Home | News & Events | Events | 2016 Events | 2016 NISO Webinars | November 16: Digital Security Part 2: Protecting Library Resources From Piracy

NISO Two-Part Webinar: Digital Security

Part 2: Protecting Library Resources From Piracy 

Wednesday, November 16, 2016
1:00 p.m. - 2:30 p.m. (Eastern Time)

Part 1 of this webinar, Securing Library Systems, is being held on Wednesday, November 9.

System Requirements:

  • NISO has developed a quick tutorial, How to Participate in a NISO Web Event. Please view the recording, which is an overview of the web conferencing system and will help to answer the most commonly asked questions regarding participating in an online Webex event.
  • You will need a computer for the presentation and Q&A.
  • Audio is available through the computer (broadcast) and by telephone. We recommend you have a set-up for telephone audio as back-up even if you plan to use the broadcast audio as the voice over Internet isn't always 100% reliable.
  • Please check your system in advance to make sure it meets the Cisco WebEx requirements. It is your responsibility to ensure that your system is properly set up before each webinar begins.  

About the Webinar

In our connected environment, security is tremendously important element of any system.  Institutions large and small have been targets of attack and libraries are a significant vector of approach for some institutions, because of their bias toward access and sharing of resources. In addition to personal information about patrons, library systems contain a variety of valuable information and provide gateways to numerous other resources.  All of these realities require information specialists to be aware of potential risks and how to address them. 

This two-part webinar program will focus on what best practice activities libraries should be implementing to ensure that their services are protected and secure.  Part one of this webinar will be focused on management of internal systems and methods of securing library systems and the data that they hold. 

The second session of this program will be focused on the issue of privacy and methods for protecting content from unauthorized distribution, including digital rights management systems, social DRM, and other approaches to preventing piracy.

Agenda & Event Slides 

Todd Carpenter, Executive Director, NISO

Confirmed Speakers: 

Security Lessons Learned from an EZproxy Administrator
Paul R Butler, MLIS, Library Technologies Support Analyst, Ball State University; 

OCLC's EZproxy maintains a significant market share in library resource security, authentication, and access. In this presentation Paul Butler will review EZproxy's security features and use his experience as an EZproxy administrator to discuss security tips, tools, and techniques that can be useful for both EZproxy and other authentication systems. This presentation will also provide publishers and vendors a better sense of EZproxy's security features. Paul is hopeful that with better knowledge of the systems in use libraries, publishers, and vendors can further the conversation, work together, and make resources more secure while maintaining accessibility and privacy.

Paul Butler is the Library Technologies Support Analyst at Ball State University Libraries in Muncie, Indiana. In this capacity he helps manage several library systems, including OCLC ILLiad for managing interlibrary loan, OCLC EZproxy for handling user access to electronic resources, and the library ILS, SirsiDynix Symphony. Paul is an active member of the EZproxy community, for which he maintains the EZproxy IP blacklist on GitHub. The EZproxy IP blacklist is a community supported effort to share IP addresses used for fraudulent EZproxy activity. Paul received his MLIS from the University of Illinois at Urbana–Champaign School of Information Sciences in 2010.

Do You Know Your Privacy Risks?
Merri Beth Lavignino, Chief Risk Officer, Indiana University


Protecting privacy is inescapably tied to library technology, due to the almost universal use of technology to collect, store, process, and utilize personal information in the pursuit of library goals. Do you know how to identify the privacy risks inherent in your operations, your services, and your strategic initiatives? In this presentation, you will learn how to use privacy harms to identify your risks, and then how to use privacy principles to identify solutions to mitigate those risks.

Merri Beth Lavagnino has over 30 years of experience working in higher education in medium and large universities, both public and private, and a regional consortium. They include the University of Cincinnati, Temple University, Yale University, the University of Vermont, the University of Illinois at Urbana-Champaign, and the Big Ten Academic Alliance. She has worked in a variety of roles including as a student, support staff, faculty, and administrator; and in many disciplines including libraries, information technology, learning technology, security, policy, privacy, compliance, and risk.

In her current role as Chief Risk Officer for Indiana University, she oversees the Enterprise Risk Management program for a major research university comprising seven campuses, nine medical education sites, 114,000 students, 40,000 full- and part-time regular and student employees, $614M in external research funding, and nearly 8,000 acres of real estate, with an annual operating budget of $3.5B.

