Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Computers in Libraries | 6 |
Author
Banerjee, Kyle | 1 |
Bernstein, Joan E. | 1 |
Davis, Dave | 1 |
Harris, Lesley Ellen | 1 |
Ives, David J. | 1 |
Schuyler, Michael | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 6 |
Guides - Non-Classroom | 2 |
Opinion Papers | 1 |
Education Level
Audience
Location
New Jersey | 1 |
Laws, Policies, & Programs
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Bernstein, Joan E. – Computers in Libraries, 2007
In this article, the author recounts her experience in 2005 as a library director at the Mount Laurel Library in New Jersey. She thought her people at the library were in fairly good shape in terms of the professional staff's understanding of the confidentiality rules governing their customer information. However, she was wrong. This was driven…
Descriptors: Professional Personnel, Confidentiality, Library Personnel, Library Administration
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Schuyler, Michael – Computers in Libraries, 1999
Suggests that a definitive court ruling is needed to better define rights and responsibilities related to the First Amendment and libraries' Internet use policies so that libraries can provide a comfortable environment for users while maintaining the law. Discusses filters; court cases; claims of the anti-porn cult; research studies on how much of…
Descriptors: Access to Information, Court Litigation, Information Policy, Internet
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Harris, Lesley Ellen – Computers in Libraries, 1998
Presents steps for creating copyright policies: appoint an officer; arrange access to a lawyer; understand copyright principles; know how copyright applies to Internet and CD-ROMs; understand permissions procedures; collect reference materials; use Internet information; understand international law; stay updated; attend seminars; educate others;…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Electronic Mail
Davis, Dave – Computers in Libraries, 1998
Presents the text of a question-and-answer session that addressed the Copyright Clearance Center, library compliance with copyright law, copyrights and electronic information, fair use and the World Wide Web, copyrighted images and the Web, permission procedures, scanning historical images, distance education and scanned documents, future…
Descriptors: Access to Information, Compliance (Legal), Copyrights, Distance Education