
ID | Title | Keywords | Type of library | Type of activity |
1 | Use of filtering software | Filtering software ; freedom of information ; protection of minors | Public library | Use |
2 | Armenian Genocide | Armenians; equal treatment; freedom of expression; neutrality; pluralism; censorship | Scientific library; city public library | Cooperation with external partners; space allocation |
3 | Assisted Dying | Neutrality ; assisted dying ; censorship | Public library | Collection development |
4 | Use of RFID | Data protection ; user’s point of view ; rationalisation ; RFID ; monitoring | Public library Academic library | Use Management |
5 | Instructions for bomb-making | Protection of minors ; freedom of information ; leftism ; political violence; explosive devices; terrorism; censorship | Public library | Use |
6 | Reviews in the catalogue | Catalogue enrichment ; neutrality ; review | Public library | Development |
7 | Cultivation of cannabis | Data protection ; drugs ; cannabis cultivation ; police investigations ; police access to user data | Public library | Management |
8 | Suicide | Suicide ; responsibility ; censorship | Public library | Collection development |
9 | Anorexic girl | Data protection ; protection of minors ; anorexia ; responsibility ; confidentiality | Public library | Use |
10 | Creationism | Fundamentalism ; gift ; creationism ; neutrality ; sect | Public library | Collection development |
11 | Piglet book | Atheism ; child protection ; children′s books ; censorship | Public library in a small town | Collection development Development |
12 | Sex tourism | Development ; feminism ; misogyny; sexism; sex tourism; keywords | Academic library | Development |
13 | Customer or user? | Library function ; educational mission; public service ; economisation ; New Public Management | Public library | Public relations |
14 | Bookbinding | Bookbinding ; book cover ; courtesy ; corruption | Academic library | Management |
15 | Animal rights | Equal treatment ; hunting ; neutrality ; animal rights activists | Public library | Use |
16 | Negro king | Children′s books ; political correctness ; racism ; text authenticity | Public library | Collection development |
17 | Homework exchange | Fraud ; filtering software ; homework exchange ; internet access ; obtaining grades by fraud ; plagiarism | Academic library | Use |
18 | Bestseller service | Bestseller service ; range of services ; fees ; cost of freedom ; professionalism ; social commitment | Public library | Use |
19 | Gay parents | Homosexuality ; child protection; children′s books ; gay parents ; censorship | Public library | Use |
20 | Burka wearing | Acceptable use policy ; misogyny ; clothing ; cultural diversity ; religion | Public library Academic library | Use |
21 | Smell of urine | Harassment ; damage ; equal treatment ; smells ; media ; smell of urine | Public library Academic library | Use |
22 | Transvestite | Harassment ; transvestite | Public library Academic library | Use |
23 | Guttenberg | Development ; Guttenberg ; plagiarism ; tradition | Academic library | Development |
24 | Activities on first day of school | Enrolment ; corruption ; promotion of reading ; neutrality ; sponsorship | Public library | Public relations Management |
25 | Indexing term foreign infiltration | Development ; neutrality ; indexing | Public library Academic library | Development |
26 | Author reading | Author reading ; blackmail ; political pressure ; quality | Public library District library | Space allocation |
27 | Homophobia | Exhibition ; homophobia ; homosexuality ; caricature ; artistic freedom ; freedom of expression ; censorship | City public library | Use |
Case description: | Bar codes have been replaced by RFID technology in your library. The use of transponder technology results in a considerable rationalisation. Lending operations can be more easily automated using self-service terminals. Books can be located, i.e. found, even if they had been mislaid. Items can be automatically sorted before replacement on the shelf. And last but not least, theft prevention is greatly improved. A student group dedicated to real and potential threats to privacy calls for the library to explain what is stored on the chips and the location of the readout stations. Furthermore, they require the library to comment on reports that hackers are able to download the information on the chips and that new hardware will allow the chips to be read not only from a short distance, i.e. up to one metre, but up to 300 metres. In addition, the activists demand that users can check the data on the chips so that they can see that no personal information is included. |
Potential solution 1: | You ignore the demand. In recent years, RFID has become so widely accepted that it is an integral part of everyday life; loyalty cards are willingly used. As a user of RFID, the library is in good company. The economic benefits and the increasing convenience outweigh all other concerns. Assessment :
|
Potential solution 2: | You invite the group to a discussion in which you explain and justify current practice. A change of practice is not discussed. Assessment :
|
Potential solution 3: | You are persuaded by the arguments of the group and deactivate the chips and readers. You no longer use RFID technology in your library. Assessment :
