SlideShare uma empresa Scribd logo
1 de 46
1
2
• What are archives
• Security & security system
• Disaster & emergency
• Disaster & emergency planning
• Fire & water prevention
• Off-site storage
• Disaster response & Recovery
• Electronic record disaster
• Preservation & conservation of records
• conclusion
3
A collection of historical
documents or records
providing information about a
place, institution, or group of
people.
4
“The state of being free from danger or
threat”.
“Security deals with potential human problems”.
Regarding security issues Archivist consider Two aspects
1. Physical Security
2. Collection Security
5
Physical security refers to the protection of building
sites and equipment from theft, natural disaster,
man made catastrophes and accidental damage.
Physical security deals with the
repository and building
6
According to “Hunter’s” in a small archival program
these six hints must be considered:
 Doors
Locks
windows
Alarms
Keys
Box labels
Doors: Doors should be strong, well made including frame.
7
8
Following locks should be used regarding security:
Dead Bolts
Knob Lock Cam Lock
Lever Handle Lock
9
windows on the lower floor should be locked.
• Fire and burglar alarms should be monitored on a regular
schedule.
• Burglar alarms should be set when the archive’s repository closes
and should include both door and motion alarms.
•In areas that may be unsafe from flooding, rain, tank
water there water alarms are important.
10
 keys should be carefully issued.
 when cleaning or maintenance, staff need to be in the
archives, they must do so during normal hours or in the
presence of a security guard.
Archivist must mention minimum information on the box
label. 11
• Requiring patrons and staff to enter and exit the building by one
door, which is monitored at all times.
• Door buzzers and alarms are recommended. Employing one or more
security guards to patrol the repository after closing.
• Prevent accidental false alarms.
• Taking steps to prevent removal or duplication of keys, ensuring that
keys are returned when employees leave, and changing all locks
periodically.
• It is prudent to examine the building’s after-hours. 12
13
14Intrudent Alarms
15
•“Collection security involves making sure that
records do not disappear either during use or at
other time”.
Archivist must be aware of the alerts regarding staff:
• The same person reporting items missing or being informing to find
missing item.
• A staff member disregards for established rules and procedures.
• A staff member’s lifestyle that does not match salary .
16
17
18
19
20
21
22
23
24
25
• Each patron should complete a Registration Form that asks for
identifying information and information about research interests
and each patron should sign a logbook.
• All patrons should be required to present photographic
identification when they register.
•Supervise researcher’s use of materials.
• Check each archival box before and after it is used by patrons.
26
• Examine your collection on a regular basis.
• It might involve a researcher or even a staff member who
is behaving suspiciously.
• Call him in office & don’t take it personal.
• Don’t shout on the person.
• Notify security or the police.
• If the patron denies there is a problem and leaves the
building one person should follow the patron.
• In all cases, the goal should be to recover the missing
materials
27
• Prepare a written security policy.
• Appoint a security manager to develop and implement your
security plan.
• Perform a security survey to assess your needs.
• Install appropriate security systems.
• Ensure that collection storage is secure and that records are
kept.
• Make an agreement with insurance company.
• Maintain and update your security plan.
28
•“A sudden accident or a natural catastrophe
that causes great damage or loss of life”.
•“ An emergency is a situation or occurrence of
a serious nature, developing suddenly and
unexpectedly and demanding immediate
action. This is generally of short duration like a
power failure or minor flooding cause by broken
pipes.
29
• An emergency plan must consist of;
• A simple one page written guide.
• Whom to call in case of emergency.
• Methods to use in case of fire.
• Names of first aid qualified persons.
• Occasionally inspect emergency equipment
30
Hurricane Andrew's assault on southern Florida and Louisiana, make all
of us acutely aware of our vulnerabilities to disaster.
A broken water main inundated the Chicago Historical Society.
Fire severely damaged the Cabildo in New Orleans.
Loma Prieta earthquake damaged several San Francisco area
museums and libraries.
Smoke from an electrical fire covered collections throughout
Huntington Gallery
1992
1986
1998
1989
1985
31
Minor Disasters: Minor disasters can be handled either by staff.
Moderate Disasters: Usually larger in scope. Usually involves more
than 100 damaged items but fewer than 4000.
• Major/Catastrophic disaster: Damage is typically more severe.
• Probably requires assistance from outside the institution.
Two disaster for which archivist need to plan are:
•Fire
•Water
32
•Prohibit smoking in record storage areas.
•Keep all chemicals closed.
•Ensure that air circulation is adequate through the
building.
•Check security alarms regularly.
•Halon 1301 gas.
33
• Avoid basement storage as much as possible.
• Do not store records near window, heating / cooling units.
• Avoid storage records below pipes.
• Locate all drains and check them regularly.
• Store records at least 12inc from outside walls to prevent
condensation.
• Keep plastic sheets to cover records.
• Keep material 4inches high from the bottom.
34
Ensure that:
•Is storage building safe and secure?
•Do they keep logs of visitors?
•Are security devices working well?
•Is temperature controlled?
•How easy is to find records there?
35
36
• Assess the disaster situation
• Contact to insurer
Recovering water damaged records
•Don’t try to press water out of item.
•Possible to dry items in air & sun.
•Separate soaked items from wet.
•Use plastic sheet for packing records.
•Mark valuable items with a property stamp.
37
•Wear sturdy shoes •Use cubical boxes for
packing records
38
Microfilm & other photographic
media can be use to preserve items.
39
Japanese
tissue paper
Polyester sheet
Blotter Paper
Cleaning Pads
Soft Brushes
40
•Use virus detection software.
•Implement a system of password-protected access to E-
files.
•Store copies of documentation off-site.
•Develop and implement a regular off-site backup schedule.
•Assess recoverability of information from other
sources(such as paper & microfilm).
41
Fire detector
42
Water detector
alarm (WA400)
Fire Buzzer
Water leak detector
43
44
`
45
46

