Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
collaboration:security [2013/11/04 12:37] – [Security guidelines and suggestions] lefferts | collaboration:security [2018/11/07 18:06] – [Members of the Working Group] hart | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Security | + | ====== Security |
+ | {{:: | ||
- | Following a spate of serious trans-border thefts from major European | + | The CERL Security Working group exists to help member |
- | With the support of the LIBER Executive Board, the Royal Library, Copenhagen, set up the LIBER Security Network in December 2002. | + | |
- | With the adoption of the new LIBER Strategic Plan 2013-2015, and from 1 January 2013, the Royal Library in Copenhagen runs the Security Network under the umbrella of the Consortium of European Research Libraries. The Library Security Network administrator is [[cr@kb.dk|Charlotte Rohde]], The Royal Library, Copenhagen. | ||
- | ===== Members ===== | + | ---- |
- | Kristian Jensen (Chair), British Library\\ | ||
- | Judith Barnes, British Library\\ | ||
- | Denis Bruckmann, Bibliothèque nationale de France\\ | ||
- | Jacqueline Lambert, Royal Library, Brussels\\ | ||
- | Claus Friis, Royal Library, Copenhagen\\ | ||
- | Gabriela Grossenbacher, | ||
- | Charlotte Rohde, Royal Library, Copenhagen\\ | ||
- | Adalbert Roth, Biblioteca Apostolica Vaticana\\ | ||
- | Theo Vermeulen, Royal Library, The Hague\\ | ||
- | ===== Remit ===== | + | ===== Programme of summer schools |
- | * To coordinate information about on-going security | + | The Security Network organises summer schools |
- | * To monitor and disseminate information on emerging methods and technologies | + | \\ |
- | * To identify emerging areas of vulnerability or concern\\ | + | The summer school is always organised in a different part of Europe. The first summer school was held at the Koninklijke Bibliotheek, the National Library of the Netherlands, |
- | * To coordinate access to important documents on legislation, policy | + | {{ : |
- | * To provide guidance on building robust collection security policy | + | \\ |
- | * To organise events for information exchange, as well as skills development\\ | + | Hosts of each summer school address the issues above, but will tailor |
- | * To serve as an interface with security networks in related sectors\\ | + | |
- | The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, wilful destruction, | + | |
+ | * 2017 [[https:// | ||
+ | * 2018 [[https:// | ||
+ | * 2019 Tartu, University of Tartu Library | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Remit ====== | ||
+ | |||
+ | * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Security Network and through other appropriate channels | ||
+ | * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection | ||
+ | * To identify emerging areas of vulnerability or concern | ||
+ | * To coordinate access to important documents on legislation, | ||
+ | * To provide guidance on building robust collection security policy and practice relating to threats to collections | ||
+ | * To organise events for information exchange, as well as skills development | ||
+ | * To serve as an interface with security networks in related sectors | ||
+ | |||
+ | The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, willful destruction, | ||
+ | |||
+ | Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all. | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Members of the Working Group ===== | ||
+ | |||
+ | Chairman: [[jacqueline.lambert@kbr.be|Jacqueline Lambert]], Koninklijke Bibliotheek van België – Bibliothèque royale de Belgique, Brussels\\ | ||
+ | [[boka.laszlo@oszk.hu|László Boka]], National Széchényi Library of Hungary, Budapest\\ | ||
+ | [[denis.bruckmann@bnf.fr|Denis Bruckmann]], | ||
+ | [[per.cullhed@ub.uu.se|Per Cullhed]], Uppsala University Library, Uppsala\\ | ||
+ | [[adrian.edwards@bl.uk|Adrian Edwards]], British Library, London\\ | ||
+ | [[claudia.fabian@bsb-muenchen.de|Claudia Fabian]] and [[ikas@bsb-muenchen.de|Wolfgang-Valentin Ikas ]], Bayerische Staatsbibliothek, | ||
+ | [[mailto: | ||
+ | [[lars.ilshammar@kb.se|Lars Ilshammar]], | ||
+ | [[nina.korbu@nb.no|Nina Korbu]], National Library of Norway, Oslo\\ | ||
+ | [[eva.nylander@ub.lu.se|Eva Nylander]], University Library, Lund - on behalf of the CERL Swedish group members\\ | ||
+ | [[wim.tromp@kb.nl|Wim Tromp]], Koninklijke Bibliotheek, | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | |||
+ | ===== The confidential Security Network ===== | ||
+ | Institutions may nominate one member of staff (typically the Head of Security or equivalent) to be included in the Security Network mailing list. This mailing list is a secure environment for the exchange of confidential information regarding incidents of criminal activity witnessed in subscribing institutions. | ||
+ | |||
+ | With the support of the LIBER Executive Board, the Royal Library, Copenhagen, set up the LIBER Security Network in December 2002. From January 2013 the Security Network is hosted by CERL. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Tools Proposed by the Security Working Group ===== | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/ | ||
