I don't pretend to know all the answers to all this, but I raise a few point - mine own, and they do not necessarily represent the service view here.
Aren't we all concerned with managing risk, and different types of risk, in different situations?
For the loan of a physical object, the 'proof of address' issue is surely about stock recovery? - overdues and all that Jazz - so that we can meet Performance standards (e.g. on Reservations), *and* have stock on the shelves for users who don't reserve items to browse, all on a limited stock budget.
But it is a highly imperfect measure, given all the 'Gone Away's' the Royal Mail throw back in the urban environment in which I work with a 30%churn of users per annum, so that may reflect an historic perceived need for 'control' - I'd be interested to know how a county service with urban areas and small rural towns/communities in their mix see the difference, and whether there is deemed to be a different need for different places?
So it seems we're mostly going down the liberalisation route to ease access to the communuity, but that brings the risk of higher stock losses, which will have to be made good - and funded.
But with moves to link Library Management Systems )LMS's) to corporate address and people databases in the 'Customer Relationship Management' (CRM) systems, the pendulum *may* be swinging the other way - if you're not in the CRM, you can't have access? and the standard of proof/authentication for the CRM, which may well be linked to Social Services, Housing, Council Tax and Electoral Register (Data Protection act permitting) may well be very much higher...
And it is socially exclusive - of children, the homeless, of the mobile (be they of 'Nomadic' lifestyles, migrants, visitors/holiday-makers, etc.), unless we make exceptions in our policies, and do things like restricting loan quantities and periods and the types of items that can be loaned.
It is therefore, I submit, a complex web of issues.
For Internet access, the users can't walk off with anything (unless they nick the PC - not unknown here...), so surely it is about the perceived need to track who accessed what and when? That way any 'infringements' (however defined) of policies - 'Acceptable Use', 'Access', whatever - can be tracked down to the originator, especially if the policy of the authority is not to filter (another form of Risk Management), and the user can be asked to account for their actions, as the library service may be itself held to account - not least in the local press. But not if the user is anonymous...
And with PC Booking and Print management systems now tying in to LMS's for user tracking and account managment, we can, in principle, stop users using the Internet if they are not in 'good standing' on the LMS, and vice-versa? Many years ago, Audio (and later video) loans were handled separately from books - today we have them together. Do we see Internet use as another function to control in the same way?
If users are browsing the shelves, they are browsing what we have provided - with the Internet, we provide anything they can find, unless it is restricted, which we may not do.
This all harks back to the question asked last year by Robert Day of Cambridge, about when is a an OPAC not an OPAC? - when it can access elecronic items held inside library domain, and perhaps also outside on licence to the library (a Walled Garden?) with no checks on the user, no booking of a session? - an anonymous virtual browse!
And under Data Protection and Human Rights issues, we only need to know information about an individual which we *need* to know in pursuance of our business - but if we can justify it, we *can* ask for it.
It is therefore, I submit, also a complex web of issues.
As I said, no answers, only questions, but possibly these:
What are our priorities? and the users? and our funders? and the local politicians? and other stakeholders?
Regards
John Usher
-----Original Message-----
From: lis-pub-libs: UK Public Libraries
[mailto:[log in to unmask]]On Behalf Of Andrew Lewis
Sent: 28 February 2005 11:08
To: [log in to unmask]
Subject: Re: [LIS-PUB-LIBS] ICT Access
Dear list
For guest users (who are not registered on the system with verified ID), we
do not require proof of address, or any id.
We ask for a name and signature to borrow a card that allows access.
Proof of address seems a bit Bib Brother/Patriot Act to me. A bit like
asking people for id when they are browsing the shelves.
Andrew Lewis
e-Services Officer
Library and Information Services
Royal Borough of Windsor and Maidenhead
01628 796 592
[log in to unmask]
www.rbwm.gov.uk/libraries
-----Original Message-----
From: Bob Eaves [mailto:[log in to unmask]]
Sent: 25 February 2005 10:23
To: [log in to unmask]
Subject: Re: ICT Access
We don't ask for any ID from our guests/visitors either for Internet access,
but if we did, I wouldn't have thought to question a valid passport.
Bob Eaves
Chief Librarian
Library Services
Sustainable Communities
Comhairle nan Eilean Siar
[log in to unmask]
Western Isles Libraries
19 Cromwell Street
Stornoway
Isle of Lewis
HS1 2DA
Tel. 01851 708631
Fax. 01851 708676
www.cne-siar.gov.uk
> -----Original Message-----
> From: Daguerre, Maia [SMTP:[log in to unmask]]
> Sent: 25 February 2005 10:09
> To: [log in to unmask]
> Subject: Re: ICT Access
>
> We don't ask for any ID from our visitor computer users. As well as the
> arguments for inclusion etc it would be far too time consuming. Also, as
> most of our visitor users are overseas students and tourists having an
> address for them would serve no useful purpose to us.
>
> Maia Daguerre
> Information Services Manager
> City of York Library Service
> (01904) 552802
>
>
> -----Original Message-----
> From: Frances Hendrix [mailto:[log in to unmask]]
> Sent: 25 February 2005 10:03
> To: [log in to unmask]
> Subject: Re: ICT Access
>
>
> Well said!
>
> What nonsense, thought police, over bureaucratic and plain daft.
> Obviously this is a place the new identity card would be a great asset
> (if you had it with you)
>
> -----Original Message-----
> From: lis-pub-libs: UK Public Libraries
> [mailto:[log in to unmask]] On Behalf Of Rob McInroy
> Sent: 25 February 2005 09:39
> To: [log in to unmask]
> Subject: Re: ICT Access
>
> Why do you require proof of address? What does this serve?