Mais conteúdo relacionado

Destaque

Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Simone Brunozzi
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryAmazon Web Services
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAmazon Web Services
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India CaseSujit Mohanty
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery Brian Pichman
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloudJason Dea
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeSysfore Technologies
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...Smart ERP Solutions, Inc.
 

Destaque (11)

Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
fire_safety
fire_safetyfire_safety
fire_safety
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India Case
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...
 

Semelhante a Security&disaster plan

NCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for LibrariesNCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for LibrariesNebraska Library Commission
 
Pcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cnaPcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cnaclbuch
 
Laboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA SafetyLaboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA SafetyAtlantic Training, LLC.
 
Preservation and conservation
Preservation and conservationPreservation and conservation
Preservation and conservationDiluwar Hassan
 
Goodstoragepractices 190420174931
Goodstoragepractices 190420174931Goodstoragepractices 190420174931
Goodstoragepractices 190420174931Rafhan Altaf
 
Good storage practices
Good storage practicesGood storage practices
Good storage practicesTala Khaled
 
Fire safety awareness sections 7 11
Fire safety awareness sections 7 11Fire safety awareness sections 7 11
Fire safety awareness sections 7 11fireawareness
 
Fire project
Fire projectFire project
Fire projectRIPPER95
 
Role Play - Induction process for new employees
Role Play - Induction process for new employeesRole Play - Induction process for new employees
Role Play - Induction process for new employeesstingray68
 
Health and safety induction
Health and safety inductionHealth and safety induction
Health and safety inductionGanesan Raju
 
Safety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptxSafety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptxBrownEmmanuel2
 
Chapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaulChapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaulMichael Horst
 
Industrial safety.pptx
Industrial safety.pptxIndustrial safety.pptx
Industrial safety.pptxamarnadh307
 
Managing small archives
Managing small archivesManaging small archives
Managing small archivesAmanda Hill
 

Semelhante a Security&disaster plan (20)

Security and Disaster Management
Security and Disaster ManagementSecurity and Disaster Management
Security and Disaster Management
 
Disaster
DisasterDisaster
Disaster
 
NCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for LibrariesNCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for Libraries
 
Pcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cnaPcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cna
 
Laboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA SafetyLaboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA Safety
 
Preservation and conservation
Preservation and conservationPreservation and conservation
Preservation and conservation
 
Goodstoragepractices 190420174931
Goodstoragepractices 190420174931Goodstoragepractices 190420174931
Goodstoragepractices 190420174931
 
Good storage practices
Good storage practicesGood storage practices
Good storage practices
 
Fire safety awareness sections 7 11
Fire safety awareness sections 7 11Fire safety awareness sections 7 11
Fire safety awareness sections 7 11
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Hotel Safety & Security
 
Fire project
Fire projectFire project
Fire project
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Role Play - Induction process for new employees
Role Play - Induction process for new employeesRole Play - Induction process for new employees
Role Play - Induction process for new employees
 
Health and safety induction
Health and safety inductionHealth and safety induction
Health and safety induction
 
Safety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptxSafety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptx
 
Fire safety unit 13
Fire safety unit 13Fire safety unit 13
Fire safety unit 13
 
Chapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaulChapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaul
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
 
Industrial safety.pptx
Industrial safety.pptxIndustrial safety.pptx
Industrial safety.pptx
 
Managing small archives
Managing small archivesManaging small archives
Managing small archives
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Security&disaster plan

