Home | Resources | Services | Hosting | Publications | Collaboration | Joining CERL | About CERL |

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
collaboration:security [2014/11/05 12:28] – [Security Network] leffertscollaboration:security [2015/04/02 14:46] – [Security Working Group] versprille
Line 1: Line 1:
-====== Security Network ======+====== Security Working Group ======
  
-The CERL security working group exists to help member libraries enhance the security of their culturally important heritage collections   +{{:collaboration:cerl-security-70px-250px-rgb.gif?200|}}
  
 +The CERL Security Working group exists to help member libraries enhance the security of their culturally important heritage collections. 
  
  
 +The title of the first conference of the CERL Security Network is ** Library Security: Practices and Strategies** and will take place on 8 May 2015, at the Biblioteca Apostolica Vaticana, Rome.
 +The programme is divided into four sessions covering Accountability and Governance, Staff interaction with collections, Digital tools for prevention and detection, and The process of recovery. How do we interact with the investigating and legal authority.
 +The full programme is available
 +{{::security_network_conference_-_rome_may_2015.pdf|here}}.\\
 +===== Remit ======
 +
 +  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Security Network and through other appropriate channels
 +  * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection
 +  * To identify emerging areas of vulnerability or concern
 +  * To coordinate access to important documents on legislation, policy and practice relating to collection security
 +  * To provide guidance on building robust collection security policy and practice relating to threats to collections
 +  * To organise events for information exchange, as well as skills development
 +  * To serve as an interface with security networks in related sectors
 +
 +The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, willful destruction, or by the adulteration of collection. Other physical threats to collections, such as fire, earthquakes, terrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.
 +
 +Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all.
  
 ===== Members of the Working Group ===== ===== Members of the Working Group =====
Line 11: Line 29:
 Denis Bruckmann, Bibliothèque nationale de France\\ Denis Bruckmann, Bibliothèque nationale de France\\
 Per Cullhed, Uppsala University Library, Uppsala\\ Per Cullhed, Uppsala University Library, Uppsala\\
 +Claudia Fabian, Bayerische Staatsbibliothek, München\\
 Jacqueline Lambert, Royal Library, Brussels\\ Jacqueline Lambert, Royal Library, Brussels\\
 Claus Friis, Royal Library, Copenhagen\\ Claus Friis, Royal Library, Copenhagen\\
-Gabriela Grossenbacher, Swiss National Library\\ 
 Nina Korbu, National Library of Norway\\ Nina Korbu, National Library of Norway\\
 Charlotte Rohde, Royal Library, Copenhagen\\ Charlotte Rohde, Royal Library, Copenhagen\\
Line 19: Line 37:
 Theo Vermeulen, Royal Library, The Hague\\ Theo Vermeulen, Royal Library, The Hague\\
  
-===== Remit ===== 
  
-  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Library Security Network and through other appropriate channels\\ + 
-  * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection\\ +===== The confidential Security Network ===== 
-  * To identify emerging areas of vulnerability or concern\\ +Institutions may nominate one member of staff (typically the Head of Security or equivalent) to be included in the Security Network mailing list. This mailing list is a secure environment for the exchange of confidential information regarding incidents of criminal activity witnessed in subscribing institutions. 
-  * To coordinate access to important documents on legislation, policy and practice relating to collection security\\ + 
-  * To provide guidance on building robust collection security policy and practice relating to threats to collections\\ +With the support of the LIBER Executive Boardthe Royal LibraryCopenhagenset up the LIBER Security Network in December 2002. From January 2013 the Security Network is hosted by CERL.
-  * To organise events for information exchange, as well as skills development\\ +
-  * To serve as an interface with security networks in related sectors\\ +
-The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, wilful destruction, or by the adulteration of collection.  Other physical threats to collectionssuch as fireearthquakesterrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.\\+
  
  
Line 35: Line 49:
 The 5th Collection Security Conference (under the auspices of CERL), will take place at the Vatican Library on 8 May 2015. The 5th Collection Security Conference (under the auspices of CERL), will take place at the Vatican Library on 8 May 2015.
  
