U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Protecting Your Collection - A Handbook, Survey, and Guide for the Security of Rare Books, Manuscripts, Archives, and Works of Art

NCJ Number
86139
Journal
Library and Archival Security Volume: 4 Issue: 1 and 2 Dated: (1982) Pages: complete issue
Author(s)
S R Gandert
Date Published
1982
Length
157 pages
Annotation
Improved security and restricted access policies should be instituted for the protection of valued collections and rare books, despite the effect such measures may have on the egalitarian ideal of library service.
Abstract
The theft of irreplaceable materials, documents, and art works has been accomplished by sophisticated thieves because of the lack of awareness of archival and security staff. Thefts of rare objects in specialized fields are often performed by highly knowledgeable professionals -- not infrequently scholars or pseudo-scholars frequenting rare book collections under false credentials. State and international laws have, for the most part, failed to address the security problem. International smuggling of stolen art works, mutilation and forgery of originals, and armed robberies of museums are becoming increasingly common. Attempts by library associations and archivists to establish registers of stolen and lost items and to survey security systems have had only moderate success. Libraries must address the problems of employee dishonesty, legalized theft by children, and the labeling of reference works as circulation materials. Libraries and archives should adequately insure their collections, improve the training of security personnel, and employ more sophisticated alarms and electronic surveillance systems. The author, a librarian and security consultant, recounts numerous incidents of library theft and cites technological reports and other publications addressing the security problem. About 200 references are appended.

Downloads

No download available

Availability