SlideShare a Scribd company logo
1
2
• What are archives
• Security & security system
• Disaster & emergency
• Disaster & emergency planning
• Fire & water prevention
• Off-site storage
• Disaster response & Recovery
• Electronic record disaster
• Preservation & conservation of records
• conclusion
3
A collection of historical
documents or records
providing information about a
place, institution, or group of
people.
4
“The state of being free from danger or
threat”.
“Security deals with potential human problems”.
Regarding security issues Archivist consider Two aspects
1. Physical Security
2. Collection Security
5
Physical security refers to the protection of building
sites and equipment from theft, natural disaster,
man made catastrophes and accidental damage.
Physical security deals with the
repository and building
6
According to “Hunter’s” in a small archival program
these six hints must be considered:
 Doors
Locks
windows
Alarms
Keys
Box labels
Doors: Doors should be strong, well made including frame.
7
8
Following locks should be used regarding security:
Dead Bolts
Knob Lock Cam Lock
Lever Handle Lock
9
windows on the lower floor should be locked.
• Fire and burglar alarms should be monitored on a regular
schedule.
• Burglar alarms should be set when the archive’s repository closes
and should include both door and motion alarms.
•In areas that may be unsafe from flooding, rain, tank
water there water alarms are important.
10
 keys should be carefully issued.
 when cleaning or maintenance, staff need to be in the
archives, they must do so during normal hours or in the
presence of a security guard.
Archivist must mention minimum information on the box
label. 11
• Requiring patrons and staff to enter and exit the building by one
door, which is monitored at all times.
• Door buzzers and alarms are recommended. Employing one or more
security guards to patrol the repository after closing.
• Prevent accidental false alarms.
• Taking steps to prevent removal or duplication of keys, ensuring that
keys are returned when employees leave, and changing all locks
periodically.
• It is prudent to examine the building’s after-hours. 12
13
14Intrudent Alarms
15
•“Collection security involves making sure that
records do not disappear either during use or at
other time”.
Archivist must be aware of the alerts regarding staff:
• The same person reporting items missing or being informing to find
missing item.
• A staff member disregards for established rules and procedures.
• A staff member’s lifestyle that does not match salary .
16
17
18
19
20
21
22
23
24
25
• Each patron should complete a Registration Form that asks for
identifying information and information about research interests
and each patron should sign a logbook.
• All patrons should be required to present photographic
identification when they register.
•Supervise researcher’s use of materials.
• Check each archival box before and after it is used by patrons.
26
• Examine your collection on a regular basis.
• It might involve a researcher or even a staff member who
is behaving suspiciously.
• Call him in office & don’t take it personal.
• Don’t shout on the person.
• Notify security or the police.
• If the patron denies there is a problem and leaves the
building one person should follow the patron.
• In all cases, the goal should be to recover the missing
materials
27
• Prepare a written security policy.
• Appoint a security manager to develop and implement your
security plan.
• Perform a security survey to assess your needs.
• Install appropriate security systems.
• Ensure that collection storage is secure and that records are
kept.
• Make an agreement with insurance company.
• Maintain and update your security plan.
28
•“A sudden accident or a natural catastrophe
that causes great damage or loss of life”.
•“ An emergency is a situation or occurrence of
a serious nature, developing suddenly and
unexpectedly and demanding immediate
action. This is generally of short duration like a
power failure or minor flooding cause by broken
pipes.
29
• An emergency plan must consist of;
• A simple one page written guide.
• Whom to call in case of emergency.
• Methods to use in case of fire.
• Names of first aid qualified persons.
• Occasionally inspect emergency equipment
30
Hurricane Andrew's assault on southern Florida and Louisiana, make all
of us acutely aware of our vulnerabilities to disaster.
A broken water main inundated the Chicago Historical Society.
Fire severely damaged the Cabildo in New Orleans.
Loma Prieta earthquake damaged several San Francisco area
museums and libraries.
Smoke from an electrical fire covered collections throughout
Huntington Gallery
1992
1986
1998
1989
1985
31
Minor Disasters: Minor disasters can be handled either by staff.
Moderate Disasters: Usually larger in scope. Usually involves more
than 100 damaged items but fewer than 4000.
• Major/Catastrophic disaster: Damage is typically more severe.
• Probably requires assistance from outside the institution.
Two disaster for which archivist need to plan are:
•Fire
•Water
32
•Prohibit smoking in record storage areas.
•Keep all chemicals closed.
•Ensure that air circulation is adequate through the
building.
•Check security alarms regularly.
•Halon 1301 gas.
33
• Avoid basement storage as much as possible.
• Do not store records near window, heating / cooling units.
• Avoid storage records below pipes.
• Locate all drains and check them regularly.
• Store records at least 12inc from outside walls to prevent
condensation.
• Keep plastic sheets to cover records.
• Keep material 4inches high from the bottom.
34
Ensure that:
•Is storage building safe and secure?
•Do they keep logs of visitors?
•Are security devices working well?
•Is temperature controlled?
•How easy is to find records there?
35
36
• Assess the disaster situation
• Contact to insurer
Recovering water damaged records
•Don’t try to press water out of item.
•Possible to dry items in air & sun.
•Separate soaked items from wet.
•Use plastic sheet for packing records.
•Mark valuable items with a property stamp.
37
•Wear sturdy shoes •Use cubical boxes for
packing records
38
Microfilm & other photographic
media can be use to preserve items.
39
Japanese
tissue paper
Polyester sheet
Blotter Paper
Cleaning Pads
Soft Brushes
40
•Use virus detection software.
•Implement a system of password-protected access to E-
files.
•Store copies of documentation off-site.
•Develop and implement a regular off-site backup schedule.
•Assess recoverability of information from other
sources(such as paper & microfilm).
41
Fire detector
42
Water detector
alarm (WA400)
Fire Buzzer
Water leak detector
43
44
`
45
46

