Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
collaboration:security [2018/11/07 11:46] – hart | collaboration:security [2018/11/07 15:42] – hart | ||
---|---|---|---|
Line 4: | Line 4: | ||
The CERL Security Working group exists to help member libraries enhance the security of their culturally important heritage collections. | The CERL Security Working group exists to help member libraries enhance the security of their culturally important heritage collections. | ||
+ | |||
+ | |||
+ | ---- | ||
Line 14: | Line 17: | ||
\\ | \\ | ||
Hosts of each summer school address the issues above, but will tailor the programme to the situation in their own region, and will select the most suitable speakers to address the topics on the programme. The hope is that the summer schools will create a network of security officers and curators who work together on best practices, who alert each other to potential thieves or stolen books on the market, and who generally support each other in security matters. | Hosts of each summer school address the issues above, but will tailor the programme to the situation in their own region, and will select the most suitable speakers to address the topics on the programme. The hope is that the summer schools will create a network of security officers and curators who work together on best practices, who alert each other to potential thieves or stolen books on the market, and who generally support each other in security matters. | ||
- | |||
* 2017 [[https:// | * 2017 [[https:// | ||
* 2018 [[https:// | * 2018 [[https:// | ||
* 2019 Tartu, University of Tartu Library | * 2019 Tartu, University of Tartu Library | ||
+ | |||
+ | |||
+ | ---- | ||
===== Remit ====== | ===== Remit ====== | ||
Line 33: | Line 38: | ||
Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all. | Membership of the Working Group is restricted to CERL members, on nomination by the member library, but the Security Working Group conferences and workshops are normally open to all. | ||
+ | |||
+ | |||
+ | ---- | ||
===== Members of the Working Group ===== | ===== Members of the Working Group ===== | ||
Line 48: | Line 56: | ||
[[wim.tromp@kb.nl|Wim Tromp]], Koninklijke Bibliotheek, | [[wim.tromp@kb.nl|Wim Tromp]], Koninklijke Bibliotheek, | ||
+ | |||
+ | ---- | ||
Line 55: | Line 65: | ||
With the support of the LIBER Executive Board, the Royal Library, Copenhagen, set up the LIBER Security Network in December 2002. From January 2013 the Security Network is hosted by CERL. | With the support of the LIBER Executive Board, the Royal Library, Copenhagen, set up the LIBER Security Network in December 2002. From January 2013 the Security Network is hosted by CERL. | ||
+ | ---- | ||
+ | |||
+ | ===== Tools Proposed by the Security Working Group ===== | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/ | ||
+ | |||
+ | Two formats are available: to be printed as a {{ : | ||
+ | |||
+ | ==== Under Development ==== | ||
+ | Two supporting tools related to the QAT (see pp. 6-7 of the QAT) are under development. For this we will need the help of all the Network. We would like you to send us a maximum of examples (forms, check-lists, | ||
+ | |||
+ | ---- | ||
===== Conferences ===== | ===== Conferences ===== | ||
Line 66: | Line 90: | ||
https:// | https:// | ||
https:// | https:// | ||
- | |||
**Biblioteca Apostolica Vaticana, Rome**\\ | **Biblioteca Apostolica Vaticana, Rome**\\ | ||
Line 85: | Line 108: | ||
Finally, all articles from this special issue of LIBER Quarterly are available [[http:// | Finally, all articles from this special issue of LIBER Quarterly are available [[http:// | ||
+ | |||
+ | ---- | ||
===== Relevant websites ===== | ===== Relevant websites ===== | ||
+ | |||
==== General ==== | ==== General ==== | ||
Line 102: | Line 128: | ||
* [[http:// | * [[http:// | ||
* KB Copenhagen, features of the Royal Collection http:// | * KB Copenhagen, features of the Royal Collection http:// | ||
- | |||
- | |||
- | |||
==== Security guidelines and recommendations ==== | ==== Security guidelines and recommendations ==== | ||
Line 115: | Line 138: | ||
* Guidelines for reviewing security measures in museums, [[http:// | * Guidelines for reviewing security measures in museums, [[http:// | ||
* Book review by Raphaele Mouren, of //Guide to Security Considerations and Practices for Rare Book, Manuscript, and Special Collection Libraries//, | * Book review by Raphaele Mouren, of //Guide to Security Considerations and Practices for Rare Book, Manuscript, and Special Collection Libraries//, | ||
+ | |||
==== Making missing or stolen books known ==== | ==== Making missing or stolen books known ==== | ||
Line 125: | Line 149: | ||
* International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: | * International Antiquarian Mapsellers Association “Missing and Stolen Map Database”: | ||
* Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http:// | * Interpol. Investigates international thefts of cultural property. Submit reports via Interpol liaison at state or provincial level or via F.B.I. http:// | ||
+ | |||
==== News about thefts ==== | ==== News about thefts ==== | ||
* Map thefts http:// | * Map thefts http:// | ||
Line 133: | Line 158: | ||
- {{ : | - {{ : | ||
- {{ : | - {{ : | ||
- | |||
* Stolen from a West London warehouse on the night of 29th January 2017 while in transit for the California Book Fair. Two lists list of titles: {{ : | * Stolen from a West London warehouse on the night of 29th January 2017 while in transit for the California Book Fair. Two lists list of titles: {{ : | ||
- | ===== THE COPENHAGEN PRINCIPLES | + | |
+ | ---- | ||
+ | |||
+ | ===== The Copenhagen Principles | ||
A conference on Library security management was held under the auspices of LIBER in the Royal Library, Copenhagen, in May 2002, which formulated and endorsed The Copenhagen Principles (14 May 2002 / see below). | A conference on Library security management was held under the auspices of LIBER in the Royal Library, Copenhagen, in May 2002, which formulated and endorsed The Copenhagen Principles (14 May 2002 / see below). | ||
- | ====== Principles | + | |
+ | ==== Principles ==== | ||
=== Principle 1 === | === Principle 1 === | ||
Line 176: | Line 204: | ||
The representatives encourage LIBER to establish co-operation on security issues with the book trade and with other memory institutions. | The representatives encourage LIBER to establish co-operation on security issues with the book trade and with other memory institutions. | ||
- | -------------------------------- | + | |
Unanimously endorsed by the delegates at the LIBER Conference on Library Security Management, Copenhagen, 12-14 May 2002. | Unanimously endorsed by the delegates at the LIBER Conference on Library Security Management, Copenhagen, 12-14 May 2002. | ||
Copenhagen, 14 May 2002 | Copenhagen, 14 May 2002 | ||
Line 193: | Line 221: | ||
---- | ---- | ||
- | |||
- | ===== TOOLS PROPOSED BY THE SECURITY WORKING GROUP ===== | ||
- | |||
- | {{ : | ||
- | |||
- | The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/ | ||
- | |||
- | Two formats are available: to be printed as a {{ : | ||
- | |||
- | Under development: |
collaboration/security.txt · Last modified: 2024/05/06 11:21 by lefferts