View
221
Download
3
Category
Preview:
Citation preview
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Mr. Neal’s
Preparing for the S.A.T.
March 7, 2003
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Question #1Question #1
What do the letters “S” and “T” stand for What do the letters “S” and “T” stand for in “Preparing for the S.A.T.”?in “Preparing for the S.A.T.”?
a) Scholastic, Test
b) Security, Technology
c) Sick, Twisted
d) A & B
e) A, B & sometimes C
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
SyllabusSyllabus
Incorporating security into building designIncorporating security into building design
Access controlAccess control
Impact of technology on building designImpact of technology on building design
Another day another new technologyAnother day another new technology
Questions, answers and more questionsQuestions, answers and more questions
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Involved from Start to FinishInvolved from Start to Finish
Budgeting –rough security and technology Budgeting –rough security and technology cost estimatescost estimatesDesign – architect allocates space, Design – architect allocates space, conduit, powerconduit, powerBid specification – scope of work, final Bid specification – scope of work, final costs, bid awards, contractual termscosts, bid awards, contractual termsConstruction – installation coordinationConstruction – installation coordinationOperation – training, debugging, Operation – training, debugging, maintenancemaintenance
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
securityMr. Roger’s Neighborhood
Alcatraz
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Environmental ScanEnvironmental Scan
How close to police station?How close to police station?
How close school (current/future)?How close school (current/future)?
Problems with gangs?Problems with gangs?
Homeless population?Homeless population?
Is building isolated from other buildings?Is building isolated from other buildings?
Check local crime statistics; are they Check local crime statistics; are they changing?changing?
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Operational ScanOperational Scan
Are there evening hours of service, Are there evening hours of service, especially in winter?especially in winter?
Do staff members frequently work alone?Do staff members frequently work alone?
How far apart are the service desks?How far apart are the service desks?
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Case StudyCase Study
Don’t underestimate the potential for a problem.Don’t underestimate the potential for a problem.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Primary Visual ControlPrimary Visual Control
Ensure that sight lines from service desks are Ensure that sight lines from service desks are not obstructed by columns or high shelvingnot obstructed by columns or high shelving
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Primary Visual ControlPrimary Visual Control
Offer adequate lighting Offer adequate lighting throughoutthroughout
Use plenty of glass in public Use plenty of glass in public roomsrooms
Glass from staff offices?Glass from staff offices?
Staff entranceStaff entrance– Avoid walls and treesAvoid walls and trees– Good lighting as long as staff Good lighting as long as staff
is working (don’t forget is working (don’t forget cleaning staff)cleaning staff)
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Secondary “Visual” ControlSecondary “Visual” Control
High-traffic public areasHigh-traffic public areas
Rest rooms without doorsRest rooms without doors
What areas don’t fall under primary or What areas don’t fall under primary or secondary?secondary?
Surveillance systemsSurveillance systems
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Question #2Question #2
Suitable locations for surveillance Suitable locations for surveillance cameras include:cameras include:
a) Public entrances
b) Public restrooms
c) Exterior book drop areas
d) Local history rooms
e) All but B
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Surveillance SystemsSurveillance Systems
Placement of camerasPlacement of cameras– public entrancepublic entrance– book dropbook drop– staff entrancestaff entrance– local history roomlocal history room
Color versus black and whiteColor versus black and whiteDigital versus analogDigital versus analogLocation of equipmentLocation of equipmentMonitored versus unmonitoredMonitored versus unmonitoredPrivacy issuesPrivacy issues
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Physical ControlPhysical Control
Special areas to controlSpecial areas to control
Special doorsSpecial doors
Ways to controlWays to control
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Golden RuleGolden Rule
You can secure your building like You can secure your building like Fort Knox, but at the end of the Fort Knox, but at the end of the day the master key gets handed day the master key gets handed over to the new temp working for over to the new temp working for your janitorial services vendor.your janitorial services vendor.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Special AreasSpecial Areas
Study roomsStudy roomsRest roomsRest roomsOffice supply roomOffice supply room– Restrict staff accessRestrict staff access– Do not allow access to cleaning Do not allow access to cleaning
staffstaff
Bookkeeper/accounting officeBookkeeper/accounting office– Restrict staff accessRestrict staff access
Personal belongingsPersonal belongings– Offer lockersOffer lockers
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Special DoorsSpecial Doors
The exterior staff entranceThe exterior staff entrance– Door phone/intercom if large Door phone/intercom if large
deliveries arrive heredeliveries arrive here– Camera to see who’s at the Camera to see who’s at the
doordoor– Should have glass to avoid Should have glass to avoid
collisions and to see if anyone collisions and to see if anyone is in the areais in the area
– Power assist device is very Power assist device is very helpfulhelpful
– Remote release to open for Remote release to open for visitorsvisitors
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Special DoorsSpecial Doors
Fire escapesFire escapes– Controlled exit panic bar, e.g. Von Duprin ChexitControlled exit panic bar, e.g. Von Duprin Chexit– Identify any that staff will use frequentlyIdentify any that staff will use frequently
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Good Ole KeysGood Ole Keys
Be prepared to develop a schemeBe prepared to develop a scheme– Lock functions: passage, storeroom, Lock functions: passage, storeroom,
classroomclassroom– Multiple facilities?Multiple facilities?– Who has access to what?Who has access to what?– What key opens what and doesn’t open what?What key opens what and doesn’t open what?
