Home | Resources | Services | Hosting | Publications | Collaboration | Joining CERL | About CERL |

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
collaboration:security [2014/11/05 12:28] – [Security Network] leffertscollaboration:security [2018/11/07 11:46] hart
Line 1: Line 1:
-====== Security Network ======+====== Security Working Group ======
  
-The CERL security working group exists to help member libraries enhance the security of their culturally important heritage collections   +{{::security.png?250|}}
  
 +The CERL Security Working group exists to help member libraries enhance the security of their culturally important heritage collections. 
  
  
 +===== Programme of summer schools =====
 +
 +The Security Network organises summer schools on Security issues. Curators and security officers from libraries and archives are invited to spend a few days at a course where we aim to share knowledge on topics like collection security, reading the behaviour of your readers, legal aspects, national and international collaboration, what to do after a theft, embedding security in the wider organisation, and digital security. \\
 +\\
 +The summer school is always organised in a different part of Europe. The first summer school was held at the Koninklijke Bibliotheek, the National Library of the Netherlands, the 2018 and 2019 summerschools will be in Rome and Tartu, respectively. If you wish to host the summer school, please contact [[mailto:marian.lefferts@cerl.org|Marian Lefferts]].\\
 +{{ :collaboration:20170906_175028.jpg?600 |}}\\
 +\\
 +Hosts of each summer school address the issues above, but will tailor the programme to the situation in their own region, and will select the most suitable speakers to address the topics on the programme. The hope is that the summer schools will create a network of security officers and curators who work together on best practices, who alert each other to potential thieves or stolen books on the market, and who generally support each other in security matters.
 +
 +
 +  * 2017 [[https://www.cerl.org/collaboration/security/2017thehaguesummerschool|The Hague, the Koninklijke Bibliotheek, the National Library of the Netherlands]]\\
 +  * 2018 [[https://www.cerl.org/collaboration/security/2018romesummerschool|Rome, Biblioteca Nazionale Centrale]]
 +  * 2019 Tartu, University of Tartu Library
 +
 +===== Remit ======
 +
 +  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Security Network and through other appropriate channels
 +  * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection
 +  * To identify emerging areas of vulnerability or concern
 +  * To coordinate access to important documents on legislation, policy and practice relating to collection security
 +  * To provide guidance on building robust collection security policy and practice relating to threats to collections
 +  * To organise events for information exchange, as well as skills development
 +  * To serve as an interface with security networks in related sectors
 +
 +The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, willful destruction, or by the adulteration of collection. Other physical threats to collections, such as fire, earthquakes, terrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.
 +
 +Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all.
  
 ===== Members of the Working Group ===== ===== Members of the Working Group =====
  
-Kristian Jensen (Chair)British Library\\ +Chairman: [[jacqueline.lambert@kbr.be|Jacqueline Lambert]]Koninklijke Bibliotheek van België – Bibliothèque royale de Belgique, Brussels\\ 
-Denis Bruckmann, Bibliothèque nationale de France\\ +[[boka.laszlo@oszk.hu|László Boka]] - National Széchényi Library of Hungary\\ 
-Per Cullhed, Uppsala University Library, Uppsala\\ +[[denis.bruckmann@bnf.fr|Denis Bruckmann]], Bibliothèque nationale de France, Paris\\ 
-Jacqueline LambertRoyal Library, Brussels\\ +[[per.cullhed@ub.uu.se|Per Cullhed]], Uppsala University Library, Uppsala\\ 
-Claus Friis, Royal Library, Copenhagen\\ +[[adrian.edwards@bl.uk|Adrian Edwards]]British Library, London\\ 
-Gabriela GrossenbacherSwiss National Library\\ +[[claudia.fabian@bsb-muenchen.de|Claudia Fabian]] and [[ikas@bsb-muenchen.de|Wolfgang-Valentin Ikas ]], Bayerische Staatsbibliothek, München\\ 
-Nina Korbu, National Library of Norway\\ +[[mailto:cf@kb.dk|Claus Friis]] and [[alm@kb.dk|Anna Magdalena Lindskog Midtgaard]]Det Kongelige Bibliotek, Copenhagen\\ 
-Charlotte RohdeRoyal Library, Copenhagen\\ +[[lars.ilshammar@kb.se|Lars Ilshammar]]Kungliga Biblioteket, Sweden\\ 
-Adalbert RothBiblioteca Apostolica Vaticana\\ +[[nina.korbu@nb.no|Nina Korbu]], National Library of Norway\\ 
-Theo Vermeulen, Royal Library, The Hague\\+[[eva.nylander@ub.lu.se|Eva Nylander]]University Library, Lund - on behalf of the CERL Swedish group members\\ 
 +[[wim.tromp@kb.nl|Wim Tromp]]Koninklijke Bibliotheek, The Hague\\ 
 + 
  
-===== Remit =====+===== The confidential Security Network ===== 
 +Institutions may nominate one member of staff (typically the Head of Security or equivalent) to be included in the Security Network mailing list. This mailing list is a secure environment for the exchange of confidential information regarding incidents of criminal activity witnessed in subscribing institutions.
  