|
Potential solution 4: | You have a discussion with the group in which you explain your reasons for the continued use of RFID. At the same time, you acknowledge the privacy-related risks and concerns. You assure the group that RFID practice in the library will be checked in a data protection audit by an independent panel of experts. The result will be made public. In addition, a policy for dealing with RFID technology in the library will be developed. The starting point should be the ALA’s guidelines "RFID in Libraries". In the future, the library must evaluate its practice according to these guidelines. Furthermore, users will be able to contact a named member of staff with questions, objections and suggestions. Assessment :
|
References to values: Values: Professional ethics in Germany: | D 1.2 Professionalism/guarantee of quality: "We offer high quality services to all our clients." D 1.8 Data protection: " We respect our clients' privacy. Personal data will be saved only to ensure service delivery and only within the legal framework. We will share personal data with other institutions only as required by law." |
References to values: Values: International professional ethics (IFLA): | I 3.1 Data protection: “Librarians and other information workers respect personal privacy, and the protection of personal data, necessarily shared between individuals and institutions.” I 3.2 Confidentiality: "The relationship between the library and the user is one of confidentiality and librarians and other information workers will take appropriate measures to ensure that user data is not shared beyond the original transaction." I 5.6 Professionalism: “You aim for the highest standards of service quality and thus promote the positive reputation of the profession.” |
Further values: | User’s point of view |
References: | Caldwell-Stone, Deborah: RFID in Libraries. In: Library technology reports. 46, 2010, 8, pp. 38-44. Giersberg, Dagmar: RFID - Funkende Bücher sorgen für mehr Effizienz. In: Goethe-Institute. February 2008. http://www.goethe.de/wis/bib/fdk/de3101909.htm (4.6.2013) Günther, Oliver, Spiekermann Sarah: RFID vs. Privatsphäre - ein Widerspruch? In: Wirtschaftsinformatik. 46, 2004, 4, pp. 245-246. Kern, Christian: RFID für Bibliotheken / Christian Kern. With Eva Schubert und Marianne Pohl. - Berlin [and others] : Springer, 2011. Oltersdorf, Jenny: RFID in öffentlichen Bibliotheken - auch eine Frage der Ethik. In: BIT online. 12, 2009, 1, pp. 40-42. RFID in Libraries: Privacy and Confidentiality Guidelines. American Library Association. 2006. http://www.ala.org/Template.cfm?Section=otherpolicies&Template=/ContentManagement/ContentDisplay.cfm&ContentID=130851 (4.6.13) Schläger, Uwe: Datenschutz aktuell: RFID bei den Bücherhallen Hamburg. 2006. http://www.buecherhallen.de/datenschutz_rfid (19.5.14) Thornley, Clare, Stuart Ferguson, John Weckert, Forbes Gibb: Do RFIDs (Radio Frequency identifier devices) provide new ethical dilemmas for librarians and information professionals? In: International Journal of Information Management, 31, 2011/12, 6, pp. 546-555. Verch, Ulrike: Selbstklebend, selbstverbuchend und auch selbstverpflichtend? Rechtliche Rahmenbedingungen für den Einsatz von RFID-Chips in Bibliotheken. Information und Ethik. Dritter Leipziger Kongress für Information und Bibliotheken, ed. Barbara Lison. Wiesbaden 2007, pp. 450-454. http://www.opus-bayern.de/bib-info/volltexte/2007/305/pdf/verch-leipzig-2007.pdf (4.6.13) |
Metadata: | |
Title: | Use of RFID |
Keywords | Data protection ; user’s point of view ; rationalisation ; RFID ; monitoring |
Classification | Data protection : RFiD |
Type of library | Public library Academic library |
Place: | Germany |
Type of activity | Use Management |
References to values | Case study 1 – filtering software |
Author: | Hermann Rösch |
M.F. - - RFID, ethics, additional solution (08.05.2014 17:28:47)
It is suggested to the group members that they hand in their library cards, return all the books they have borrowed and discontinue use of the library. There is after all a great deal of information on the internet, and anonymisation services (proxies) provide for greater privacy when searching and downloading.
Alternative
It is suggested to the group members that they prove there is another modern library of comparable size without RFID within a radius of 200 km. Then they will be directed there.
A little harsh, but why must one always humiliate oneself when struggling with justifications?
Best regards,
M.F.
H.S. - RFID, ethics (09.05.2014 08:57:54)
In my opinion, potential solution 4 is the best. I have never understood why a useful but controversial technique is introduced without appropriate publicly made "policies". Transparency in advance can take much of the sting out of the conflict. The policy and the internal handling of the RFID tags and thus the read data should be checked regularly, because the technology – in this case, the readout devices – developed quickly.
To comment on MF: Libraries provide services for your customers, users or whatever we like to call them. The libraries are usually (indirectly) funded by those same people. In this context, I do not regard it as expedient not to take requests / concerns seriously and to say, "If it does not suit you here, go somewhere else!"
Best wishes, H.S.