{"id":1285,"date":"2022-01-21T13:26:38","date_gmt":"2022-01-21T18:26:38","guid":{"rendered":"https:\/\/blogs.library.unt.edu\/scholar-speak\/?p=1285"},"modified":"2022-01-21T13:26:39","modified_gmt":"2022-01-21T18:26:39","slug":"the-ethical-library","status":"publish","type":"post","link":"https:\/\/blogs.library.unt.edu\/scholar-speak\/2022\/01\/21\/the-ethical-library\/","title":{"rendered":"The Ethical Library"},"content":{"rendered":"\n<p>By Alexander Ames\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"676\" height=\"328\" src=\"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-content\/uploads\/sites\/23\/2022\/01\/image.png\" alt=\"A stack of books taken bt Alexander Ames\" class=\"wp-image-1287\" srcset=\"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-content\/uploads\/sites\/23\/2022\/01\/image.png 676w, https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-content\/uploads\/sites\/23\/2022\/01\/image-300x146.png 300w\" sizes=\"auto, (max-width: 676px) 100vw, 676px\" \/><figcaption>Photo taken by Alexander Ames\u00a0<\/figcaption><\/figure>\n\n\n\n<p>When a patron of any library uses\u00a0its services, there is an expectation of privacy on the part of the user. Otherwise, it would be extremely uncomfortable for them to get information on subjects that might even just be seen as touchy, and with a shifting social landscape, that might cover most topics. For example, the book\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/discover.library.unt.edu\/catalog\/b3689325\" target=\"_blank\"><em>Steal This Book<\/em><\/a>\u00a0,<em>\u00a0<\/em>held at the Willis Library, has been set as a reserve and can be found behind the service desk. This has reduced the circulation of the book as patrons may\u00a0be wary\u00a0of telling a government-funded library that they are interested in reading a book that has themes of anarchy, while the real reason that it can be found behind the service desk is because the library was afraid that the book would be stolen if left on the general collection shelves.\u00a0\u00a0<\/p>\n\n\n\n<p>To ensure the patron\u2019s right to information, most libraries in the U.S. follow the&nbsp;<a href=\"https:\/\/www.ala.org\/tools\/ethics\" target=\"_blank\" rel=\"noreferrer noopener\">Code of Ethics<\/a>&nbsp;(Professional&nbsp;Ethics, 2021) and&nbsp;<a href=\"https:\/\/www.ala.org\/advocacy\/intfreedom\/librarybill\" target=\"_blank\" rel=\"noreferrer noopener\">Library Bill of Rights<\/a>&nbsp;(Library Bill of Rights, 2019) created by the American Library Association (ALA), either officially or unofficially. This Code of Ethics is taught to future librarians working towards their master&#8217;s degree in Library Science in ALA accredited programs. This is done to ensure&nbsp;equitable&nbsp;access to information via the librarian\u2019s experience&nbsp;in an attempt to&nbsp;standardize library ethics rather than leaving ethical issues up to the individual library that might not have an ethical framework to work from. This code of ethics is meant to \u201c\u2026ensure the free flow of information and ideas to present and future generations\u201d (Professional Ethics, 2021) while keeping each librarian as unbiased as possible. In the example with&nbsp;<em>Steal This Book<\/em>, this would mean that it is the library\u2019s duty to see to the free flow of information held in the book, which is currently hampered by misconceptions that the book is held behind the desk to collect data on those who would ask for it.&nbsp;<\/p>\n\n\n\n<p>As a few examples of a library with an ethics statement, the Cooke County Library uses a PDF of the ALA Code of Ethics and Library Bill of Rights along with detailed interpretations of the latter (Cooke county&nbsp;library, 2011), and the Red Oak Library specifically cites the same Code of Ethics in their own patron privacy statement (Privacy and confidentiality, n.d.). A plainly stated code of ethics&nbsp;isn\u2019t&nbsp;limited to public libraries, however. On the academic library front, Georgia Tech has a privacy policy which&nbsp;states&nbsp;exactly who has access to circulation records (Privacy Policy, n.d.), and&nbsp;Cornell specifically&nbsp;states&nbsp;that they protect patron privacy which \u201c\u2026includes library patron\u2019s right to read anonymously.\u201d (Privacy and confidentiality in the Cornell, n.d.)&nbsp;<\/p>\n\n\n\n<p>However, libraries do not always clearly give their policies on patron privacy, which leads to patrons not knowing what rights they have or what information will be given away by the library they visit. Rather than this lack of availability being due to the libraries having no Code of Ethics, it may be due to institutions being wary of adopting a Code of Ethics created outside of their specific needs. As the ALA Code of Ethics is meant to be broad guidelines rather than specific rules to follow and is meant to be more like a set of ethical guidelines than specific rules, it should&nbsp;be applicable&nbsp;to most, if not all, situations.