-  * To coordinate information about on-going security issues of relevance for collections within the scope of CERLthrough the CERL Library Security Network and through other appropriate channels\\ +With the support of the LIBER Executive Board, the Royal Library, Copenhagen, set up the LIBER Security Network in December 2002From January 2013 the Security Network is hosted by CERL.
-  * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection\\ +
-  * To identify emerging areas of vulnerability or concern\\ +
-  * To coordinate access to important documents on legislation, policy and practice relating to collection security\\ +
-  * To provide guidance on building robust collection security policy and practice relating to threats to collections\\ +
-  * To organise events for information exchange, as well as skills development\\ +
-  * To serve as an interface with security networks in related sectors\\ +
-The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, wilful destruction, or by the adulteration of collection Other physical threats to collections, such as fire, earthquakes, terrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.\\+
  
  
 ===== Conferences ===== ===== Conferences =====
  
-The 5th Collection Security Conference (under the auspices of CERL), will take place at the Vatican Library on 8 May 2015.+** British Library, London**\\
  
-The 4th LIBER Collection Security Conference took place on Friday 23 November 2012The programme and powerpoint presentations are available [[http://www.kb.nl/en/expertise/for-libraries/conferences-and-seminars/liber-collection-security-conference|here]].+//Our Written Heritage in Peril//, a conference organised by the British Library and the Institute of Art and Law took place on 26 June 2015It had a special focus on legal aspects of the return of stolen books across bordersWhile not organised by CERL, the conference heard papers from five CERL member institutions and a future role for CERL in connection with ILAB’s database of stolen books was discussed. The papers and the discussion can be heard in the four podcasts listed below.
  
-Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the following websites:  [[http://www.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html]] and [[http://liber.library.uu.nl/index.php/lq/issue/view/461]]+https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-1 
 +https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-2 
 +https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-3 
 +https://soundcloud.com/the-british-library/podcast-written-heritage-of-mankind-in-peril-part-4
  
 +
 +**Biblioteca Apostolica Vaticana, Rome**\\
 +The title of the first conference of the CERL Security Network was ** Library Security: Practices and Strategies** and took place on 8 May 2015, at the Biblioteca Apostolica Vaticana, Rome.
 +The programme was divided into four sessions covering Accountability and Governance, Staff interaction with collections, Digital tools for prevention and detection, and The process of recovery. How do we interact with the investigating and legal authority? The full programme is available
 +{{::security_network_conference_-_rome_may_2015.pdf|here}}.\\ 
 +
 +PowerPoint presentations:\\
 +Per Culhed, Uppsala Universitetsbiblioteket, {{:services:seminars:shelfie-project.ppt|A simple but efficient technique for audits of book collections}}.\\
 +Kristian Jensen, British Library, London, {{:services:seminars:vaticanpresentation2.pdf|Collection Security Governance in the British Library}}.
 +
 +**Koninklijke Bibliotheek, The Hague**\\
 +The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http://www.kb.nl/en/organisation/research-expertise/for-libraries/liber-collection-security-conference|here]].
 +
 +**British Library, London**\\
 +Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the  [[http://www.webarchive.org.uk/wayback/archive/20130123070908/http:/vincent.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html|BL website]]. 
 +Perhaps more interestingly here is a link to a //Report on International Roundtable Meeting on Collection Security held at the British Library// written by Andy Stephens and Helen Shenton,  published in [[http://www.bl.uk/aboutus/stratpolprog/collectioncare/publications/articles/2008/liberintround.pdf|Liber Quarterly Volume 18 Issue 2 2008]].
 +Finally, all articles from this special issue of LIBER Quarterly are available [[http://liber.library.uu.nl/index.php/lq/issue/view/461|here]].
  
