪活动。虽然图书管理员经常谈论保护用户隐私,但最终受到威胁的是用户匿名性和保密性。在继续之前,有必要区分这三个术语。除了实施行为的人之外,任何人都不知道私人行为。其他人可以知道一个匿名行为,但演员的身份是未知的。保密行为只有那些需要知道演员身份的人才知道。在图书馆里,真正的私人行为是从书架上取下一本书,在图书馆里阅读,然后不被任何人发现地放回原处。即使一件物品是通过自检系统借出的,而且从未由图书馆员工处理过,只要该物品在使用中,图书馆就会创建并保存一份保密记录。匿名使用图书馆的情况包括:在他人的视野内阅读资料,无论是员工还是其他用户,以及使用不需要个人身份识别登录的计算机。科罗拉多州和保密性科罗拉多州的图书馆用户有充分的理由期望他们的保密性得到保护。正如在其自己的注释中所指出的那样,科罗拉多州宪法比美国宪法提供了更强有力的隐私保护:“科罗拉多州禁止不合理的搜查和扣押,比其联邦对手保护更大范围的隐私利益”(Colo. Const。艺术。此外,《科罗拉多州修订法规》明确规定了图书馆的保密义务:“[A]公共支持的图书馆不得披露任何记录或其他信息,这些记录或信息表明某人曾请求或获得特定材料或服务,或曾以其他方式使用过图书馆”(强调添加)(《用户记录隐私》,2010;完整的法规见附录A)。法律为响应法院命令和图书馆的“合理”管理提供了通常的例外情况,但重要的是要注意受保护的广泛范围。这项立法是在小约翰·欣克利企图暗杀罗纳德·里根总统之后通过的。1981年欣克利被捕时,在他的钱包里发现的身份证明之一是他的杰斐逊县(科罗拉多州)图书馆借书证(Falsone, 1987)。记者们纷纷向图书馆索要欣克利的记录,想看看他都借了些什么。虽然图书馆最初拒绝公布这些信息,但县检察官建议,这些请求必须根据《科罗拉多公开记录法案》(2010年)填写。作为回应,科罗拉多州图书馆界研究了其他州的保密法律,并最终于1983年通过了《科罗拉多州用户记录隐私法》(Falsone, 1987)。随后的一个法庭案件进一步加强了对科罗拉多州图书馆保密的期望。在2002年的破烂封面公司诉桑顿市案中,科罗拉多州最高法院裁定,不能强迫书店公布犯罪嫌疑人的购物信息,因为执法机构没有充分证明需要这些记录。…
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Information Ethics
Journal of Information Ethics Arts and Humanities-Philosophy
自引率
0.00%
发文量
0
期刊最新文献
Diversity Matters: Economic Inequality and Policymaking During a Pandemic A Survival Guide to the Misinformation Age: Scientific Habits of Mind Intellectual Privacy: Rethinking Civil Liberties in the Digital Age Hate Crimes in Cyberspace We Believe the Children: A Moral Panic in the 1980s
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1