+ | |||
+ | Two formats are available: to be printed as a {{ : | ||
+ | |||
+ | ==== Under Development ==== | ||
+ | Two supporting tools related to the QAT (see pp. 6-7 of the QAT) are under development. For this we will need the help of all the Network. We would like you to send us a maximum of examples (forms, check-lists, | ||
+ | |||
+ | ---- | ||
===== Conferences ===== | ===== Conferences ===== | ||
- | The 4th LIBER Collection Security Conference | + | ** British Library, London**\\ |
+ | //Our Written Heritage in Peril//, a conference organised by the British Library and the Institute of Art and Law took place on 26 June 2015. It had a special focus on legal aspects of the return of stolen books across borders. While not organised by CERL, the conference heard papers from five CERL member institutions and a future role for CERL in connection with ILAB’s database of stolen books was discussed. The papers | ||
- | Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the following websites: | + | https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-1 |
+ | https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-2 | ||
+ | https://soundcloud.com/ | ||
+ | https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-4 | ||
+ | **Biblioteca Apostolica Vaticana, Rome**\\ | ||
+ | The title of the first conference of the CERL Security Network was ** Library Security: Practices and Strategies** and took place on 8 May 2015, at the Biblioteca Apostolica Vaticana, Rome. | ||
+ | The programme was divided into four sessions covering Accountability and Governance, Staff interaction with collections, | ||
+ | {{:: | ||
+ | PowerPoint presentations: | ||
+ | Per Culhed, Uppsala Universitetsbiblioteket, | ||
+ | Kristian Jensen, British Library, London, {{: | ||
+ | |||
+ | **Koninklijke Bibliotheek, | ||
+ | The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http:// | ||
+ | |||
+ | **British Library, London**\\ | ||
+ | Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the [[http:// | ||
+ | Perhaps more interestingly here is a link to a //Report on International Roundtable Meeting on Collection Security held at the British Library// written by Andy Stephens and Helen Shenton, | ||
+ | Finally, all articles from this special issue of LIBER Quarterly are available [[http:// | ||
+ | |||
+ | |||
+ | ---- | ||
===== Relevant websites ===== | ===== Relevant websites ===== | ||
+ | |||
==== General ==== | ==== General ==== | ||
- | * http://www.rbms.info/ | + | * http:// |
* International Committee for Museum Security (ICOM) http:// | * International Committee for Museum Security (ICOM) http:// | ||
* [[http:// | * [[http:// | ||
+ | * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations. | ||
+ | ==== Artificial DNA marking ==== | ||
+ | In 2015, [[http:// | ||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | |||
==== Recording distinguishing features of a collection ===== | ==== Recording distinguishing features of a collection ===== | ||
- | [[http:// | + | * [[http:// |
- | + | * KB Copenhagen, features of the Royal Collection http:// | |
- | + | ||
+ | ==== Security guidelines and recommendations ==== | ||
- | ==== Security guidelines | + | * Recommendations drawn up by the the German group DBV-AG Handschriften und Alte Drucke (2015) http:// |
+ | * Theft of Books and Manuscripts from Libraries: an advisory code of conduct for booksellers and librarians by CILIP and the Antiquarian Booksellers Association http:// | ||
* | * | ||
* ACRL/RBMS Guidelines Regarding Security and Theft in Special Collections http:// | * ACRL/RBMS Guidelines Regarding Security and Theft in Special Collections http:// | ||
* Blogpost by Ferriero, National Archives of America, with pointers on improving security http:// | * Blogpost by Ferriero, National Archives of America, with pointers on improving security http:// | ||
* Guidelines for reviewing security measures in museums, [[http:// | * Guidelines for reviewing security measures in museums, [[http:// | ||
+ | * Book review by Raphaele Mouren, of //Guide to Security Considerations and Practices for Rare Book, Manuscript, and Special Collection Libraries//, | ||
==== Making missing or stolen books known ==== | ==== Making missing or stolen books known ==== | ||
Line 66: | Line 145: | ||
* Antiquarian Booksellers Association of America, 20 West 44th St., 4th floor, New York, NY 10035-6604. 212-944-8291; | * Antiquarian Booksellers Association of America, 20 West 44th St., 4th floor, New York, NY 10035-6604. 212-944-8291; | ||
* DeRicci Project: dericci@aol.com (for pre-1600 manuscripts only) | * DeRicci Project: dericci@aol.com (for pre-1600 manuscripts only) | ||
- | * International League of Antiquarian Booksellers (ILAB). Send theft reports and requests for database searches to: security@ilab-lila.com (Reporting and searching limited to members). | + | * International League of Antiquarian Booksellers (ILAB). Send theft reports and requests for database searches to: ilaborginfo@gmail.com. For books stolen after 15 June 2010 http:// |
* International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: | * International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: | ||
* Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http:// | * Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http:// | ||
Line 73: | Line 152: | ||
* Map thefts http:// | * Map thefts http:// | ||
* [[http:// | * [[http:// | ||
- | ===== THE COPENHAGEN PRINCIPLES ===== | + | * Stolen in France, found in Hungary http:// |
- | + | * The police in Bavaria ask for identification of editions and of owners of the pages and plates reproduced here, found in the possession of a suspected book thief (summer 2016)\\ | |
- | Background | + | - {{ : |
+ | - {{ : | ||
+ | - {{ : | ||
+ | * Stolen from a West London warehouse on the night of 29th January 2017 while in transit for the California Book Fair. Two lists list of titles: {{ : | ||
- | The last decade has seen the rapid development of a number of factors affecting the security of significant library collections. | ||
- | * The market value of large parts of library collections now equals the prices of the most expensive antiques and works of art; | ||
- | * The interest of the free market in items held in libraries is constantly increasing; | ||
- | * Valuable parts of library collections have been subject to grave instances of theft of a trans-national character across Europe. | ||
- | Recognizing these developments, | ||
- | | ||
- | From the evidence it is clear that individual libraries have dealt with these matters in a rather isolated way in the past, and that co-operation between libraries has been only sporadic. On the other hand all libraries tend to involve the police authorities at the point of theft. Bodies such as Interpol and Europol also have considerable expertise in counteracting thefts of cultural assets. But Europe has a wide range of different legal systems, and this can make theft investigation more intricate and therefore rather slow. | ||
- | | ||
- | The international criminal world is not dependent on legal and administrative restrictions, | ||
- | Interpol and national and international police authorities are, on the other hand, completely dependent on the evidence produced by the victim of the theft. Insufficient evidence weakens the case both for the police and the law. Libraries entrusted with collections of cultural value must give a high priority to their security policies and systems. They need to develop better communication and co-operation on security issues with police organisations such as Interpol and Europol and with national legal systems. | + | ---- |
- | + | ||
- | In the business world, if a company loses valuables through theft, it will normally have made arrangements in advance for compensation, | + | |
- | Libraries have to be open to the general public and make their collections available to the public. Librarians generally have an open mind and show a co-operative approach to users, both scholars and the general public. This very openness and co-operation can be exploited by criminals. | + | ===== The Copenhagen Principles ===== |
- | + | ||
- | This is the kind of reality libraries have to face. They are no longer safe retreats. They are for better or worse an active part of society, with all that this entails. | + | A conference on Library security management was held under the auspices |
- | + | ||
- | Those of us who are entrusted with the task of preserving cultural assets must realise this fact and face up to it in order to forestall acts of criminality directed at our collections. Without surrendering our open approach, we should try to overcome the naivety with which it has from time to time been associated | + | |
- | + | ||
- | The evidence suggests that there are a number of weaknesses in the way we handle criminal attacks against our collections and in the organisation of our security arrangements. These must be addressed and eliminated if our libraries are to be in a stronger position against international criminality. Openness on the part of libraries is a crucial factor in this development. Institutional silence can only be to the benefit of the thief. | + | |
- | An Organisational Network for International Co-operation on Security Problems in National and Research Libraries | + | |
- | ====== Principles | + | ==== Principles ==== |
=== Principle 1 === | === Principle 1 === | ||
Line 137: | Line 203: | ||
The representatives encourage LIBER to establish co-operation on security issues with the book trade and with other memory institutions. | The representatives encourage LIBER to establish co-operation on security issues with the book trade and with other memory institutions. | ||
- | -------------------------------- | + | |
Unanimously endorsed by the delegates at the LIBER Conference on Library Security Management, Copenhagen, 12-14 May 2002. | Unanimously endorsed by the delegates at the LIBER Conference on Library Security Management, Copenhagen, 12-14 May 2002. | ||
Copenhagen, 14 May 2002 | Copenhagen, 14 May 2002 | ||
Line 148: | Line 214: | ||
Conference Chairmen | Conference Chairmen | ||
+ | |||
+ | {{: | ||
+ | |||
+ | |||
+ | ---- | ||
+ |
collaboration/security.txt · Last modified: 2024/09/26 16:32 by lefferts