3,412
edits
(created page and added content) |
mNo edit summary |
||
| Line 1: | Line 1: | ||
{{Infobox NIFGS|June 2012|{{Methodology, parts 1-6}}|Louise St Denis, Brenda Dougall Merriman and Dr. Penelope Christensen}} | {{Infobox NIFGS|June 2012|{{Methodology, parts 1-6}}|Louise St Denis, Brenda Dougall Merriman and Dr. Penelope Christensen}} | ||
=== | === Standard for Sharing === | ||
The Standard for Sharing Information with Others particularly addresses ethical considerations among family members and professional colleagues (and even strangers). It also touches on the issues of confidentiality, privacy and copyright. A few additional comments for reflection: | The Standard for Sharing Information with Others particularly addresses ethical considerations among family members and professional colleagues (and even strangers). It also touches on the issues of confidentiality, privacy and copyright. A few additional comments for reflection: | ||
| Line 9: | Line 9: | ||
In client work, you must respect the confidential nature of the agreement you share. While you as author of the report have copyright to its form of expression, the client too has certain rights for the use of that report you were paid to research and assemble. This is why spelling out in a contract the current and future rights can ensure fairness to both parties. The client may choose to make that report available to other people, but you should not assume the same option ''without permission''. Having permission in writing, in your file, is the smart thing to do if you wish to make future use of that report. For example, you might want to make a point in lecturing by using a case study, or write an article about solving a special problem. You must also acknowledge that permission. | In client work, you must respect the confidential nature of the agreement you share. While you as author of the report have copyright to its form of expression, the client too has certain rights for the use of that report you were paid to research and assemble. This is why spelling out in a contract the current and future rights can ensure fairness to both parties. The client may choose to make that report available to other people, but you should not assume the same option ''without permission''. Having permission in writing, in your file, is the smart thing to do if you wish to make future use of that report. For example, you might want to make a point in lecturing by using a case study, or write an article about solving a special problem. You must also acknowledge that permission. | ||
==== Sensitivity ==== | ==== Sensitivity ==== | ||
In family research—and this includes client work besides your own ancestors—sensitivity to others’ attitudes and feelings is absolutely essential. The collecting of information normally includes facts and stories from and about living people as well as those long gone. The majority of family historians probably have at least one living parent or relative to help make the first connections to the ancestral trail. Some of those facts and stories may involve an old family scandal or secret. You may find that there is a family secret but no one will talk about it. That might be your first big challenge—to uncover it, so you can make progress into the past. Be very aware that older family members may not share the modern general acceptance of common-law unions, unwed mothers and racial or religious differences. A family history is not written from your 21st century point of view; it takes into account prevailing social values of the times. | In family research—and this includes client work besides your own ancestors—sensitivity to others’ attitudes and feelings is absolutely essential. The collecting of information normally includes facts and stories from and about living people as well as those long gone. The majority of family historians probably have at least one living parent or relative to help make the first connections to the ancestral trail. Some of those facts and stories may involve an old family scandal or secret. You may find that there is a family secret but no one will talk about it. That might be your first big challenge—to uncover it, so you can make progress into the past. Be very aware that older family members may not share the modern general acceptance of common-law unions, unwed mothers and racial or religious differences. A family history is not written from your 21st century point of view; it takes into account prevailing social values of the times. | ||
| Line 23: | Line 23: | ||
*With a client, it’s best to prepare them first for bad or sad news. Advise them that the research results were not what you or they expected; an unforeseen event occurred that her family may have trouble accepting. When you send the report with the details, you could refrain from editorial comments or hypotheses on the situation until the client draws her own conclusions and makes a decision whether to continue or not. | *With a client, it’s best to prepare them first for bad or sad news. Advise them that the research results were not what you or they expected; an unforeseen event occurred that her family may have trouble accepting. When you send the report with the details, you could refrain from editorial comments or hypotheses on the situation until the client draws her own conclusions and makes a decision whether to continue or not. | ||
==== Privacy ==== | ==== Privacy ==== | ||
Another side of the same coin, so to speak, is a living individual’s right to privacy. Most jurisdictions have legislation to protect information submitted by individuals to government and other agencies, such as income taxation and banking. However, there are no effective controls on submissions or access to the Internet and electronic communications in spite of recurring changes to copyright and other laws. Identity theft and financial fraud are a growing threat. No professional genealogist or family historian will ever publish vital information about living people (dates and places of birth and marriage, addresses and telephone numbers, email addresses, etc) which a stranger could manipulate for criminal purposes. Jean Dryden (''Demystifying Copyright'') suggests that encryption of work on your website is one way to restrict access by unauthorized users. Web services with passwords are offered now for secure sites accessible only by invitation from you. | Another side of the same coin, so to speak, is a living individual’s right to privacy. Most jurisdictions have legislation to protect information submitted by individuals to government and other agencies, such as income taxation and banking. However, there are no effective controls on submissions or access to the Internet and electronic communications in spite of recurring changes to copyright and other laws. Identity theft and financial fraud are a growing threat. No professional genealogist or family historian will ever publish vital information about living people (dates and places of birth and marriage, addresses and telephone numbers, email addresses, etc) which a stranger could manipulate for criminal purposes. Jean Dryden (''Demystifying Copyright'') suggests that encryption of work on your website is one way to restrict access by unauthorized users. Web services with passwords are offered now for secure sites accessible only by invitation from you. | ||
edits