Security Survey, results

Slides:



Advertisements
Similar presentations
Receiving Course Reserves Receiving Course Reserve Materials Services Provided & Not Provided Recalling & Searching Ordering.
Advertisements

© Clearwater Compliance LLC | All Rights Reserved Copyright Notice 1 Copyright Notice. All materials contained within this document are protected by United.
Loans Management at the Natural History Museum Dave Smith UK EMu Users Group Meeting th April 2007.
Chapter 1.5 Fire Regulations. Components of a fire Fuel: Something that burns Air: Oxygen to keep the fire going Heat: Gas, electricity, etc.
Library & Information Services Using the Library Catalogue Part 1: Searching the Catalogue Rachael Hartiss 2008.
Informed Consent and HIPAA Tim Noe Coordinating Center.
{ Understanding Disability Services By Holly Zuckerman – Access Coordinator Disability Resource Center.
Manpower : Employing the right people for your project Liz Bates Chief Executive Officer Heritage Trust of Lincolnshire.
By Drudeisha Madhub Data Protection Commissioner Date:
When are You Insured? Georgia Department of Administrative Services (DOAS) Risk Management provides insurance for all state agencies through a self-insured.
S ECRETARIAT Division Secretariat Advisory Preparing Meeting Agendas & Minutes Presented by Myron Iseminger.
Work-based experience
Occupational health and safety
Who’s the Boss? Faculty Advisor or Principal Investigator Supervision versus Student Investigator or Study Coordinator Responsibilities Gwenn Snow, MS,
Electronic Records Management: What Management Needs to Know May 2009.
Recruiting the Mentors Activities and Timescales Kulvinder Birring Brunel university.
BFC Information and Communication Tools. Objective to facilitate communication and information flows, the sharing of technical and administrative resources.
Unit 11 Meetings. Overview  Meetings In Business  Types of Meeting  Attending Meetings  Notice and Agenda  Chairman’s Agenda  Minutes of Meeting.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
What are Parent’s Rights in Georgia Special Education? Parents and students over age eighteen have the right … To Participate You have the right to refer.
MODU Safety Committee Objective The objective of this Procedure is to establish the terms of reference for the Safety Committee on board the MODU.
Academic Promotions Applicant Information Session Relative to opportunity considerations in promotions Dr Maree Murray, Equity & Diversity Strategy.
College of Agriculture and Life Sciences. Overview Orientation consists of a university segment, a college segment and a departmental segment. In this,
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Monitoring and Evaluation of Electronic Resource Use Unit 1.0: Introduction.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
CONFIDENTIALITY Student Information Guidelines. Family Rights and Privacy Act (FERPA) Legislation to protect the privacy of personal and educational records.
Kamala H. Shugar Assistant Attorney in Charge Oregon Department of Justice Child Advocacy Section.
Strategy for Human Resource Management Lecture 15
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
DON’T PANIC Mesa County Public Library District Evacuation Procedures These are general instructions and procedures. Every situation is different. Use.
Language Studies and Academics Report Writing Types of Reports CM 2300.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
What is the Prevent Duty? Part of the 2015 Counter Terrorism and Security Act. A duty to protect ‘people from being drawn into terrorism’ by “extremists.”
Safety Audits An essential tool for active safety management April 2015 Dr Emer Bell Integrated Risk Solutions.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Prevent Information and Overview Updated March 2016 by the Central Secretariat.
EMPOWERMENT THROUGH EDUCATION Business Retention and Expansion Task Force Workshop Joe Lucente Assistant Professor and Extension Educator OSU Extension.
Updated September 2012 JCQ Information for Invigilators 2012/ 2013 MID CHESHIRE COLLEGE.
REDUCING RISKS THROUGH EFFECTIVE SAFETY COMMITTEES OAMR Conference September 23, 2016 Sharlene P. Stephens Risk Management Specialist City of Ashland.
Effective Meetings Planning is the Key:
CONFERENCES & TRAINING EVENTS General Information about
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Marens Engelhard & Karel Velle
Building Coordinators Luncheon
Demystify “Skill vs Chance” Live Webinar
Complying with Maryland’s Open Meetings Act
Electronic Devices Policy
chambers of commerce do business
Reporting a road crash Why reporting matters UNHCR Safe Road Use campaign Version 3 September 2017.
Who are we?. PLANNING FOR THE UNEXPECTED:   A Workshop in Business Continuity Planning for Not-For-Profits.
Shape your local food growing strategy
Principles of Effective Documentation
GOVERNMENT GENERAL SERVICES UNION
GENERAL DATA PROTECTION REGULATION (GDPR)
CERL Collection Security Summer School 6 September 2017
Special Collections Introduction
CERL Collection Security Summer School 7 September 2017
Critical Element: Faculty Commitment
Employee Privacy and Privacy of Employee Information
OHS–Occupational Health & Safety
Digital Stewardship Curriculum
Student Data & Privacy.
H2.9b Maintain Information
Leuven Policy implementation.
RDARI Questionnaire Workshop
Handling information 14 Standard.
Special Education District Validation Review (DVR) Team Member Training and School Preparation Information
CHILDREN’S IMAGES.
Trade Technology Advisory Committee Procedures
Presentation transcript:

Security Survey, results CERL Collection Security Summer School 6 September 2017

In general 14 reactions received Did it make you think? To discuss later: mostly the survey asks what an institution is doing, but sometimes it is suggested that a aprticular approach is desirable or the only right solution (i.e. response time 2-5 minutes). It would be great to get a sense of what is essential, and what is variable depending on the particular situation.

Participants (Q2-4)

Participants

Questions 6-8

Security policy (Q 9-12, 19)

Security Policy The survey does mention two written procedures (missing items, theft), and the rest of the survey raises points that should be considered when putting together a collection security policy. What set of parameters should at a minimum be included in the policy? What other types of measures could be used to ensure the collection security policy is adhered to? Should the institutions’ legal department review the policy (e.g. with regard to rules for readers and staff) The security officer should have a network, including local police, fire brigade officers, national departments/institutions with tasks in the field of the security of cultural heritage objects, prior to any event taking place. The policy should contain contact information as such.

Missing items (Q 13-14)

After the theft (Q 15-17)

Catalogue (Q 21, 22, 29, 41)

Privacy aspects (Q 23, 47, 75)

Specific copy information (Q 24-26)

Stacks (Q 31)

Insurance (Q 35)

Readers (Q 36-38)

Reading Room (Q 39-40, 42-46)

Reading Room

Reading Room

Reading Room What topics should be covered in the Reading Room rules and regulations? How do you make them known? Who enforces them? General topics not covered in the survey: how do you position staff in the Reading Room, where to place cameras (if any), use of laptops and cameras What is the best place to search readers’ belongings? When leaving the reading room, leaving the building? Visual inspection? Electronic? What happens when the electronic gates go off? Is there any difference between libraries and archives in this? Are other methods of inspection available? What tools are available for an assessment of collection vulnerabilities?

Compartimentation (Q 48-55)

Compartimentation

Building (Q 58-71)

Building

Building

Building

Building Electronic access systems offer the opportunity to track which member of staff has been where. Do you keep these records and if so, do you keep them permanently?

Staff (Q 72-74, 76-82)

Staff

Staff

Staff What do staff with collection security tasks do to keep themselves informed? Do they have a network of coleagues in other heritage institutions? And how do they inform their colleagues and superiors?

Exhibitions (Q 83-96)

Exhibitions

Exhibitions

Exhibitions

Exhibitions Are there any special legal issues involved in loans to exhibitions abroad? If so, where do you source your best advice?

Transport (Q 97-99)

Transport When drawing up procedures for transport, what topics need to be considered?