  
Line 44: Line 89:
 ==== General ==== ==== General ====
  
-  * http://www.rbms.info/committees/security/index.shtml+  * http://rbms.info/committees/security/
   * International Committee for Museum Security (ICOM) http://network.icom.museum/icms/   * International Committee for Museum Security (ICOM) http://network.icom.museum/icms/
   * [[http://www.collectionslink.org.uk/security|Collections Trust, United Kingom - Security]]   * [[http://www.collectionslink.org.uk/security|Collections Trust, United Kingom - Security]]
   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.
 +
 +==== Artificial DNA marking ====
 +In 2015, [[http://www.aristitle.com/|ARIS]] sponsored the “Global Centre of Innovation for the i2M Standards” at the University of NY in Albany to develop standards and a product for object marking with artificial DNA and a high security data management system.  This specific model of implementation is not directly  relevant for libraries as it relies on placing physical carriers of DNA on each item, and as it aims to track the movement of objects through the trade,  which requires a complex centrally administered database. However it shows that the technology is moving towards implementation. Two links with further information:
 +  * [[http://www.prnewswire.com/news-releases/university-at-albany-launches-i2m-standards-key-advances-in-systemic-solutions-to-solve-art-industry-fraud-300158161.html|I2M product]]\\
 +  * [[http://thecreatorsproject.vice.com/blog/synthetic-dna-could-soon-be-used-to-thwart-art-fraud|A blog on DNA marking]]
 + 
 ==== Recording distinguishing features of a collection ===== ==== Recording distinguishing features of a collection =====
-  * [[http://www.kb.nl/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features+  * [[http://www.kb.nl/organisatie/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features
   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm
  
Line 55: Line 106:
  
  
-==== Security guidelines and suggestions ====+==== Security guidelines and recommendations ====
  
 +  * Recommendations drawn up by the the German group DBV-AG Handschriften und Alte Drucke (2015) http://www.bibliotheksverband.de/fachgruppen/arbeitsgruppen/handschriften-und-alte-drucke/aktivitaeten/empfehlungen.html 
   *   Theft of Books and Manuscripts from Libraries: an advisory code of conduct for booksellers and librarians by CILIP and the Antiquarian Booksellers Association http://www.cilip.org.uk/rare-books-and-special-collections-group/policy-statements   *   Theft of Books and Manuscripts from Libraries: an advisory code of conduct for booksellers and librarians by CILIP and the Antiquarian Booksellers Association http://www.cilip.org.uk/rare-books-and-special-collections-group/policy-statements
   *   Guidelines drawn up by the EBNA Expert Working Group (2008) http://ec.europa.eu/archival-policy/docs/eag/practical_guidance_en.pdf   *   Guidelines drawn up by the EBNA Expert Working Group (2008) http://ec.europa.eu/archival-policy/docs/eag/practical_guidance_en.pdf
Line 70: Line 122:
   * Antiquarian Booksellers Association of America, 20 West 44th St., 4th floor, New York, NY 10035-6604. 212-944-8291; (fax) 212-944-8293; email: hq@abaa.com. The ABAA circulates reports of thefts through its electronic discussion list and maintains a stolen books database with a report form at http://www.abaa.org/books/abaa/databases/stolen_search.html   * Antiquarian Booksellers Association of America, 20 West 44th St., 4th floor, New York, NY 10035-6604. 212-944-8291; (fax) 212-944-8293; email: hq@abaa.com. The ABAA circulates reports of thefts through its electronic discussion list and maintains a stolen books database with a report form at http://www.abaa.org/books/abaa/databases/stolen_search.html
   * DeRicci Project: dericci@aol.com (for pre-1600 manuscripts only)   * DeRicci Project: dericci@aol.com (for pre-1600 manuscripts only)
-  * International League of Antiquarian Booksellers (ILAB). Send theft reports and requests for database searches to: security@ilab-lila.com. For books stolen after 15 June 2010 http://www.stolen-book.org/+  * International League of Antiquarian Booksellers (ILAB). Send theft reports and requests for database searches to: ilaborginfo@gmail.com. For books stolen after 15 June 2010 http://www.stolen-book.org/
   * International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: http://www.missingmaps.info. This is open to the public, but use of the report form does require site registration.   * International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: http://www.missingmaps.info. This is open to the public, but use of the report form does require site registration.
   * Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http://www.interpol.int/Public/WorkOfArt/Default.asp   * Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http://www.interpol.int/Public/WorkOfArt/Default.asp
Line 77: Line 129:
   * [[http://www.rbms.info/committees/security/theft_reports/|RBMS - Theft reports]]    * [[http://www.rbms.info/committees/security/theft_reports/|RBMS - Theft reports]] 
   * Stolen in France, found in Hungary http://dailynewshungary.com/hungary-returns-antique-maps-stolen-from-france/   * Stolen in France, found in Hungary http://dailynewshungary.com/hungary-returns-antique-maps-stolen-from-france/
-===== THE COPENHAGEN PRINCIPLES ===== +  * The police in Bavaria ask for identification of editions and of owners of the pages and plates reproduced herefound in the possession of a suspected book thief (summer 2016)\\ 
-  +     - {{ :collaboration:asservate_01_kuperstiche.pdf|Engravings}}\\ 
-Background and present overview +     {{ :collaboration:asservate_02_karten.pdf|Maps}}\\   
- +     - {{ :collaboration:asservate_03_buecher_briefe.pdf|Books and Letters}}\\
-The last decade has seen the rapid development of a number of factors affecting the security of significant library collections. +
-  * The market value of large parts of library collections now equals the prices of the most expensive antiques and works of art; +
-  * The interest of the free market in items held in libraries is constantly increasing; +
-  * Valuable parts of library collections have been subject to grave instances of theft of a trans-national character across Europe. +
-Recognizing these developmentswe have decided to set up closer co-operation among libraries with the purpose of preventing or resolving such incidents. +
-                                 +
-From the evidence it is clear that individual libraries have dealt with these matters in a rather isolated way in the past, and that co-operation between libraries has been only sporadic. On the other hand all libraries tend to involve the police authorities at the point of theft. Bodies such as Interpol and Europol also have considerable expertise in counteracting thefts of cultural assets. But Europe has wide range of different legal systems, and this can make theft investigation more intricate and therefore rather slow. +
-     +
-The international criminal world is not dependent on legal and administrative restrictions, but can exploit to the full the openness of the modern communication and information society. This creates the basis of a ‘crime internet’+
- +
-Interpol and national and international police authorities are, on the other hand, completely dependent on the evidence produced by the victim of the theft. Insufficient evidence weakens the case both for the police and the law. Libraries entrusted with collections of cultural value must give a high priority to their security policies and systems. They need to develop better communication and co-operation on security issues with police organisations such as Interpol and Europol and with national legal systems. +
-   +
-In the business world, if a company loses valuables through theft, it will normally have made arrangements in advance for compensation, either through insurance or replacement. For cultural institutions the situation is almost exactly the opposite. Libraries cannot insure their collections, because what they might lose is almost impossible to replace. One cannot insure against such things in a traditional way.+
  