More Related Content

Viewers also liked

Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Simone Brunozzi
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
fire_safety
fire_safetyfire_safety
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
Amazon Web Services
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
Amazon Web Services
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India Case
Sujit Mohanty
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
Smart ERP Solutions, Inc.
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
Jason Dea
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Sysfore Technologies
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...
Smart ERP Solutions, Inc.
 

Viewers also liked (11)

Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
Parmigiano, a Monastery, Love and Faith: Technical lessons on how to do Backu...
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
fire_safety
fire_safetyfire_safety
fire_safety
 
Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
AWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster RecoveryAWS Journey through the AWS Cloud: Disaster Recovery
AWS Journey through the AWS Cloud: Disaster Recovery
 
Ict In Disaster Risk Reduction India Case
Ict In Disaster Risk Reduction  India CaseIct In Disaster Risk Reduction  India Case
Ict In Disaster Risk Reduction India Case
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
Disaster recovery and the cloud
Disaster recovery and the cloudDisaster recovery and the cloud
Disaster recovery and the cloud
 
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | SysforeCloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
Cloud Backup or Cloud Disaster Recovery – Key differences explained! | Sysfore
 
Alliance 2017 3891-University of California | Office of The President People...
Alliance 2017  3891-University of California | Office of The President People...Alliance 2017  3891-University of California | Office of The President People...
Alliance 2017 3891-University of California | Office of The President People...
 

Similar to Security&disaster plan

Security and Disaster Management
Security and Disaster ManagementSecurity and Disaster Management
Security and Disaster Management
Jolo Van Clyde Abatayo
 
Disaster
DisasterDisaster
Disaster
Iqra tasifali
 
NCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for LibrariesNCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for Libraries
Nebraska Library Commission
 
Pcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cnaPcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cna
clbuch
 
Laboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA SafetyLaboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA Safety
Atlantic Training, LLC.
 
Preservation and conservation
Preservation and conservationPreservation and conservation
Preservation and conservation
Diluwar Hassan
 
example-fire-induction-procedures for engineers
example-fire-induction-procedures for engineersexample-fire-induction-procedures for engineers
example-fire-induction-procedures for engineers
A N M Mominul Islam Mukut
 
Goodstoragepractices 190420174931
Goodstoragepractices 190420174931Goodstoragepractices 190420174931
Goodstoragepractices 190420174931
Rafhan Altaf
 
Good storage practices
Good storage practicesGood storage practices
Good storage practices
Tala Khaled
 
Fire safety awareness sections 7 11
Fire safety awareness sections 7 11Fire safety awareness sections 7 11
Fire safety awareness sections 7 11
fireawareness
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Fire project
Fire projectFire project
Fire project
RIPPER95
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
prashantkumarchinama
 
