Visit our "Search the ER&L 2016 Program" page to peruse all the accepted and peer-reviewed sessions for the 11th Anniversary Electronic Resources and Libraries Conference, April 3-6, 2016.
Click to view information about ER&L 2016 Online and Austin registration.
S54 - EZproxy Security: When Your Electronic Resources Are Used "Too Much"
Conference Track
1. Managing e-Resources & Licensing
Learning Objectives
Understand EZproxy security settings,
Evaluate which optional security settings might be beneficial based on user population,
Regularly monitor EZproxy logs for suspicious activity,
Develop a plan / course of action to quickly identify suspicious activity in the event that access is suspended by a vendor.
Abstract
As Librarians, we want our collections to be used, but what happens when E-Resources are used “too much”? This presentation will describe how Thomas Jefferson University adjusted security procedures after excessive downloading was detected and access was suspended by a vendor. Discussion will include EZproxy security, log analysis, interdepartmental relationships.