&nbsp;&nbsp;<\/p>\n\n\n\n<p>UNT Libraries, as an example of a library without a patron privacy statement, is both part of an ALA Accredited University, meaning that the University\u2019s Library Science program has been approved to ALA standards, and is an institutional member of the ALA and, by extension, the Association of College and Research Libraries (ACRL), upholding their ethical standards by association.&nbsp;However&nbsp;connected an institution might be to ethical bodies, if this is not made clear to patrons, the library starts seeing issues like the one mentioned before with&nbsp;<a href=\"https:\/\/discover.library.unt.edu\/catalog\/b3689325\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Steal This Book<\/em><\/a>&nbsp;, where a lack of clarity on ethical standards and policies on patron privacy cause distrust between patron and institution.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The core purpose of a service in the field of information services, especially an academic library, is the proliferation of information, and the lack of a patron privacy statement runs counter to that purpose. The issue here is one of transparency to the patron, as the only way that the library can guarantee\u00a0equitable\u00a0access to information is if the patron knows that, barring a subpoena, the books that they check out will only be known to them and the library. No matter how embarrassing or socially charged a book checked out from the library might seem to be, libraries are a place free of judgement, and a place patron privacy is protected: they simply need to make that fact clearer to their patrons.\u00a0\u00a0<\/p>\n\n\n\n<p><strong>References:\u00a0\u00a0<\/strong><\/p>\n\n\n\n<p><em>Cooke county library policy appendices.<\/em>&nbsp;(2011).&nbsp;<em>&nbsp;<\/em>Cooke County Library.&nbsp;<a href=\"https:\/\/cookecountylibrary.org\/wp-content\/uploads\/sites\/3\/2014\/08\/POLICY_APPENCIES.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cookecountylibrary.org\/wp-content\/uploads\/sites\/3\/2014\/08\/POLICY_APPENCIES.pdf<\/a>&nbsp;<\/p>\n\n\n\n<p><em>Library bill of rights.&nbsp;<\/em>(2019). American Library Association.&nbsp;<a href=\"https:\/\/www.ala.org\/advocacy\/intfreedom\/librarybill\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ala.org\/advocacy\/intfreedom\/librarybill<\/a>&nbsp;<\/p>\n\n\n\n<p><em>Privacy and confidentiality in the Cornell university library.&nbsp;<\/em>(n.d.)<em>&nbsp;Cornell University Library.&nbsp;<\/em><a href=\"https:\/\/www.library.cornell.edu\/privacy\" target=\"_blank\" rel=\"noreferrer noopener\"><em>https:\/\/www.library.cornell.edu\/privacy<\/em><\/a>&nbsp;<\/p>\n\n\n\n<p><em>Privacy and confidentiality of patron records.&nbsp;<\/em>&nbsp;(n.d.) redoaktx.org.&nbsp;<a href=\"https:\/\/www.redoaktx.org\/427\/Privacy-and-Confidentiality-of-Records\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.redoaktx.org\/427\/Privacy-and-Confidentiality-of-Records<\/a>&nbsp;<\/p>\n\n\n\n<p><em>Privacy policy. (n.d.).&nbsp;<\/em>Georgia Tech Library.&nbsp;<a href=\"https:\/\/library.gatech.edu\/privacy-policy\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/library.gatech.edu\/privacy-policy<\/a>&nbsp;<\/p>\n\n\n\n<p><em>Professional ethics.&nbsp;<\/em>(2021). American Library Association.&nbsp;<a href=\"https:\/\/www.ala.org\/tools\/ethics\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ala.org\/tools\/ethics<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"By Alexander Ames\u00a0 When a patron of any library uses\u00a0its services, there is an expectation of privacy on the part of the user. Otherwise, it would be extremely uncomfortable for them to get information on subjects that might even just be seen as touchy, and with a shifting social landscape, that might cover most topics&#8230;.  <a href=\"https:\/\/blogs.library.unt.edu\/scholar-speak\/2022\/01\/21\/the-ethical-library\/\" class=\"more-link\" title=\"Read The Ethical Library\">Read more &raquo;<\/a>","protected":false},"author":109,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[132,133,131],"class_list":["post-1285","post","type-post","status-publish","format-standard","hentry","category-research-help","tag-ethics","tag-patron-privacy","tag-privacy-policy"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/posts\/1285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/comments?post=1285"}],"version-history":[{"count":2,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/posts\/1285\/revisions"}],"predecessor-version":[{"id":1289,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/posts\/1285\/revisions\/1289"}],"wp:attachment":[{"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/media?parent=1285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/categories?post=1285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.library.unt.edu\/scholar-speak\/wp-json\/wp\/v2\/tags?post=1285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}