Home | Resources | Services | Hosting | Publications | Collaboration | Joining CERL | About CERL |

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
collaboration:security [2014/11/05 12:30] – [Members of the Working Group] leffertscollaboration:security [2015/03/26 09:31] – [Security Working Group] versprille
Line 1: Line 1:
-====== Security Network ====== +====== Security Working Group ======
- +
-The CERL security working group exists to help member libraries enhance the security of their culturally important heritage collections    +
  
 +The CERL Security Working group exists to help member libraries enhance the security of their culturally important heritage collections. 
  
  
 +The title of the first conference of the CERL Security Network is ** Library Security: Practices and Strategies** and will take place on 8 May 2015, at the Biblioteca Apostolica Vaticana, Rome.
 +The programme is divided into four sessions covering Accountability and Governance, Staff interaction with collections, Digital tools for prevention and detection, and The process of recovery. How do we interact with the investigating and legal authority.
 +The full programme is available here:
 +{{::security_network_conference_-_rome_may_2015.pdf|here}}.\\
 ===== Remit ====== ===== Remit ======
  
-  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Library Security Network and through other appropriate channels+  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Security Network and through other appropriate channels
   * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection   * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection
   * To identify emerging areas of vulnerability or concern   * To identify emerging areas of vulnerability or concern
Line 15: Line 17:
   * To organise events for information exchange, as well as skills development   * To organise events for information exchange, as well as skills development
   * To serve as an interface with security networks in related sectors   * To serve as an interface with security networks in related sectors
-  *  + 
-The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, wilful destruction, or by the adulteration of collection. Other physical threats to collections, such as fire, earthquakes, terrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.+The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, willful destruction, or by the adulteration of collection. Other physical threats to collections, such as fire, earthquakes, terrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.
  
 Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all. Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all.
Line 25: Line 27:
 Denis Bruckmann, Bibliothèque nationale de France\\ Denis Bruckmann, Bibliothèque nationale de France\\
 Per Cullhed, Uppsala University Library, Uppsala\\ Per Cullhed, Uppsala University Library, Uppsala\\
 +Claudia Fabian, Bayerische Staatsbibliothek, München\\
 Jacqueline Lambert, Royal Library, Brussels\\ Jacqueline Lambert, Royal Library, Brussels\\
 Claus Friis, Royal Library, Copenhagen\\ Claus Friis, Royal Library, Copenhagen\\
Line 32: Line 35:
 Theo Vermeulen, Royal Library, The Hague\\ Theo Vermeulen, Royal Library, The Hague\\
  
-===== Remit ===== 
  
-  * To coordinate information about on-going security issues of relevance for collections within the scope of CERL, through the CERL Library Security Network and through other appropriate channels\\ + 
-  * To monitor and disseminate information on emerging methods and technologies in library crime prevention and detection\\ +===== The confidential Security Network ===== 
-  * To identify emerging areas of vulnerability or concern\\ +Institutions may nominate one member of staff (typically the Head of Security or equivalent) to be included in the Security Network mailing list. This mailing list is a secure environment for the exchange of confidential information regarding incidents of criminal activity witnessed in subscribing institutions. 
-  * To coordinate access to important documents on legislation, policy and practice relating to collection security\\ + 
-  * To provide guidance on building robust collection security policy and practice relating to threats to collections\\ +With the support of the LIBER Executive Boardthe Royal LibraryCopenhagenset up the LIBER Security Network in December 2002. From January 2013 the Security Network is hosted by CERL.
-  * To organise events for information exchange, as well as skills development\\ +
-  * To serve as an interface with security networks in related sectors\\ +
-The CERL Working Group on security focuses on threats posed to collections by criminal activity, such as theft, wilful destruction, or by the adulteration of collection.  Other physical threats to collectionssuch as fireearthquakesterrorism or flooding are only within the group’s remit in so far as they have an impact on the collections’ vulnerability to criminal depredation.\\+
  
  
Line 48: Line 47:
 The 5th Collection Security Conference (under the auspices of CERL), will take place at the Vatican Library on 8 May 2015. The 5th Collection Security Conference (under the auspices of CERL), will take place at the Vatican Library on 8 May 2015.
  
