1. Managing e-Resources & Licensing
Understand EZproxy security settings,
Evaluate which optional security settings might be beneficial based on user population,
Regularly monitor EZproxy logs for suspicious activity,
Develop a plan / course of action to quickly identify suspicious activity in the event that access is suspended by a vendor.
As Librarians, we want our collections to be used, but what happens when E-Resources are used “too much”? This presentation will describe how Thomas Jefferson University adjusted security procedures after excessive downloading was detected and access was suspended by a vendor. Discussion will include EZproxy security, log analysis, interdepartmental relationships.