Security Collection Protection at the Austin History Center.

Slides:



Advertisements
Similar presentations
Facilities Management and Design Chapter 4 Safety and Security systems.
Advertisements

Preservation of Historic Records. Threats to Records Water Water Heat Heat Light Light Dirt and Pollutants Dirt and Pollutants Rodents and pests Rodents.
Test Monitor Training Administering Minnesota Assessments.
Before After Creative Solutions for Collections Care.
Competencies for Security and the Lodging Industry
Test Monitor Training Administering Minnesota Assessments.
COMPREHENSIVE SCHOOL SAFETY PLAN Crisis and Disaster: Overview California public schools are required to comply with California Education Code, Section.
Jade Guan, Archivist & Research Associate Lesser Slave Lake Indian Regional Council Treaty Aboriginal Rights Research Program Archives Initiatives: Best.
Preserving Columbia’s Library Materials Part 4. What this presentation covers Part 1: Why materials deteriorate. Part 2: Shelving materials carefully.
1 Introduction to Security Chapter 15 Institutional Security.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
PRESERVATION BEST PRACTICES SESSION 3: COLLECTIONS CARE: HANDLING, ACCESS, STORAGE, AND EXHIBITION The California Preservation Program Presents Laura Hortz.
From Analog to Digital: Changes in Preservation Gregor Trinkaus-Randall Digital Commonwealth Conference Worcester, MA March 25, 2010.
Welcome to the Perris Valley Museum Historical Archives.
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Chapter 5 Enhancing Security Through Physical Controls
Distributed Custodial Archival Preservation Environments Project The Tufts Perspective Marriott Wardman Park Washington, D.C. Veronica Martzahl Records.
Preserving your family papers Barbara Austen Florence S. Marcy Crofut Archivist Connecticut Historical Society.
Setting up a Conservation Program by Fe Angela M. Verzosa.
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment.
EMu and Archives NA EMu Users Conference – Oct Slide 1 EMu and Archives Experiences from the Canada Science and Technology Museum Corporation.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Christa Cliver MEDT 7477 Spring 2014 LMC Orientation WELCOME TO THE RICHARD B. RUSSELL SPECIAL COLLECTIONS LIBRARY.
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
DISA PREPAR JOHN MOHLER UNIVERSITY OF MARYLAND EDNESS STER.
PRESERVATION BEST PRACTICES SESSION 1: FUNDAMENTALS AND FACILITIES.
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution 3.0 License.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Evacuation Units Training [school’s name here]. Evacuation Policy When a threat comes in, it is assessed by our Threat Assessment Team. The Team then.
Conservation Planning Friday 9 March Introductions Find out about the person next to you: their name reasons for attending the workshop place of.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
Computer Forensics Principles and Practices
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Document Conservation and Preservation Some Basic Issues And Methods.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
Nebraska’s IMLS Connecting to Collections Project Statewide Preservation Preliminary Survey Findings Tom Clareson and Liz Bishoff April 2011.
Elements of a Data Management Plan: Roles and Responsibilities Ruth Duerr National Snow and Ice Data Center Version 1.0 Review Date.
Digitization An Introduction to Digitization Misheck Nyaluso University of Malawi College of Medicine.
State and Local Records Management DISASTER PLANNING Presented By State and Local Records Management Division Texas State Library and Archives Commission.
System Implementation Dr. Dania Bilal IS 582 Spring 2009.
PRESERVATION 101 Presented By: Darrell Garwood Preservation Officer State Archives and Library Division Kansas Historical Society
Chapter 6 Enhancing Security Through Procedural Controls.
Test Chair 101: Guidelines and Tips for New Test Chairpersons Wanda L. Cunningham 1.
Thanks for the Memories: How to handle your precious old documents and photos.
Conservation Planning Friday 9 March Introductions Find out about the person next to you: their name reasons for attending the workshop place of.
1 Spring 2014 EOC Test Security April 3, Assessment Administration 2.
Preservation planning: the big picture and the small picture By Heidi Rees, M.A., M.L.I.S. Acting Head, Government Collections and Library Systems, Manitoba.
Frontline Enterprise Security
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Computer Maintenance 6 th Grade. BCSI- 2: Students will identify and demonstrate computer maintenance and safety. a. Explain basic file management b.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
13 Implementing a Security Plan Implementing a Security Plan
Tallinn University of Technology LIBRARY Overview of library services Katri Mägi Tallinn Tech Library Information Services Department TUT Orientation Days.
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Law Enforcement and Coroners Working Together In Crime Scene Investigations.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Caring For Historic Government Records
Survey and Assessment Nancy E Kraft
ACCESS & USE.
Tours for groups of six or more during the week can be arranged
Security Management Measures
Chapter 3: IRS and FTC Data Security Rules
COMPUTER SAFETY AND CARE
Archives 101: Basic Procedures for Working with Archival Materials
Presentation transcript:

Security Collection Protection at the Austin History Center

Introduction Security issues from the Archivist’s viewpoint Specifics about expectations for securing the building when the building is closed, but meetings are taking place Discussion of threats to archives and tour to examine trouble spots

Overview Archives are unique and valuable By examining the common threats to archives, we will be better able to protect the collection and preserve it for future use Loc ks Safety Environment Preservation Computers Solutions Archives Threats

Collection Protection Policies & procedures Physical examination and observation Keys, locks and doors, and Training to preserve the unbroken chain of custody and the physical well-being of the materials in our care

Common Threats Pests--no food except in the staff room/ pest control/ remove trash Light & dust--gray acid-free boxes and file folders/ window treatments Water--keep things up on pallets & avoid placing items on the floor/ watch the roof and vaults Environment--stable temperatures and reasonable fluctuations in humidity Biggest threat of all -- People

People AHC & AHCA Staff, APL Staff, Meeting Room Users, Reading Room Users, Vendors Keys, Locks and Doors Policies and Procedures

Revisiting Policies and Procedures Volunteer supervision Meeting room booking Opening procedures Closing procedures Key distribution & control Security presence Security systems

Issues Not Covered Exterior security Lighting, landscaping, perimeter detection Reading Room Training, policies, supervision, registration, lockers, collection retrieval and control, staffing, What to do when theft is discovered Notifications, actions to take

Summary Effective Internal Security Programs (1) recognize that there is potential for a problem, (2) demonstrate a willingness to tackle the problem, and (3) practice consistent adherence to procedures. Your thoughts and suggestions….

Where to Get More Information Other training sessions -- Amigos Collection Security, Disaster Preparedness Brown, Karen E. “Collections Security: Planning and Prevention for Libraries and Archives,” in Preservation of Library & Archival Materials: A Manual, 3rd edition, Sherelyn Ogden, Ed. Andover, MA: Northeast Document Conservation Center, Trinkaus-Randall, Gregor. Protecting Your Collections: A Manual of Archival Security. Chicago: Society of American Archivists, 1995.