Role Play - Induction process for new employees
Role Play - Induction process for new employeesRole Play - Induction process for new employees
Role Play - Induction process for new employees
stingray68
 
Health and safety induction
Health and safety inductionHealth and safety induction
Health and safety induction
Ganesan Raju
 
Safety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptxSafety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptx
BrownEmmanuel2
 
Fire safety unit 13
Fire safety unit 13Fire safety unit 13
Fire safety unit 13
sangita_chosencaregroup
 
Chapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaulChapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaul
Michael Horst
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
CapRockTelephone
 
Industrial safety.pptx
Industrial safety.pptxIndustrial safety.pptx
Industrial safety.pptx
amarnadh307
 

Similar to Security&disaster plan (20)

Security and Disaster Management
Security and Disaster ManagementSecurity and Disaster Management
Security and Disaster Management
 
Disaster
DisasterDisaster
Disaster
 
NCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for LibrariesNCompass Live: Emergency and Disaster Response Planning for Libraries
NCompass Live: Emergency and Disaster Response Planning for Libraries
 
Pcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cnaPcc cna-2011 unit 8, cna
Pcc cna-2011 unit 8, cna
 
Laboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA SafetyLaboratory Area Housekeeping Awareness by ETA Safety
Laboratory Area Housekeeping Awareness by ETA Safety
 
Preservation and conservation
Preservation and conservationPreservation and conservation
Preservation and conservation
 
example-fire-induction-procedures for engineers
example-fire-induction-procedures for engineersexample-fire-induction-procedures for engineers
example-fire-induction-procedures for engineers
 
Goodstoragepractices 190420174931
Goodstoragepractices 190420174931Goodstoragepractices 190420174931
Goodstoragepractices 190420174931
 
Good storage practices
Good storage practicesGood storage practices
Good storage practices
 
Fire safety awareness sections 7 11
Fire safety awareness sections 7 11Fire safety awareness sections 7 11
Fire safety awareness sections 7 11
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Hotel Safety & Security
 
Fire project
Fire projectFire project
Fire project
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Role Play - Induction process for new employees
Role Play - Induction process for new employeesRole Play - Induction process for new employees
Role Play - Induction process for new employees
 
Health and safety induction
Health and safety inductionHealth and safety induction
Health and safety induction
 
Safety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptxSafety Training on fire risk assessment Presentation.pptx
Safety Training on fire risk assessment Presentation.pptx
 
Fire safety unit 13
Fire safety unit 13Fire safety unit 13
Fire safety unit 13
 
Chapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaulChapter 13 salvage %26 overhaul
Chapter 13 salvage %26 overhaul
 
Wildfire Awareness
Wildfire AwarenessWildfire Awareness
Wildfire Awareness
 
Industrial safety.pptx
Industrial safety.pptxIndustrial safety.pptx
Industrial safety.pptx
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 

