Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Library Policy | 14 |
| Policy Formation | 8 |
| Library Administration | 6 |
| Users (Information) | 6 |
| Access to Information | 5 |
| Internet | 4 |
| Legal Responsibility | 4 |
| Library Personnel | 4 |
| Privacy | 4 |
| Electronic Libraries | 3 |
| Library Services | 3 |
| More ▼ | |
Source
| Computers in Libraries | 14 |
Author
| Balas, Janet L. | 1 |
| Banerjee, Kyle | 1 |
| Bell, Lori | 1 |
| Bernstein, Joan E. | 1 |
| Cooper, Eric A. | 1 |
| Davis, Dave | 1 |
| Feinman, Valerie Jackson | 1 |
| Galganski, Carol | 1 |
| Guenther, Kim | 1 |
| Harris, Lesley Ellen | 1 |
| Ives, David J. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 14 |
| Reports - Descriptive | 14 |
| Guides - Non-Classroom | 2 |
| Opinion Papers | 1 |
Education Level
Audience
Location
| Illinois | 1 |
| New Jersey | 1 |
Laws, Policies, & Programs
| First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Guenther, Kim – Computers in Libraries, 2001
Considers how privacy issues related to online profiling affect library patrons and what librarians should do to protect them. Discusses the need for a privacy policy and provides guidelines from the OECD (Organisation for Economic Cooperation and Development) privacy statement generator that can be adapted for libraries. (LRW)
Descriptors: Electronic Libraries, Guidelines, Internet, Library Policy
Sauers, Michael – Computers in Libraries, 2006
In this article, the author describes what components should be included in a comprehensive policy for public wireless usage in a library. He lists four basic steps, which include: (1) Introduce the service; (2) List the technical requirements; (3) Spell out disclaimers on access, assistance, and liability; and (4) Alert users to security concerns.
Descriptors: Policy Formation, Information Technology, Library Automation, Library Policy
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Balas, Janet L. – Computers in Libraries, 2001
Discusses privacy issues related to electronic libraries. Highlights include finding guidance and information on the Web, including the American Library Association, Center for Democracy and Technology, and the Electronic Privacy Information Center; legal responsibilities in maintaining privacy rights of patrons who access the Internet; and…
Descriptors: Electronic Libraries, Internet, Legal Responsibility, Library Policy
Feinman, Valerie Jackson – Computers in Libraries, 1999
Discussion of strategic planning in libraries focuses on a five-step process based on academic libraries. Highlights include a situational and environmental analysis; development of organizational direction, including vision, mission, and objectives; formulation of the strategic plan; implementation; and control, feedback, and evaluation. (LRW)
Descriptors: Academic Libraries, Evaluation Methods, Feedback, Higher Education
Cooper, Eric A. – Computers in Libraries, 1997
Presents basic design tenets for electronic library guides and the concerns these guides present for internal policymaking. The goal is to help library staffs produce electronic guides that will be effectively utilized by a variety of patrons without creating an added burden for the library. (Author/LRW)
Descriptors: Audience Awareness, Design Requirements, Electronic Publishing, Library Guides
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Galganski, Carol; Peters, Tom; Bell, Lori – Computers in Libraries, 2002
Describes the integration of personal digital assistants into a medical center library's services in Illinois. Discusses training for users; hardware selection; software selection and content; technical support; the role of libraries, including the creation of policies and procedures; and future challenges. (LRW)
Descriptors: Computer Selection, Computer Software Selection, Futures (of Society), Information Technology
Lord, Jonathan; Ragon, Bart – Computers in Libraries, 2001
Describes the experiences of two health sciences libraries, at East Carolina University and at the University of Virginia, in developing electronic collections. Highlights include full-text, Web-based resources; licensing issues; joint access to electronic resources through consortia; collection development policies; and an electronic resource…
Descriptors: Academic Libraries, Access to Information, Check Lists, Consortia
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail
Vaccarella, Bonnie – Computers in Libraries, 2001
Explains how the Monroe County Library System (NY) adapted their library to help the greatest number of disabled people use their library with the greatest ease and at a reasonable cost. Highlights include focus groups with disabled patrons; appropriate adaptive devices; policy recommendations for computer use; and staff training. (LRW)
Descriptors: Access to Information, Accessibility (for Disabled), Assistive Devices (for Disabled), Disabilities
Davis, Dave – Computers in Libraries, 1998
Presents the text of a question-and-answer session that addressed the Copyright Clearance Center, library compliance with copyright law, copyrights and electronic information, fair use and the World Wide Web, copyrighted images and the Web, permission procedures, scanning historical images, distance education and scanned documents, future…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Distance Education

Direct link