-The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http://www.kb.nl/en/expertise/for-libraries/conferences-and-seminars/liber-collection-security-conference|here]]. +The 4th LIBER Collection Security Conference took place on Friday 23 November 2012. The programme and powerpoint presentations are available [[http://www.kb.nl/en/organisation/research-expertise/for-libraries/liber-collection-security-conference|here]].
- +
-Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the following websites:  [[http://www.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html]] and [[http://liber.library.uu.nl/index.php/lq/issue/view/461]]+
  
 +Papers and presentations held at the 3rd LIBER Collection Security Conference (2008) are available on the  [[http://www.webarchive.org.uk/wayback/archive/20130123070908/http:/vincent.bl.uk/aboutus/stratpolprog/ccare/events/liberconference/index.html|BL website]]. 
 +Perhaps more interestingly here is a link to a //Report on International Roundtable Meeting on Collection Security held at the British Library// written by Andy Stephens and Helen Shenton,  published in [[http://www.bl.uk/aboutus/stratpolprog/collectioncare/publications/articles/2008/liberintround.pdf|Liber Quarterly Volume 18 Issue 2 2008]].
 +Finally, all articles from this special issue of LIBER Quarterly are available [[http://liber.library.uu.nl/index.php/lq/issue/view/461|here]].
  
  
Line 62: Line 62:
   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.   * The National Museum Security Group (NMSG) is the principal UK communications channel for the sharing of security information by cultural heritage organisations.
 ==== Recording distinguishing features of a collection ===== ==== Recording distinguishing features of a collection =====
-  * [[http://www.kb.nl/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features+  * [[http://www.kb.nl/organisatie/organisatie-en-beleid/collectieveiligheid|Collection security at the Koninklijke Bibliotheek, the National Library of the Netherlands]], including an overview of distinguishing features
   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm   * KB Copenhagen, features of the Royal Collection http://wayback-01.kb.dk/wayback/20101103150800/http:/www2.kb.dk/kb/missingbooks/marks/index.htm
  
Line 92: Line 92:
 ===== THE COPENHAGEN PRINCIPLES ===== ===== THE COPENHAGEN PRINCIPLES =====
    
-Background and present overview +A conference on Library security management was held under the auspices of LIBER in the Royal LibraryCopenhagen, in May 2002, which formulated and endorsed The Copenhagen Principles (14 May 2002 / see below)
- +
-The last decade has seen the rapid development of a number of factors affecting the security of significant library collections. +
-  * The market value of large parts of library collections now equals the prices of the most expensive antiques and works of art; +
-  * The interest of the free market in items held in libraries is constantly increasing; +
-  * Valuable parts of library collections have been subject to grave instances of theft of a trans-national character across Europe. +
-Recognizing these developments, we have decided to set up closer co-operation among libraries with the purpose of preventing or resolving such incidents. +
-                                 +
-From the evidence it is clear that individual libraries have dealt with these matters in a rather isolated way in the pastand that co-operation between libraries has been only sporadic. On the other hand all libraries tend to involve the police authorities at the point of theft. Bodies such as Interpol and Europol also have considerable expertise in counteracting thefts of cultural assets. But Europe has a wide range of different legal systems, and this can make theft investigation more intricate and therefore rather slow. +
-     +
-The international criminal world is not dependent on legal and administrative restrictions, but can exploit to the full the openness of the modern communication and information society. This creates the basis of a ‘crime internet’. +
- +
-Interpol and national and international police authorities are, on the other hand, completely dependent on the evidence produced by the victim of the theft. Insufficient evidence weakens the case both for the police and the law. Libraries entrusted with collections of cultural value must give a high priority to their security policies and systems. They need to develop better communication and co-operation on security issues with police organisations such as Interpol and Europol and with national legal systems. +
-   +
-In the business world, if a company loses valuables through theftit will normally have made arrangements in advance for compensationeither through insurance or replacement. For cultural institutions the situation is almost exactly the opposite. Libraries cannot insure their collections, because what they might lose is almost impossible to replace. One cannot insure against such things in a traditional way. +
- +
-Libraries have to be open to the general public and make their collections available to the public. Librarians generally have an open mind and show a co-operative approach to users, both scholars and the general public. This very openness and co-operation can be exploited by criminals. +
- +
-This is the kind of reality libraries have to face. They are no longer safe retreats. They are for better or worse an active part of society, with all that this entails. +
- +
-Those of us who are entrusted with the task of preserving cultural assets must realise this fact and face up to it in order to forestall acts of criminality directed at our collections. Without surrendering our open approach, we should try to overcome the naivety with which it has from time to time been associated and act in a more professional way. +
- +
-The evidence suggests that there are a number of weaknesses in the way we handle criminal attacks against our collections and in the organisation of our security arrangementsThese must be addressed and eliminated if our libraries are to be in a stronger position against international criminality. Openness on the part of libraries is a crucial factor in this development. Institutional silence can only be to the benefit of the thief. +
-An Organisational Network for International Co-operation on Security Problems in National and Research Libraries +
 ====== Principles ====== ====== Principles ======
  
Line 165: Line 141:
  
 Conference Chairmen Conference Chairmen
 +
 +
 +
 +
 +{{:collaboration:368_drz.pdf|}}
 collaboration/security.txt · Last modified: 2024/05/06 11:21 by lefferts

 

 

Recent changes RSS feed Valid XHTML 1.0 Driven by DokuWiki