Most libraries dont have the money, time, or people to secure even the small number of resources they have. If you are a student currently enrolled at the university of nebraska lincoln, you have priority use of our computers. Alcorn, nealschuman directory of management software for public access computers, nealschuman publishers, inc. Track changes and activity with audit trails and reports.
Many nonprofit organizations and libraries realize that managing public access computers are an important first step towards simplifying their shared computer environment. How a public library approaches computer security hr daily. The libraries are not responsible for any damage done to computer users disks, data, hardware or software by any virus which may have been contacted on or through libraries equipment. Filters may block material that is appropriate in a public. Jan 22, 2017 the use of ransomware by hackers on public computers has increased dramatically in the past two to three years, and libraries need to be diligent about security practices, said daniel ayala, director of global information security at proquest. Cameras may be installed in locations where individuals lack a reasonable expectation of privacy. Eliminate manual signup sheets and set patron computer time limits. Securing public access computers in a library setting giac. And luis herrera, city librarian at san francisco public library, has suggested that staff training to treat overdoses could soon become voluntary. The malware infected servers and caused the loss of public computers, wireless services, the ability to borrow materials, holds notifications, as well as loss of some digital services across the entire elevenlibrary system. Ensure the wireless network you are using is secure. Ayala provided tips and information during his talk on cybersecurity at midwinter on saturday. The thing public libraries should do, is disallow usb devices, i know it may hurt the legitimate user, but there are software keyloggers, that someone could potentially install, unless the.
All computers have microsoft word, excel, and powerpoint. This article is based on a talk he gave at computers in libraries 20. Complete the pricing form on this page and one of our account managers will call you towalk you through the software features and answer any of your questions. Cybersecurity and privacy in 2017 american libraries. Public libraries have probably confronted this issue more than academic libraries, but there is a wealth of information to draw upon from either perspective. Public computer security all library public access computers have security software installed. Library privacy checklist for public access computers and. While libraries typically install software to lock down the computer to provide controlled access to the operating system and. Best practices for patron computers florida department of state.
This strategy can produce reliable public access computers that are relatively simple to maintain. At spartanburg county public libraries scpl, ransomware gained access to the system through email. Denver public library has already used narcan six times as of early may and has ordered more kits. As an institution partially funded with state dollars, the university libraries also provides limited computer and internet access as a courtesy to the general public. Virus checking and other security software will run on all computers, but we cannot guarantee total protection from viruses when using our computers. Public libraries have probably confronted this issue more than academic libraries, but there is a wealth. Users should save their documents online or to a portable usb drive. Smuonly computers have access to specialized software. When using public computers, ensure you leave no trace of your activity. The it manager is now tasked with the burden and responsibility for both the computing assets. We also learned recently that our state legislature cut spending to the public libraries.
Examples include common areas of the library such as entrances, near book and media collections, public seating areas, public computers, and areas prone to theft or misconduct. How a public library approaches computer security hr. Delaware division of libraries public computer acceptable. The library should use restoration software or other technological means to remove traces of individual use on public access computers and other devices provided by the library. Jane, a public librarian friend of mine recounted an incident that highlights the many roles librarians need to play when dealing with complicated patron scenarios as well as the benefits and. Benefits to libraries and public access points gpii. Thats the biggest problem when it comes to public computers. Public computers and devices it is illegal to physically or electronically modify library computer equipment or other devices, or tamper with hardware or software, as established in the california penal code, section 502 et. Hard drive protection programs form the core security for library computers used for. Whether youre looking to upgrade your public access computers, seeking new software, or searching for a way to keep your technology secure, techsoup s donation program can help you make it. Managing these computers has become a major responsibility for library staffs.
A productive and effective library is one in which its staff and patrons feel secure. The it manager is now tasked with the burden and responsibility for both the computing assets as well as the security of the public users. With numerous individuals using computers without direct oversight, there seems no end to the number of ways those computers might be compromised. Computer and network security in small libraries texas. It is designed to run with other security software to enhance the safety of your windows desktop or laptop pc.
Set password expiry dependent on risk 3090 days, generate strong passwords designed to block dictionary and brute force attacks, autorotate passwords, and make password changes quickly and easily. Feb 14, 2011 the thing public libraries should do, is disallow usb devices, i know it may hurt the legitimate user, but there are software keyloggers, that someone could potentially install, unless the. Concerning this practice, dillman says, we have installed software called reboot restore rx on all of our public terminals. The best of us miss things and make mistakes that can lead to security breaches.
Assistance with software is offered by the it help desk. Luckily, the library uses a system that takes care of all that, and its a lot more. The denver public library complies with state and federal law mandating the use of filtering software in public libraries. One job of every librarys staff is to regularly update virus protection software. Hardware keyloggers discovered at public libraries naked. Specialized public access software products are used to. Webkiosk software integrates with your ils database system to validate users with.
What are the biggest problems in network security for. New trends in library security american libraries magazine. Whether your library has a handful of public computers or hundreds, you have become a technology access point for your community and managing that technology requires a range of knowledge. This means that on each restart, anypersonal information inadvertently left on a public access computer is erased. American association of school librarians aasl assn. I look forward to learning how others are securing their computers in a. Public computers avoid financial transactions that might reveal valuable passwords or personal information such as credit card numbers. Our budget year is the calendar year, so our director and board are looking at where cuts can be made. If i am writing about security in libraries, something is very wrong. And its time more stakeholders realized it, especially security. While most librarians are not it specialists, usually one or two staff members have. Use of library public computers university of houston.