>
> I can think of no logical audit requirement. In terms of tracking, why
> track people if they're not doing anything wrong? Do you write down
> everyone's address and details when they offer it? If so, this sounds
> like a bureaucratic way of working. If not, it can't be used for
> tracking purposes anyway.
>
> I would suggest the easiest way out of your problem is to drop the
> requirement for proof of address.
>
>
>
> >>> "Parker, Angella" <[log in to unmask]> 25/02/05
> 09:05:22 >>>
> Hello
>
> Could someone please offer advice on the issue raised below by a
> colleague?
> It is a condition of service that, although IT users do not have to be
> library members, "guest" users must show some proof of ID (preferably
> with an address for audit/tracking purposes).
>
> "A member of staff has been dealing with someone from a traveller site
> who wanted access to the IT service. The person could offer no proof of
> address but did show a passport.
>
> The staff member, in his awareness of our social inclusion message,
> arranged for the person to use the section but is aware that this is in
> breach of the rule we usually apply strictly (no prf of address, no
> access). Has anyone else had the issue of travellers to deal with and
> are you aware of any rulings which may allow us to accommodate them
> without infringing this requirement? We are aware that if we are not
> careful if we let one through the hole, others will follow and make it
> bigger."
>
> Many thanks in advance
> Angella
>
> Angella Parker
> Senior Officer, e-Library Services
> (People's Network & e-Learning)
> Rotherham MBC
>
> Tel. 01709 823672
> Fax. 01709 823650
> Email. [log in to unmask]
>
>
>
>
>
> **********************************************************************
>
> The information in this e-mail is confidential and intended solely for
> the use of the individual to whom it was addressed. If you are not the
> intended recipient, be advised that you have received this e-mail in
> error and that any use, dissemination, forwarding, printing or copying
> of this e-mail is strictly prohibited. If you have received this e-mail
> in error, please advise the sender by using the reply facility in your
> e-mail software, and then delete it from your system.
>
> **********************************************************************
>
>
> Note: We are a Microsoft Office site. Our base version is 4.3. Please
> make sure that files you send can be read in this format.
>
> Any form of reproduction, dissemination, copying, disclosure,
> modification, distribution and/or publication of this e-mail is strictly
> prohibited save unless expressly authorised by the sender.
>
> The information contained in this message is intended for the named
> recipients only. It may contain privileged and confidential information
> and if you are not the addressee or the person responsible for
> delivering this to the addressee, you may not copy, distribute or take
> action in reliance on it. If you have received this message in error,
> please notify the sender(s) immediately by telephone. Please also
> destroy and delete as soon as possible the message from your computer.
>
> ************************************************************************
> *********
> ************************************************************************
> *********
>
>
>
> Note: We are a Microsoft Office site. Our base version is 4.3. Please
> make sure that files you send can be read in this format.
>
> Any form of reproduction, dissemination, copying, disclosure,
> modification, distribution and/or publication of this e-mail is strictly
> prohibited save unless expressly authorised by the sender.
>
> The information contained in this message is intended for the named
> recipients only. It may contain privileged and confidential information
> and if you are not the addressee or the person responsible for
> delivering this to the addressee, you may not copy, distribute or take
> action in reliance on it.
> If you have received this message in error, please notify the sender(s)
> immediately by telephone. Please also destroy and delete as soon as
> possible the message from your computer.
> ************************************************************************
> *********
> ************************************************************************
> *********
>
>
>
> Note: We are a Microsoft Office site. Our base version is 4.3. Please
> make sure that files you send can be read in this format.
>
> Any form of reproduction, dissemination, copying, disclosure,
> modification, distribution and/or publication of this e-mail is strictly
> prohibited save unless expressly authorised by the sender.
>
> The information contained in this message is intended for the named
> recipients only. It may contain privileged and confidential information
> and if you are not the addressee or the person responsible for
> delivering this to the addressee, you may not copy, distribute or take
> action in reliance on it. If you have received this message in error,
> please notify the sender(s) immediately by telephone. Please also
> destroy and delete as soon as possible the message from your computer.
>
> ************************************************************************
> *********
> ************************************************************************
> *********
>
> * * * * * * * * * * * *
> This email and any files transmitted with it are confidential and intended
> solely for the use of the individual or entity to whom they are addressed.
> This email represents the personal views of the author/sender. The
> author/sender has no authority or delegation to bind the City of York
> Council by this e-mail and the City of York Council accepts no
> responsibility whatsoever for its contents. Please note that any reply to
> this email may be screened.
>
> ______________________________________________________________________
> This email has been scanned by the MessageLabs Email Security System.
> For more information please visit http://www.messagelabs.com/email
> ______________________________________________________________________
______________________________________________________________________
This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender
immediately and then delete from your system.
This e-mail message and any attached files have been scanned for the
presence of computer viruses by the MessageLabs Email Security System.
However, you are advised that you open any attachments at your own risk.
****************************************************************************************
This email and any files transmitted with it may contain information
which is privileged and confidential, the disclosure of which is
prohibited by law and intended solely for the use of the individual or
entity to whom they are addressed. If you have received this email in
error please note any dissemination, distribution or copying of this
message is strictly prohibited. Please notify the sender immediately
if you have received this email by mistake and delete it from your
system.
Email transmissions cannot be guaranteed to be secure or error-free as
information can be intercepted, corrupted, lost, destroyed, arrive late
or incomplete, or contain viruses. The sender therefore does not accept
liability for any errors or omissions in the contents of this message
which arise as a result of email transmission. If verification is
required please request a hard copy version.
Thank you for your co-operation.
****************************************************************************************
|