How many locks do you have to change if How many locks do you have to change if a particular key is lost or stolen?a particular key is lost or stolen?Cheap keys = cheap securityCheap keys = cheap security
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Keys to SuccessKeys to Success
Contact your local fire Contact your local fire department to see if they department to see if they use key boxes, e.g. “Knox use key boxes, e.g. “Knox boxes”boxes”
Have groups of cabinets Have groups of cabinets keyed alike.keyed alike.
Be prepared to receive Be prepared to receive multiple keys of all shapes, multiple keys of all shapes, sizes and purposessizes and purposes
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Electronic “Keys”Electronic “Keys”
Interface optionsInterface options– Keypads, swipe cards, fobs, proximity readers, biometricsKeypads, swipe cards, fobs, proximity readers, biometrics
Networked or standaloneNetworked or standaloneDecide early on if going to useDecide early on if going to useBenefitsBenefits– Precise controlPrecise control– LoggingLogging– No problem with lost keysNo problem with lost keys– FlexibleFlexible– Can use as photo I.D.Can use as photo I.D.
DisadvantagesDisadvantages– CostCost– Another “system” to maintainAnother “system” to maintain
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Security AlarmsSecurity Alarms
The panelThe panel– Is it easy to read in low light?Is it easy to read in low light?– Is it easy to use?Is it easy to use?– How many codes can it handle?How many codes can it handle?– Standardize across branchesStandardize across branches
OptionsOptions– Motion/heat detectorsMotion/heat detectors– Sound detectorsSound detectors– Microphones in sensorsMicrophones in sensors– Interface with fire suppression systemInterface with fire suppression system
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
technologyFlintsto
nesJetso
ns
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Question #3Question #3
Where are the library’s “family jewels” Where are the library’s “family jewels” kept?kept?
a) Director’s office
b) Storytime room
c) Bookmobile garage
d) Computer equipment room
e) Local pawn shop
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Equipment RoomEquipment Room
Not suitable as a staff workroom!Not suitable as a staff workroom!Centrally locatedCentrally locatedStatic electricity and humidity controlStatic electricity and humidity controlSpecial cooling requirementsSpecial cooling requirementsGroundingGroundingRectangular shapeRectangular shapeNo external windowsNo external windowsEasy access to front and back of racksEasy access to front and back of racksAccessible flooring if on first floor slabAccessible flooring if on first floor slab
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Equipment Room ContentsEquipment Room Contents
RacksRacksCable punch down blocksCable punch down blocksCable trayCable trayImportant computer and computer-like pieces of Important computer and computer-like pieces of equipmentequipment– Network servers, switches, routers, etc.Network servers, switches, routers, etc.– Uninterruptible power suppliesUninterruptible power supplies– Phone systemPhone system– Door access control systemDoor access control system– Digital security recording systemDigital security recording system– Paging system controlsPaging system controls
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Golden RuleGolden Rule
An ounce of ownership is worth a An ounce of ownership is worth a pound of pride.pound of pride.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Staff SpaceStaff Space
Enclosed office for technology managerEnclosed office for technology manager
Close to equipment roomClose to equipment room
Not isolated from other staff areasNot isolated from other staff areas
Work surface with power and data for Work surface with power and data for setup and troubleshootingsetup and troubleshooting
Cabinets, files, and shelves to hold Cabinets, files, and shelves to hold manuals, spare parts, cables and lots of manuals, spare parts, cables and lots of odds and endsodds and ends
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Question #4Question #4
In all public areas, the best type of power In all public areas, the best type of power outlets are ___________________.outlets are ___________________.
