<div dir="ltr">



















<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Exciting
Speakers Featured in NISO’s Upcoming Virtual Conference!</span></b></p><p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><a href="https://www.niso.org/events/2018/04/information-freedom-ethics-and-integrity">Information Freedom, Ethics and Integrity</a></span></b></p><p class="MsoNormal" style="margin:0in 0in 12pt;background:white;font-size:12pt;font-family:Calibri"><b style="font-size:12pt"><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Wednesday, April 18, 11:00am - 5:00pm (Eastern Daylight)</span></b></b></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">This
is a six-hour event addressing some of the very sensitive issues associated
with patron privacy, appropriate use of data, information security in library
IT, and the challenges associated in designing digital environments that accommodate
those concerns. <span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><i><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">NISO’s
registration fee allows your organization to gather an unlimited number of
staff in a conference or classroom setting to view the event on the day of the
broadcast. Access to an archived recording of the event is always included in
your registration fee, regardless of membership status.</span></i><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Here’s
what just <i><u>some</u></i> of our speakers
will be addressing:<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><b>11:45
- 12:15 p.m.<span>  </span>Data Collection and Privacy
in Library and Learning Management Systems</b><span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Emily Lynema</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Acting Department Head, Information Technology, North Carolina
State University Libraries<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">This
talk will provide an overview of the data that might be collected and analyzed
from library and learning management systems, including the types of user data
that could potentially be considered sensitive or confidential. It will frame
the ethical questions around data privacy in the context of the growing
movement toward learning analytics for student success in institutions of
higher education. The talk will identify several different approaches to data
collection and will highlight policy decisions that should be considered when
planning a data analytics project.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">This
talk will emphasize concrete case studies from institutions that have collected
and analyzed specific data from library or learning management systems to
assist in assessment activities and to demonstrate the value of libraries
within their broader community. These case studies demonstrate ways that
libraries can work to leverage user data while simultaneously taking proactive
steps to protect user privacy.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS""><b>1:45
- 2:15 p.m.<span>  </span>Information Security and
Library IT </b><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS"">Denis Galvin</span></b><span style="font-size:11pt;font-family:"Trebuchet MS"">, Director of Library
Technology, Fondren Library, Rice University<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS""><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS"">The
library IT department frequently interacts with both Central IT and industry providers
regarding security concerns and problems. A range of issues can occur which
impact access to systems and resources. The library must protect itself from
security threats, and also has to maintain some level of protection for content
providers while providing access to members of the community. Security and
authentication are issues which need to be dealt with through the institution,
the library IT department and industry providers. In this complex environment
what are things we can do today to protect both libraries and content
providers? What should we be doing today to better prepare for tomorrow?<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><b>2:15
- 2:45 p.m. The Right to be Forgotten and Digital Collections: Surveying Practice and Policy at ARL Member Institutions</b><span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span><b style="font-size:12pt"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Virginia Dressler</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Digital Projects Librarian, Assistant Professor, Kent State
University and <b>Cynthia Kristof</b>,
Head, Copyright and Document Services, Associate Professor, Kent State
University.</span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">In
the spring of 2017, digital librarians at Association of Research Libraries
(ARL) member institutions were surveyed on practices and policies surrounding
takedown requests in openly accessible digital collections. The survey
collected demographic information and also presented a series of hypothetical
scenarios for respondents to consider and reflect upon. The survey received a
25.8% response rate, with many intriguing insights into how practitioners
consider these type of requests. Survey findings and general background on the
topic of the right to be forgotten will be presented, along with a discussion
on future recommendations for work in this area.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><b>3:30
- 4:00<span>  </span>p.m. Experiments in Digital
Privacy Education</b><span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Clifford Anderson</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Associate University Librarian for Research and Learning,
Vanderbilt University<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">How
can librarians effectively teach patrons about digital privacy? How does
instruction about digital privacy fit within a scholarly communications
program? In the fall 2017, the Vanderbilt University Library experimented with
a three-part series on digital privacy, covering the concepts of encrypting
communications, browsing the web anonymously, and keeping operating systems
secure. In his session, we will reflect on the success of the program, its
limitations, and how we plan to refine our privacy outreach to students in the
future.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS""><b>4:00
- 4:30 p.m. Designing for Privacy</b><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><b><span style="font-size:11pt;font-family:"Trebuchet MS"">Skott
Klebe</span></b><span style="font-size:11pt;font-family:"Trebuchet MS"">,
Platform Security Architect, EBSCO<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:Georgia"><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS"">Abstract
(Speaker Supplied): Developing rich and capable applications that respect user
privacy requires special attention. We'll discuss technical privacy challenges
in general and investigate one case in detail. Overall, the key to respecting
privacy is prioritizing it as a requirement.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Other
speakers featured in <a href="https://www.niso.org/events/2018/04/information-freedom-ethics-and-integrity">this NISO program</a> include:<span></span></span></p>

<p class="gmail-MsoListParagraphCxSpFirst" style="background:white;margin:0in 0in 0.0001pt 0.5in;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:Symbol;color:black"><span>·<span style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">      
</span></span></span><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Bill Marden</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Director
of Data Privacy and Compliance, New York Public Library<span></span></span></p>

<p class="gmail-MsoListParagraphCxSpMiddle" style="background:white;margin:0in 0in 0.0001pt 0.5in;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:Symbol;color:black"><span>·<span style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">      
</span></span></span><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Peter Murray</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Open
Source Community Advocate, Index Data<span></span></span></p>

<p class="gmail-MsoListParagraphCxSpLast" style="background:white;margin:0in 0in 0.0001pt 0.5in;font-size:12pt;font-family:Calibri"><span style="font-size:11pt;font-family:Symbol;color:black"><span>·<span style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">      
</span></span></span><b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">Safiya Noble</span></b><span style="font-size:11pt;font-family:"Trebuchet MS";color:black">, Associate
Professor, USC and Author of <b><i>Algorithms of Oppression</i></b>.<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)"><span> </span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">Want to register immediately, using a credit card? You can, with
this </span><a href="https://www.regonline.com/registration/Checkin.aspx?EventID=2092765" target="_blank"><span style="color:rgb(17,85,204)">online form</span></a><span style="color:rgb(34,34,34)">. <span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)"><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;background:white;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">Have questions? Get in touch with us at:<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">NISO<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">3600 Clipper Mill Road, Suite 302<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">Baltimore, MD 21211-1948<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">Phone: (301) 654-2512<span></span></span></p>

<p class="MsoNormal" style="background:white;margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span style="color:rgb(34,34,34)">Email: </span><a href="mailto:nisohq@niso.org" target="_blank"><span style="color:rgb(17,85,204)">nisohq@niso.org</span></a><span style="color:rgb(34,34,34)"><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:12pt;font-family:Calibri"><span> </span></p>





<br></div>