Protecting Library Staff, Users, Collections and Facilities: A How-to-do-it Manual

The Bottom Line

ISSN: 0888-045X

Article publication date: 1 March 2002

177

Keywords

Citation

Chattoo, C.D. (2002), "Protecting Library Staff, Users, Collections and Facilities: A How-to-do-it Manual", The Bottom Line, Vol. 15 No. 1. https://doi.org/10.1108/bl.2002.17015aae.001

Publisher

:

Emerald Group Publishing Limited

Copyright © 2002, MCB UP Limited


Protecting Library Staff, Users, Collections and Facilities: A How-to-do-it Manual

Edited by Kay Ann Cassell and Marina I. Mercado

Protecting Library Staff, Users, Collections and Facilities: A How-to-do-it Manual

Cravey, P.J.2001Neal-SchumanNew York, NYKeywords: Building security, Data security, Computer security

Library security has become an essential component of the overall services of libraries. Pamela J. Cravey, whose career in public service and library management spanned 30 years in four large academic libraries, has documented her many years of experience in developing and implementing an evolving security program. As she notes, the book is written from her "perspective as a librarian and front-line library security officer".

The text is well organized, with each of the seven chapters covering a specific area of library security, and includes a summary and related information through a list of references. Chapter one gives an overview of library security as it is today, noting with practical examples, aspects of performing a security audit and steps needed to prepare a final report. Subsequent chapters cover areas such as security of the general collection; users and employees; electronic files and systems; special collections; and special events. The final chapter – "Library security: legal, personnel and vendor considerations" – presents the author's personal insights into this area of library security through coverage of legal issues relating to formulating an overall security plan, what to do when the plan works, ownership, and probable cause topics.

Throughout the text the author gives examples and relates encounters of her experiences with library security. A well-written text, it covers library security as a process rather than as a specific event. Numerous samples of planning tools such as an identification log, a risk management plan, various policy statements, and reports make the text particularly useful for security management in all types and sizes of libraries.

With bold section headings and bulleted lists, the text allows the reader to gain a good grasp of the wide range of issues involved in planning library security. In general, the text succeeds very well in doing, at least, what it sets out to do, preparing librarians "to effectively design and implement a security program for any library". It is, in itself, a short course on all aspects of library security and that makes it a valuable resource for librarians involved with security management. The text is probably the most comprehensive, detailed and up to date available and is recommended as a valuable professional tool for all librarians.

Calmer D. ChattooAssistant Librarian, Cataloger, Charles B. Sears Law Library, University at Buffalo, Buffalo, New York, USA

Related articles