  • 1. 1
  • 2. 2
  • 3. • What are archives • Security & security system • Disaster & emergency • Disaster & emergency planning • Fire & water prevention • Off-site storage • Disaster response & Recovery • Electronic record disaster • Preservation & conservation of records • conclusion 3
  • 4. A collection of historical documents or records providing information about a place, institution, or group of people. 4
  • 5. “The state of being free from danger or threat”. “Security deals with potential human problems”. Regarding security issues Archivist consider Two aspects 1. Physical Security 2. Collection Security 5
  • 6. Physical security refers to the protection of building sites and equipment from theft, natural disaster, man made catastrophes and accidental damage. Physical security deals with the repository and building 6
  • 7. According to “Hunter’s” in a small archival program these six hints must be considered:  Doors Locks windows Alarms Keys Box labels Doors: Doors should be strong, well made including frame. 7
  • 8. 8
  • 9. Following locks should be used regarding security: Dead Bolts Knob Lock Cam Lock Lever Handle Lock 9
  • 10. windows on the lower floor should be locked. • Fire and burglar alarms should be monitored on a regular schedule. • Burglar alarms should be set when the archive’s repository closes and should include both door and motion alarms. •In areas that may be unsafe from flooding, rain, tank water there water alarms are important. 10
  • 11.  keys should be carefully issued.  when cleaning or maintenance, staff need to be in the archives, they must do so during normal hours or in the presence of a security guard. Archivist must mention minimum information on the box label. 11
  • 12. • Requiring patrons and staff to enter and exit the building by one door, which is monitored at all times. • Door buzzers and alarms are recommended. Employing one or more security guards to patrol the repository after closing. • Prevent accidental false alarms. • Taking steps to prevent removal or duplication of keys, ensuring that keys are returned when employees leave, and changing all locks periodically. • It is prudent to examine the building’s after-hours. 12
  • 13. 13
  • 15. 15
  • 16. •“Collection security involves making sure that records do not disappear either during use or at other time”. Archivist must be aware of the alerts regarding staff: • The same person reporting items missing or being informing to find missing item. • A staff member disregards for established rules and procedures. • A staff member’s lifestyle that does not match salary . 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. • Each patron should complete a Registration Form that asks for identifying information and information about research interests and each patron should sign a logbook. • All patrons should be required to present photographic identification when they register. •Supervise researcher’s use of materials. • Check each archival box before and after it is used by patrons. 26
  • 27. • Examine your collection on a regular basis. • It might involve a researcher or even a staff member who is behaving suspiciously. • Call him in office & don’t take it personal. • Don’t shout on the person. • Notify security or the police. • If the patron denies there is a problem and leaves the building one person should follow the patron. • In all cases, the goal should be to recover the missing materials 27
  • 28. • Prepare a written security policy. • Appoint a security manager to develop and implement your security plan. • Perform a security survey to assess your needs. • Install appropriate security systems. • Ensure that collection storage is secure and that records are kept. • Make an agreement with insurance company. • Maintain and update your security plan. 28
  • 29. •“A sudden accident or a natural catastrophe that causes great damage or loss of life”. •“ An emergency is a situation or occurrence of a serious nature, developing suddenly and unexpectedly and demanding immediate action. This is generally of short duration like a power failure or minor flooding cause by broken pipes. 29
  • 30. • An emergency plan must consist of; • A simple one page written guide. • Whom to call in case of emergency. • Methods to use in case of fire. • Names of first aid qualified persons. • Occasionally inspect emergency equipment 30
  • 31. Hurricane Andrew's assault on southern Florida and Louisiana, make all of us acutely aware of our vulnerabilities to disaster. A broken water main inundated the Chicago Historical Society. Fire severely damaged the Cabildo in New Orleans. Loma Prieta earthquake damaged several San Francisco area museums and libraries. Smoke from an electrical fire covered collections throughout Huntington Gallery 1992 1986 1998 1989 1985 31
  • 32. Minor Disasters: Minor disasters can be handled either by staff. Moderate Disasters: Usually larger in scope. Usually involves more than 100 damaged items but fewer than 4000. • Major/Catastrophic disaster: Damage is typically more severe. • Probably requires assistance from outside the institution. Two disaster for which archivist need to plan are: •Fire •Water 32
  • 33. •Prohibit smoking in record storage areas. •Keep all chemicals closed. •Ensure that air circulation is adequate through the building. •Check security alarms regularly. •Halon 1301 gas. 33
  • 34. • Avoid basement storage as much as possible. • Do not store records near window, heating / cooling units. • Avoid storage records below pipes. • Locate all drains and check them regularly. • Store records at least 12inc from outside walls to prevent condensation. • Keep plastic sheets to cover records. • Keep material 4inches high from the bottom. 34
  • 35. Ensure that: •Is storage building safe and secure? •Do they keep logs of visitors? •Are security devices working well? •Is temperature controlled? •How easy is to find records there? 35
  • 36. 36
  • 37. • Assess the disaster situation • Contact to insurer Recovering water damaged records •Don’t try to press water out of item. •Possible to dry items in air & sun. •Separate soaked items from wet. •Use plastic sheet for packing records. •Mark valuable items with a property stamp. 37
  • 38. •Wear sturdy shoes •Use cubical boxes for packing records 38
  • 39. Microfilm & other photographic media can be use to preserve items. 39
  • 40. Japanese tissue paper Polyester sheet Blotter Paper Cleaning Pads Soft Brushes 40
  • 41. •Use virus detection software. •Implement a system of password-protected access to E- files. •Store copies of documentation off-site. •Develop and implement a regular off-site backup schedule. •Assess recoverability of information from other sources(such as paper & microfilm). 41
  • 43. Water detector alarm (WA400) Fire Buzzer Water leak detector 43
  • 44. 44
  • 45. ` 45
  • 46. 46