Security&disaster plan

  • 1. 1
  • 2. 2
  • 3. • What are archives • Security & security system • Disaster & emergency • Disaster & emergency planning • Fire & water prevention • Off-site storage • Disaster response & Recovery • Electronic record disaster • Preservation & conservation of records • conclusion 3
  • 4. A collection of historical documents or records providing information about a place, institution, or group of people. 4
  • 5. “The state of being free from danger or threat”. “Security deals with potential human problems”. Regarding security issues Archivist consider Two aspects 1. Physical Security 2. Collection Security 5
  • 6. Physical security refers to the protection of building sites and equipment from theft, natural disaster, man made catastrophes and accidental damage. Physical security deals with the repository and building 6
  • 7. According to “Hunter’s” in a small archival program these six hints must be considered:  Doors Locks windows Alarms Keys Box labels Doors: Doors should be strong, well made including frame. 7
  • 8. 8
  • 9. Following locks should be used regarding security: Dead Bolts Knob Lock Cam Lock Lever Handle Lock 9
  • 10. windows on the lower floor should be locked. • Fire and burglar alarms should be monitored on a regular schedule. • Burglar alarms should be set when the archive’s repository closes and should include both door and motion alarms. •In areas that may be unsafe from flooding, rain, tank water there water alarms are important. 10
  • 11.  keys should be carefully issued.  when cleaning or maintenance, staff need to be in the archives, they must do so during normal hours or in the presence of a security guard. Archivist must mention minimum information on the box label. 11
  • 12. • Requiring patrons and staff to enter and exit the building by one door, which is monitored at all times. • Door buzzers and alarms are recommended. Employing one or more security guards to patrol the repository after closing. • Prevent accidental false alarms. • Taking steps to prevent removal or duplication of keys, ensuring that keys are returned when employees leave, and changing all locks periodically. • It is prudent to examine the building’s after-hours. 12
  • 13. 13
  • 15. 15
  • 16. •“Collection security involves making sure that records do not disappear either during use or at other time”. Archivist must be aware of the alerts regarding staff: • The same person reporting items missing or being informing to find missing item. • A staff member disregards for established rules and procedures. • A staff member’s lifestyle that does not match salary . 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. • Each patron should complete a Registration Form that asks for identifying information and information about research interests and each patron should sign a logbook. • All patrons should be required to present photographic identification when they register. •Supervise researcher’s use of materials. • Check each archival box before and after it is used by patrons. 26
  • 27. • Examine your collection on a regular basis. • It might involve a researcher or even a staff member who is behaving suspiciously. • Call him in office & don’t take it personal. • Don’t shout on the person. • Notify security or the police. • If the patron denies there is a problem and leaves the building one person should follow the patron. • In all cases, the goal should be to recover the missing materials 27
  • 28. • Prepare a written security policy. • Appoint a security manager to develop and implement your security plan. • Perform a security survey to assess your needs. • Install appropriate security systems. • Ensure that collection storage is secure and that records are kept. • Make an agreement with insurance company. • Maintain and update your security plan. 28
  • 29. •“A sudden accident or a natural catastrophe that causes great damage or loss of life”. •“ An emergency is a situation or occurrence of a serious nature, developing suddenly and unexpectedly and demanding immediate action. This is generally of short duration like a power failure or minor flooding cause by broken pipes. 29
  • 30. • An emergency plan must consist of; • A simple one page written guide. • Whom to call in case of emergency. • Methods to use in case of fire. • Names of first aid qualified persons. • Occasionally inspect emergency equipment 30
  • 31. Hurricane Andrew's assault on southern Florida and Louisiana, make all of us acutely aware of our vulnerabilities to disaster. A broken water main inundated the Chicago Historical Society. Fire severely damaged the Cabildo in New Orleans. Loma Prieta earthquake damaged several San Francisco area museums and libraries. Smoke from an electrical fire covered collections throughout Huntington Gallery 1992 1986 1998 1989 1985 31
  • 32. Minor Disasters: Minor disasters can be handled either by staff. Moderate Disasters: Usually larger in scope. Usually involves more than 100 damaged items but fewer than 4000. • Major/Catastrophic disaster: Damage is typically more severe. • Probably requires assistance from outside the institution. Two disaster for which archivist need to plan are: •Fire •Water 32
  • 33. •Prohibit smoking in record storage areas. •Keep all chemicals closed. •Ensure that air circulation is adequate through the building. •Check security alarms regularly. •Halon 1301 gas. 33
  • 34. • Avoid basement storage as much as possible. • Do not store records near window, heating / cooling units. • Avoid storage records below pipes. • Locate all drains and check them regularly. • Store records at least 12inc from outside walls to prevent condensation. • Keep plastic sheets to cover records. • Keep material 4inches high from the bottom. 34
  • 35. Ensure that: •Is storage building safe and secure? •Do they keep logs of visitors? •Are security devices working well? •Is temperature controlled? •How easy is to find records there? 35
  • 36. 36
  • 37. • Assess the disaster situation • Contact to insurer Recovering water damaged records •Don’t try to press water out of item. •Possible to dry items in air & sun. •Separate soaked items from wet. •Use plastic sheet for packing records. •Mark valuable items with a property stamp. 37
  • 38. •Wear sturdy shoes •Use cubical boxes for packing records 38
  • 39. Microfilm & other photographic media can be use to preserve items. 39
  • 40. Japanese tissue paper Polyester sheet Blotter Paper Cleaning Pads Soft Brushes 40
  • 41. •Use virus detection software. •Implement a system of password-protected access to E- files. •Store copies of documentation off-site. •Develop and implement a regular off-site backup schedule. •Assess recoverability of information from other sources(such as paper & microfilm). 41
  • 43. Water detector alarm (WA400) Fire Buzzer Water leak detector 43
  • 44. 44
  • 45. ` 45
  • 46. 46