I would much rather write about the importance of funding for teen services, why funding based on program attendance decreases the quality of programs offered, and the various ways public libraries, well, make america great. Malware can be a serious threat to personal privacy and security when using a computer. Some it security experts advise clients to simply pay the ransom, but there are much better solutions. Patrons expect to find secure and wellmaintained computers. Malwarebytes antimalware software guards windows 7 pcs against viruses, trojans, spyware, ransom ware, adware, and rootkits. Patrons expect to find secure and wellmaintained computers that have simple, stable, and predictable interfaces. This security software returns the computer to a factorydefault state when the computer is restarted. A public access computer is used by many different untrusted.
The major protection that the library has against security problems like accidental or willful infection by computer viruses involves their automatic wipe and restore practice. Its hard to stay secure on public computers if you dont know what kind of hidden software is on them. Cybersecurity and privacy in 2017 american libraries magazine. Deploy locked down public computers in libraries, schools or any public computing environment. Specialized public access software products are used to provide protection against patron vandalism, both intentional and accidental, and malicious attacks by computer criminals. Jennifer ward, the library web managers reference center, berkeley digital library sunsite, may 20, 2003. A security audit of the computer could be routinely performed to attempt to locate deficiencies in the security of the computer. While libraries typically install software to lock down the computer to provide controlled access to the operating system and applications, none are completely effective. In january, ransomware infected more than 700 computers at all 17 locations of saint louis public library slpl. Whether youre looking to upgrade your public access computers, seeking new software, or searching for a way to keep your technology secure, techsoup s donation program can help you make it happen. Explore topics that address the varied facets of managing public computers including security, filtering, upgrading, and troubleshooting. Yesterday we learned that like an office, your local library has some serious computer security concerns.
Public computers pose a higher security risk, since they are used anonymously without authentication and without supervision. Nov 09, 2018 at spartanburg county public libraries scpl, ransomware gained access to the system through email. Some places where public computers may be available are libraries, schools, or facilities run by government. If you can, use a trusted webbased spyware detection program to scan for spyware before using an untrusted public computer. Shared public computers are used by multiple patrons in public libraries, academic libraries, law libraries, workforce development centers, and government agencies. Public computer security scenicregional scenic regional library. Aside from the fact that many public libraries dont have the budget for security, determining the role of a security guard isnt always clear. Benefits to libraries and public access points libraries and other public access points paps are part of the dramatic expansion of information technology in daily life. Ensure that any computer reservation management system. Misuse of library computers may result in the suspension or loss of privilege to use them. Nov 05, 2015 yesterday we learned that like an office, your local library has some serious computer security concerns.
Techsoup has the products you need to maximize your technology services to your community. Home safety in public spaces, including libraries, has always been a concern, but may be more keenly felt in light of certain recent events. Public access computer security public library spiceworks. Our virtual desktop solution is customizable and fits perfectly to your needs. Delaware division of libraries public computer acceptable use. Larger libraries may be able to afford to spend more time and money on security, but then they also have more things to secure. Vulnerable libraries make everything else vulnerable. The major protection that the library has against security problems like accidental or willful infection by computer viruses. Public computers share similar hardware and software components to personal computers, however, the role and function of a public access computer is entirely different. Public computers, devices, and internet access policy. If you use the computers you must agree to the terms and conditions set out in this acceptable use policy. Library privacy guidelines for public access computers and. Public computers should be routinely maintained to ensure they are operating properly, and that the software on the computer designed to protect the users privacy is activated and effective.
The use of ransomware by hackers on public computers has increased dramatically in the past two to three years, and libraries need to be diligent about security practices, said daniel ayala, director of global information security at proquest. Ensure that antivirus software that is installed has the ability to block spyware and keylogging software. Jun 01, 2017 payroll systems seem to be a favorite target. Keep your computer, smartphone, tablet with you at all times to avoid loss of theft. Frameworks and libraries are important elements in your application security program. Securing public access computers in public digital spaces and libraries. If you meet somebody, you can generally tell what they are like. If a patron is not able to install a particular program, the program probably requires administrative computer rights. Public libraries will provide unfiltered access to the internet in accordance with the american library associations intellectual freedom statement, the library bill of rights, and the ala statement on access to electronic information, services, and networks. Your public access computers security, access control.
One way to begin thinking about security for you and your library is by asking yourself a few questions. Public computers, devices, and internet access policy san. Public access computer management horizon datasys corporation. Public computer management public patron computers.
An overview of public access computer software management. It employs filtering software to protect against the visual depiction of pornography, obscenity, and child pornography. The information technology exchange and the maine state library are partnering to offer a program, pcs for maine public access computer program, that provides reliable, sustainable computers, software and support to libraries at very low cost. As weve moved into the 21st century, providing public access to computers and the internet has become a core function of libraries. If your library considers this approach, it would be wise to train staffers to identify signs of opiate narcosispindot pupils, hooded eyelids, sniffing, scratching, seemingly asleep on their feetand have them ready to call paramedics. He has been speaking about it security for several years. For the many people who do not have their own computers or internet access, these institutions provide a portal into that world. Securing public access computers in a library setting page 5 of 23 introduction the purpose of this paper is to describe ways for public library s to balance information security with free access and user privacy in public ly available computers. A public computer or public access computer is any of various computers available in public areas.
Most libraries now recognize that public access computers are essential to providing excellent service to patrons. Security training shall be integrated into existing library training programs such as orientation programs for new employees, volunteers, or patrons in the use of computers, software, and network information resources. Because if frameworks and libraries fail, theres a chance the safety of your corporate data could be compromised. I look forward to learning how others are securing their computers in a cost effective way. Library staff are available to offer research help. Using computers, smartphones or tablets in public places is now as commonplace as using them at home or in the office.
461 288 973 1072 734 383 22 1121 121 795 747 1546 1526 1399 203 268 886 396 129 1255 1364 187 522 723 323 154 66 179 193 602 245 906 390 1038 1 312