-Libraries have to be open to the general public and make their collections available to the publicLibrarians generally have an open mind and show a co-operative approach to users, both scholars and the general publicThis very openness and co-operation can be exploited by criminals. +  * Stolen from a West London warehouse on the night of 29th January 2017 while in transit for the California Book FairTwo lists list of titles: {{ :collaboration:aba_list_of_stolen_books_january_2017.pdf}} and {{ :collaboration:meda_riquier_california_list.pdf}}If anyone offers you any of these titlesplease contact ABA Secretary Camilla Szymanowska on +44 20 7421 4681 secretary@aba.org.uk or ABA Security Chair Brian Lake on +44 20 7631 4220 brian@jarndyce.co.uk  immediatelyFor more details of individual copies, please contact the dealers directly
- +
-This is the kind of reality libraries have to faceThey are no longer safe retreats. They are for better or worse an active part of societywith all that this entails. +
- +
-Those of us who are entrusted with the task of preserving cultural assets must realise this fact and face up to it in order to forestall acts of criminality directed at our collectionsWithout surrendering our open approach, we should try to overcome the naivety with which it has from time to time been associated and act in a more professional way. +
- +
-The evidence suggests that there are a number of weaknesses in the way we handle criminal attacks against our collections and in the organisation of our security arrangementsThese must be addressed and eliminated if our libraries are to be in a stronger position against international criminalityOpenness on the part of libraries is a crucial factor in this development. Institutional silence can only be to the benefit of the thief. +
-An Organisational Network for International Co-operation on Security Problems in National and Research Libraries+
  
 +===== THE COPENHAGEN PRINCIPLES =====
 + 
 +A conference on Library security management was held under the auspices of LIBER in the Royal Library, Copenhagen, in May 2002, which formulated and endorsed The Copenhagen Principles (14 May 2002 / see below). 
 ====== Principles ====== ====== Principles ======
  
Line 152: Line 187:
  
 Conference Chairmen Conference Chairmen
 +
 +{{:collaboration:368_drz.pdf|}}
 +
 +
 +----
 +
 +
 +===== TOOLS PROPOSED BY THE SECURITY WORKING GROUP =====
 +
 +{{ :collaboration:quick_audit_tool_booklet_-_cover.png?95|}}
 +
 +The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/archive to see how their collection security policies and procedures compare against a baseline set by CERL institutions, both big and small, represented in the Security Working Group. Furthermore it provides guidelines and useful tips to take the necessary steps.\\
 +
 +Two formats are available: to be printed as a {{ :collaboration:quick_audit_tool_booklet_-_print_version.pdf |booklet}} and to be consulted on {{ :collaboration:quick_audit_tool_booklet_-_screen_version.pdf |screen}}.\\
 +
 +Under development: two supporting tools related to the QAT (see pp. 6-7 of the QAT). For this we will need the help of all the Network. We would like you to send us a maximum of examples (forms, check-lists, procedures, etc.) and experiences related to important points of attention that security policies require to ensure the fight against theft and vandalism (more details in the booklet). Please send to [[jacqueline.lambert@kbr.be]].
 collaboration/security.txt · Last modified: 2024/05/06 11:21 by lefferts

 

 

Recent changes RSS feed Valid XHTML 1.0 Driven by DokuWiki