Chapter 6. Keeping Your Digital Legacy Safe

Authors

  • Heather Moorefield-Lang
  • Jeffry Lang

Abstract

Chapter 6 of Library Technology Reports (vol. 56, no. 5), “Digital Legacy,” focuses on cybersecurity and digital legacy. We as digital citizens go to great lengths to keep our information secure and safe. Librarians and educators train students and patrons in ways to keep information secure in a digital society. But what happens to that information when you are no longer a citizen in the digital environment? What happens when your loved ones need access to your digital information, files, and more? This chapter focuses on methods for building a safe and secure digital legacy for your friends, family, and yourself throughout your life and after.

Author Biographies

Heather Moorefield-Lang

Heather Moorefield-Lang is an assistant professor at the University of North Carolina at Greensboro in the Department of Library and Information Science. She has long been interested in how technologies can enhance instruction in libraries and classrooms. Her current research focuses on makerspaces in libraries of all types. She had the honor of being nominated for the White House Champion of Change for Making in 2016 and was awarded an AASL Research Grant in 2019 for her research in makerspaces. To learn more about Heather and her work, see her website https://www.techfifteen .com, check out her YouTube channel Tech 15, or follow her on Twitter @actinginthelib.

Jeffry Lang

Jeffry Lang works as a lead security analyst for the Security Office at Virginia Tech. He has worked in various areas of information technology, including computing technology system administrator and technology manager for multiple organizations. Jeffry has a BA in philosophy from UNC Greensboro and a master of information technology from Virginia Tech. He has experience with network monitoring and forensics, intrusion detection, and configuring security appliances. He is a SANS Certified Intrusion Analyst, Windows Security Administrator, Network Forensics Analyst, Certified Detection Analyst, and Enterprise Defender.

Downloads

Published

2020-07-10

Issue

Section

Chapters