Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision |
collaboration:security [2018/11/07 11:47] – [TOOLS PROPOSED BY THE SECURITY WORKING GROUP] hart | collaboration:security [2018/11/07 11:47] – [TOOLS PROPOSED BY THE SECURITY WORKING GROUP] hart |
---|
The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/archive to see how their collection security policies and procedures compare against a baseline set by CERL institutions, both big and small, represented in the Security Working Group. Furthermore it provides guidelines and useful tips.\\ | The Quick Audit Tool (QAT) (1st edition) aims to raise awareness of a speedy way for any library/archive to see how their collection security policies and procedures compare against a baseline set by CERL institutions, both big and small, represented in the Security Working Group. Furthermore it provides guidelines and useful tips.\\ |
| |
Two formats are available: to be printed as a {{ :collaboration:quick_audit_tool_booklet_-_print_version.pdf |booklet}} and to be consulted on {{ :collaboration:quick_audit_tool_booklet_-_screen_version.pdf |screen}}.\\ | Two formats are available: to be printed as a {{ :collaboration:quick_audit_tool_booklet_-_print_version.pdf |booklet}} or to be consulted on {{ :collaboration:quick_audit_tool_booklet_-_screen_version.pdf |screen}}.\\ |
| |
Under development: two supporting tools related to the QAT (see pp. 6-7 of the QAT). For this we will need the help of all the Network. We would like you to send us a maximum of examples (forms, check-lists, procedures, etc.) and experiences related to important points of attention that security policies require to ensure the fight against theft and vandalism (more details in the booklet). Please send to [[jacqueline.lambert@kbr.be]]. | Under development: two supporting tools related to the QAT (see pp. 6-7 of the QAT). For this we will need the help of all the Network. We would like you to send us a maximum of examples (forms, check-lists, procedures, etc.) and experiences related to important points of attention that security policies require to ensure the fight against theft and vandalism (more details in the booklet). Please send to [[jacqueline.lambert@kbr.be]]. |
collaboration/security.txt · Last modified: 2024/05/06 11:21 by lefferts