Book Reviews 471 had of their children accessing pornography too early and too easily in the digital age. Though I have used the past tense to describe these moral panics, most are ongoing or even resurgent. It is important to note that this book focuses on textual pornography and not the image (though there is some analysis of image and multimedia in Ruszczycky’s readings of zines and digital culture). Ruszczycky calls on the field of porn studies to expand research beyond the image and into more text. In the digital age, texts that prove crucial to queer self-formation include not just commercially published literature or narrative pornography but everything “from story archives and self-published pornographic novels to promotional materials cre- ated by performers, the erotically elaborate profile text of apps and cruising websites, and the narrative captions appended to pornographic images on micro-blogging platforms.” (138) It is perhaps a pedantic habit of a librarian, but when I open a scholarly book I immediately flip to the acknowledgements section. What librarians, archivists, and other GLAM workers assisted with the research of the book? What collections proved crucial to the scholar’s research questions? The author singled out some big-hitting sexuality collections at major academic institutions as well as the peerless Leather Archives and Museum in Chicago. Academic libraries are clearly crucial to this kind of research, and the research itself raises a number of questions for the information professional. To what extent should we collect these vulgar genres? What gaps will future researchers face based on what we deem unsuitable for our collections today? While public libraries face serious censorship threats in our current moral panic, academic libraries often meekly self-censor by opting only for “serious” literature and categorizing the queer erotic as “trivial.” I was intrigued by an out-of-print novel Ruszczycky briefly discussed in chapter one (Leather Ad: M, by Larry Townsend) that uses classified ads as a narrative device, but found few Worldcat holdings from North American libraries for either the 1972 original or the 1996 reprint. I saw an inexpensive used copy on an online used book website—a withdrawn library book. Vulgar Genres concludes by analyzing Dennis Cooper’s literary response to queer sexuality in the digital realm, noting future opportunities for research at the intersection of literature and the queer digital realm. Yet queer digital spaces are constantly under attack and disap- pearing. How can libraries preserve or collect evidence of this counterpublic that is primar- ily available digitally, or train researchers to personally archive digital ephemera so that it is accessible in the years to come? It is wonderful to read an intelligent study that provokes such questions, and a reminder that literature continues to be one of the greatest spaces to understand and analyze the com- plicated and ever-changing process of queer self-formation. — Walter Schlect, Washington University in St. Louis The Ultimate Privacy Field Guide: A Workbook of Best Practices. Erin Berman, Bonnie Ti- jerina, eds. Chicago, IL: ALA Editions, 2022. 96 pp. Paperback, $29.99 (978-0-8389-3730-3) In an all-encompassing, digitally connected world, librarians are at the forefront of protect- ing patrons’ digital privacy. This is evident in programs like the Library Freedom Project, a group that teaches librarians about privacy issues; the annual New York City Privacy Week, a joint program between the metropolitan area’s public libraries that focuses on digital pri- vacy and security; and recent privacy-oriented books such as law librarian Sarah Lamdan’s Data Cartels. Privacy is a tenet of librarianship, as library users should have the ability to read and research without intrusive surveillance from the state and, in modern times, big tech. 472 College & Research Libraries May 2023 However, librarians may find it difficult to know where to start when it comes to privacy initiatives and policies. The Ultimate Privacy Field Guide, edited by Erin Berman and Bonnie Tijerina, is a workbook that can be used to discuss, plan, and implement privacy initiatives at libraries. The real world ex- amples and scenarios included throughout the book guide librar- ians in an easy and accessible manner that not only informs readers about digital privacy and security, but also provides step-by-step instructions to apply best privacy practices. Berman and Tijerina are privacy advocates in their own right; they have led the Institute of Museum and Library Services–funded Privacy Advocacy Guides for Libraries project, which was used to create online guides to instruct librarians on privacy. Berman also led the Privacy Subcommittee through the ALA Office of Intellectual Freedom from 2018 to 2022, and Tijerina has worked on related projects involving privacy and big data research ethics. This well-organized book takes readers through the process of ensuring privacy for their libraries and communities over seven short chapters. Each chapter introduces a component of privacy, followed by practical examples and exercises that librarians and library staff can complete as individuals or together in order to fully understand the issues at stake. The first chapter highlights digital security basics such as password creation, multifactor authentica- tion, and malware. The second chapter explains how to discuss the importance of privacy with stakeholders such as administrators, patrons, librarians, library staff, and others, pro- viding talking points that explain why privacy should be an institutional priority. Chapter 3 explores non-technology–based privacy practices. Berman and Tijerina open with the design of a privacy-friendly physical space, followed by a discussion of privacy over the data lifecycle, specifically the exposure points of patrons’ personal identifiable information (PII). Privacy audits are addressed in chapter 5, which provides strategies for evaluating a library’s ability to manage user data based on best practices. Chapter 6 assists readers in crafting plain-language privacy policies that show patrons how their data is being used. The final chapter supplies information on working with vendors and addressing privacy issues in contracts. The exercises in each chapter give readers space to take notes and answer questions. This is a book you can write in, recording and documenting a history of the reader’s privacy jour- ney in the manner of a journal. The exercises can also be completed in a collaborative manner involving all library colleagues and staff, and could usefully shape an internal workshop or skillshare within library departments. Additionally, the exercises and problems presented to the reader come from real-world examples. The mere act of discussing privacy concerns with patrons, library staff, and administrators can be complicated and overwhelming, something librarians who have tried it will know. It can be difficult to understand where to begin, why to talk about it, and how. Berman and Tijerina provide helpful talking points tailored for specific stakeholders to make it easier to start the conversation. The highlight of this workbook is its readability. The authors don’t focus on deep theory or philosophical discussions about privacy. Instead, their intent is to provide the practical foundation necessary to implement policies and practices to protect patrons. They introduce modern dangers such as ransomware, phishing, and surveillance culture, as well as the ethi- cal ramifications of privacy and the importance of informing users about vendor policies–or Book Reviews 473 the lack thereof. These brief introductions may compel readers to delve deeper into privacy research. This book is highly recommended for any college or research library in the early stages of exploring privacy practices or that are looking to improve their current ones. It may also appeal to an even larger audience, exploring how library associations and consortia can use this work for wider, collective change in prioritizing privacy. The holistic approach that the editors outline, from the user level of passwords, to the data lifecycle of what information libraries collect, to how librarians can navigate vendor policies and contracts, properly il- lustrates the interconnectedness of library privacy issues and how librarians can address it. — Junior Tidal, New York City College of Technology