-The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http://www.kb.nl/en/expertise/for-libraries/conferences-and-seminars/liber-collection-security-conference|here]]. +The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http://www.kb.nl/en/organisation/research-expertise/for-libraries/liber-collection-security-conference|here]].
- +
-Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the following websites:  [[http://www.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html]] and [[http://liber.library.uu.nl/index.php/lq/issue/view/461]]+
  
 +Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the  [[http://www.webarchive.org.uk/wayback/archive/20130123070908/http:/vincent.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html|BL website]]. 
 +Perhaps more interestingly here is a link to a //Report on International Roundtable Meeting on Collection Security held at the British Library// written by Andy Stephens and Helen Shenton,  published in [[http://www.bl.uk/aboutus/stratpolprog/collectioncare/publications/articles/2008/liberintround.pdf|Liber Quarterly Volume 18 Issue 2 2008]].
 +Finally, all articles from this special issue of LIBER Quarterly are available [[http://liber.library.uu.nl/index.php/lq/issue/view/461|here]].
  
  
Line 49: Line 64:
   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.
 ==== Recording distinguishing features of a collection ===== ==== Recording distinguishing features of a collection =====
-  * [[http://www.kb.nl/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features+  * [[http://www.kb.nl/organisatie/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features
   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm
  
Line 79: Line 94:
 ===== THE COPENHAGEN PRINCIPLES ===== ===== THE COPENHAGEN PRINCIPLES =====
    
-Background and present overview +A conference on Library security management was held under the auspices of LIBER in the Royal LibraryCopenhagen, in May 2002, which formulated and endorsed The Copenhagen Principles (14 May 2002 / see below)
- +
-The last decade has seen the rapid development of a number of factors affecting the security of significant library collections. +
-  * The market value of large parts of library collections now equals the prices of the most expensive antiques and works of art; +
-  * The interest of the free market in items held in libraries is constantly increasing; +
-  * Valuable parts of library collections have been subject to grave instances of theft of a trans-national character across Europe. +
-Recognizing these developments, we have decided to set up closer co-operation among libraries with the purpose of preventing or resolving such incidents. +
-                                 +
-From the evidence it is clear that individual libraries have dealt with these matters in a rather isolated way in the pastand that co-operation between libraries has been only sporadic. On the other hand all libraries tend to involve the police authorities at the point of theft. Bodies such as Interpol and Europol also have considerable expertise in counteracting thefts of cultural assets. But Europe has a wide range of different legal systems, and this can make theft investigation more intricate and therefore rather slow. +
-     +
-The international criminal world is not dependent on legal and administrative restrictions, but can exploit to the full the openness of the modern communication and information society. This creates the basis of a ‘crime internet’. +
- +
-Interpol and national and international police authorities are, on the other hand, completely dependent on the evidence produced by the victim of the theft. Insufficient evidence weakens the case both for the police and the law. Libraries entrusted with collections of cultural value must give a high priority to their security policies and systems. They need to develop better communication and co-operation on security issues with police organisations such as Interpol and Europol and with national legal systems. +
-   +
-In the business world, if a company loses valuables through theftit will normally have made arrangements in advance for compensationeither through insurance or replacement. For cultural institutions the situation is almost exactly the opposite. Libraries cannot insure their collections, because what they might lose is almost impossible to replace. One cannot insure against such things in a traditional way. +
- +
-Libraries have to be open to the general public and make their collections available to the public. Librarians generally have an open mind and show a co-operative approach to users, both scholars and the general public. This very openness and co-operation can be exploited by criminals. +
- +
-This is the kind of reality libraries have to face. They are no longer safe retreats. They are for better or worse an active part of society, with all that this entails. +
- +
-Those of us who are entrusted with the task of preserving cultural assets must realise this fact and face up to it in order to forestall acts of criminality directed at our collections. Without surrendering our open approach, we should try to overcome the naivety with which it has from time to time been associated and act in a more professional way. +
- +
-The evidence suggests that there are a number of weaknesses in the way we handle criminal attacks against our collections and in the organisation of our security arrangementsThese must be addressed and eliminated if our libraries are to be in a stronger position against international criminality. Openness on the part of libraries is a crucial factor in this development. Institutional silence can only be to the benefit of the thief. +
-An Organisational Network for International Co-operation on Security Problems in National and Research Libraries +
 ====== Principles ====== ====== Principles ======
  
Line 152: Line 143:
  
 Conference Chairmen Conference Chairmen
 +
 +
 +
 +
 +{{:collaboration:368_drz.pdf|}}
 collaboration/security.txt · Last modified: 2024/05/06 11:21 by lefferts

 

 

Recent changes RSS feed Valid XHTML 1.0 Driven by DokuWiki