ACRL

College & Research Libraries News

Washington Hotline

Rick Weingarten

Privacy, copyright, and access—it's all connected

Political reactions in the aftermath of September 11, including the USA PATRIOT Act and the creation of the Department of Homeland Security, have raised deep concerns within the library community about its ability to ensure library users’ privacy—particularly when they use the Internet. In responding to these current threats to privacy, we need to remember that even these new, extreme measures are just tactical maneuvers in a growing war over anonymity, privacy, and confidentiality in the face of new information technologies.

In the early days of the Internet, anonymity was king. Over the last decade, the Internet has become global, widely accessible, and economically significant, changing the control points and the political influences on users. New technologies are being developed to “civilize” cyberspace—to tame its excesses and to exploit its economic potential more fully.

For those concerned about privacy, freedom of expression, and public access to information, these trends are alarming.

Social pressures

Law enforcement demands for access to library records are evolving in kind and scope. In the past, law enforcement claims for information have generally been based on finding and catching wrongdoers. Now, the post-September 11 political mandate is to identify and nab terrorists before they act, leading to surveillance of a much broader population and a wide range of behaviors.

Internet security concerns lead to calls for tightening government controls on the Internet. In the decentralized Internet environment, one person’s behavior may affect the security of someone else. Hackers regularly mount their attacks from third party machines over which they have taken control. Thus, an insecure machine on the Internet can become a threat to other systems—basic national infrastructures

Rick Weingarten is director of the ALA Office of information Technology Policy, Washington Office, e-mail: rweingarten@ alawash.org and services, such as telecommunications, transportation, and government are dependent on the Internet and therefore vulnerable.

The growth of e-commerce and e-government has generated both political concern and calls for control. The argument is simply that the public cannot depend on reliable and safe access to the market and to government without secure Internet access.

Both social and technological pressures are affecting policy calling for regulating and even reengineering the Internet to protect intellectual property in the digital realm. Digital Rights Management (DRM) systems are being proposed that can potentially be used to monitor and control a wide range of information access on the Internet and in other digital formats. These existing systems, as well as those proposed, offer a variety of technological methods that are intended to enforce proprietary rights over digital works when they are in the hands of users. Any system with the ultimate purpose of controlling access to information has significant privacy implications.

Technological pressures

Partly in response to these pressures, technology is also moving forward to provide more tools for monitoring and control. In most cases, these tools are being developed to serve very specific functions, yet are potentially powerful technologies that could impact privacy and access.

More sophisticated digital identification technologies are being developed to authenticate the identities of remote users participating in electronic transactions. In large part, the pressures underlying the development of these systems come from the need to support commerce and e-government activities on the Internet. Again, these technologies have potential implications for privacy and confidentiality, however benign their original purpose.

In this column I have only been able to briefly identify and characterize a few of the major pressures of the Internet that will be affecting the privacy of library users. You can be sure these and similar trends will involve ALA and ACRL in privacy and security policy for many years, resulting in educational programs and opportunities for advocacy within the ACRL community. ■

Copyright © American Library Association

Article Views (By Year/Month)

2025
January: 1
February: 6
March: 5
April: 9
May: 4
June: 10
July: 9
August: 11
September: 17
October: 22
November: 17
December: 18
2024
January: 3
February: 0
March: 2
April: 4
May: 2
June: 2
July: 2
August: 3
September: 6
October: 0
November: 1
December: 5
2023
January: 2
February: 0
March: 1
April: 3
May: 0
June: 0
July: 1
August: 0
September: 2
October: 1
November: 3
December: 4
2022
January: 0
February: 0
March: 0
April: 2
May: 4
June: 1
July: 2
August: 2
September: 2
October: 0
November: 1
December: 1
2021
January: 0
February: 4
March: 2
April: 3
May: 1
June: 2
July: 0
August: 0
September: 0
October: 1
November: 1
December: 0
2020
January: 1
February: 4
March: 0
April: 4
May: 2
June: 0
July: 1
August: 1
September: 3
October: 3
November: 0
December: 3
2019
January: 0
February: 0
March: 0
April: 0
May: 0
June: 0
July: 0
August: 11
September: 2
October: 3
November: 2
December: 1