In addition to her Bachelor of Education and Master of Library Science degrees, Merri Beth is a Certified Compliance & Ethics Professional (CCEP), Certified Information Privacy Professional (CIPP/US, CIPT) and is trained in the Department of Homeland Security's Incident Command System (100, 200, 700, 800, 300, & 400). She enjoys contributing to the profession through speaking, teaching, writing, and service activities both locally and nationally.

Protecting Your Libraries' Resources 
Blake Carver, Senior Systems Administrator, Lyrasis

Speaker Hand-Out, developed by Blake Carver

Libraries are target rich environments. We exist to enable access to information, yet we must also be able to control and limit that access. Our libraries are full of hardware, databases, patron information and various other things that are of value. These things are bought, sold and traded, they are the currency of the underground Internet economy. I will outline practical steps to help protect library content and prevent unauthorized access and piracy.

Blake Carver is Systems Administrator at LYRASIS Digital Technology Services, where he manages the servers and infrastructure that support their hosted ArchivesSpace, Isandora and CollectionSpace. Blake holds an MLS from SUNY Buffalo, and has worked as an academic librarian, as a programmer at a dot.com startup, and as a records manager. He's also known as the guy behind LISNews, LISWire, and LISHost. Blake was one of the first librarian bloggers (he created LISNews in 1999) and is a member of Library Journal’s first “Movers & Shakers” cohort. Blake has presented widely at professional conferences, talking about open source systems, Drupal, WordPress, and IT security for libraries.


* * * * * * * *  

Event Q&A



Registration closes on Wednesday, November 16, 2016 at 12:00 p.m. (ET)

Registration for both parts

SAVE! Register for both parts of this two-part webinar and save 25%!

If paying by credit card, register online for both parts.

If paying by check, please use this PDF form for both parts.

  • NISO Voting Members*
    • $143.00 (US and Canada)
    • $164.00 (International)
  • NASIG Member
    • $143.00
  • Non-Member
    • $188.00 (US and Canada)
    • $224.00 (International)
  • Student
    • $74.00

Registration for Part 2 only

If paying by credit card, register online for Part 2 only.

If paying by check, please use this PDF form for Part 2 only.

  • NISO Voting Member*
    • $95.00 (US and Canada)
    • $109.00 (International)
  • NASIG Member
    • $95.00
  • Non-Member
    • $125.00 (US and Canada)
    • $149.00 (International)
  • Student
    • $49.00

* LSA Member - extra access link fee

Additional information

  • Registration closes at 12:00 p.m. (ET) on Wednesday, November 16, 2016. Cancellations made by Wednesday, November 9, 2016 will receive a refund, less a $25 cancellation. After that date, there are no refunds.
  • Registrants will receive detailed instructions about accessing the webinar via e-mail the Monday prior to the event. (Anyone registering between Monday and the close of registration will receive the message shortly after the registration is received, within normal business hours.) Due to the widespread use of spam blockers, filters, out of office messages, etc., it is your responsibility to contact the NISO office if you do not receive login instructions before the start of the webinar.
  • If you have not received your Login Instruction email by 10 a.m. (ET) on the Tuesday before the webinar, at please contact the NISO office at nisohq@niso.org for immediate assistance.
  • Registration is per site (access for one computer) and includes access to the online recorded archive of the webinar. You may have as many people as you like from the registrant's organization view the webinar from that one connection. If you need additional connections, you will need to enter a separate registration for each connection needed.
  • If you are registering someone else from your organization, either use that person's e-mail address when registering or contact NISO Office to provide alternate contact information.
  • Library Standards Alliance (LSA) members receive one free webinar connection as part of their membership and DO NOT need to register for the event for this free connection. Your webinar contact will receive the login instructions the Monday before the event. You may have as many people as you like from the member's library view the webinar from that one connection. If you need additional connections beyond the free one, then you will need to enter a paid registration (at the member rate) for each additional connection required.
  • Webinar presentation slides and Q&A will be posted to the site following the live webinar.
  • Registrants and LSA member webinar contacts will receive an e-mail message containing access information to the archived webinar recording within 48 hours after the event. This recording access is only to be used by the registrant's or member's organization.