Protecting Library Staff, Users, Collections, and Facilities: A How-to-do-it ManualWe live in an age when every library in every community must address security issues ranging from theft to the safety of staff and patrons. Pamela Cravey's Protecting Library Staff, Users, Collections, And Facilities is a pragmatic, step-by- step instructional guide for insuring staff and patron safety; securing general and special collections, electronic files and systems; and coping with the legal issues raised by various security measures. Libraries are deftly guided through the complexities of modern security, while being given practical recommendations for planning and executing a sound and responsible library security package. The key is to consider security a process, rather than an event. Protecting Library Staff, Users, Collections, And Facilities is a superbly presented "how-to" manual that is very highly recommended reading for librarians and library board members for urban, suburban, rural, public, academic, corporate, governmental, and private library systems. |
Contents
Security of the General Collection | 27 |
Security of Users and Employees | 51 |
Security of Electronic Files and Systems | 79 |
Copyright | |
4 other sections not shown
Common terms and phrases
Academic Libraries administrative alarm American Library Association appropriate Archival Security bomb threats brary building security Campus Crime Prevention checklist closed-circuit television collection security computer security concerns contracted security cost curity designed developed document emergency Emergency telephones environment environmental scan example exit files guidelines Handbook identified important institution Intrusion-detection systems inventory Layne librarians library employees library materials library security library staff library users library's loss and mutilation Manual ment monitors mutilation rates overall security Patron Behavior personnel policies and procedures policy statements present problem protection proximity cards public libraries records require response rest rooms risk analysis rity safety and security secu security audit security issues security plan security policy security program situations solutions specific staff and users staff member survey telephone theft and mutilation tion topics Trinity University types users and staff vendors vulnerabilities Western Kentucky University