a) whatever code requires.
b) those labeled, “Insert fork here.”
c) standard outlets with plastic safety inserts.
d) childproof, adult-friendly safety outlets.
e) I want to say B, but my lawyer says D.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
PowerPower
Identify locations of coffee pots, printers, Identify locations of coffee pots, printers, fax machines, and copiersfax machines, and copiers
Identify heat dispersion of equipment in Identify heat dispersion of equipment in equipment roomequipment room
Twist-lock outletsTwist-lock outlets
Power failurePower failure
Some phone sets require AC powerSome phone sets require AC power
Vacuum cord theory of outlet placementVacuum cord theory of outlet placement
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
CablingCabling
Category 6 is an approved standardCategory 6 is an approved standardUse same standard from end to endUse same standard from end to endWire voice and data the same if possibleWire voice and data the same if possibleAvoid secondary closetsAvoid secondary closets– Expense (fiber, additional switch, additional UPS)Expense (fiber, additional switch, additional UPS)– Single point of failureSingle point of failure– Traditional phones require direct to controller cablingTraditional phones require direct to controller cabling
Difficult areasDifficult areas– Slab floor (floor boxes, conduit, computer flooring)Slab floor (floor boxes, conduit, computer flooring)– Outlets on cinder block wallsOutlets on cinder block walls– Solid cubicle wallsSolid cubicle walls
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
WirelessWireless
Wireless networking requires access pointsWireless networking requires access points– Plan for power and data outletPlan for power and data outlet– Delay purchase as long as possibleDelay purchase as long as possible– Possible personal laptop accessPossible personal laptop access
Cordless phonesCordless phones– Can be great for allowing staff to wander the stacksCan be great for allowing staff to wander the stacks– Have phone vendor test after stacks installed (lots of Have phone vendor test after stacks installed (lots of
metal)metal)– Metal roofing can make radio/emergency system Metal roofing can make radio/emergency system
reception poorreception poor
Radio frequency identification (RFID)Radio frequency identification (RFID)– Affects self check station designAffects self check station design
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Furniture DesignFurniture Design
Cables and computers should be neither seen Cables and computers should be neither seen nor heardnor heard
Allow sufficient space for “cable blobs”Allow sufficient space for “cable blobs”
Try to keep design flexible for future Try to keep design flexible for future equipmentequipment
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Computer WorkstationsComputer Workstations
Some with backs to walls to increase privacySome with backs to walls to increase privacyCan be attractive with flat panel monitors and compact Can be attractive with flat panel monitors and compact design PCs or thin clientsdesign PCs or thin clientsUsers still need some “personal space”Users still need some “personal space”Need to be able to secure small equipmentNeed to be able to secure small equipmentOn/off switch dilemmaOn/off switch dilemma
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Furniture DesignFurniture Design
Put printers and fax machines at service Put printers and fax machines at service desks on sliding flat drawers without lipsdesks on sliding flat drawers without lipsPut cutouts in shelvesPut cutouts in shelvesDesign holes between cabinetsDesign holes between cabinetsConsider flat panel monitors on armsConsider flat panel monitors on armsConsider power adjustable height for Consider power adjustable height for service desksservice desksEnsure ventilation for equipment in Ensure ventilation for equipment in cabinetscabinets
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Self Check StationsSelf Check Stations
Defy traditional Defy traditional circulation desk circulation desk designdesign
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Self Check StationsSelf Check Stations
Proven to handle 30-80% of circulation Proven to handle 30-80% of circulation transactionstransactions
Part of circulation desk versus standalonePart of circulation desk versus standalone
Locate in an “outbound” traffic patternLocate in an “outbound” traffic pattern
Still require hand holding and burpingStill require hand holding and burping
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Security Gate DesignSecurity Gate Design
Avoid gates that call Avoid gates that call out “climb me”out “climb me”
Use wood studs Use wood studs rather than steel near rather than steel near security gates at security gates at public entrancepublic entrance
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Security Gate DesignSecurity Gate Design
Often specific requirements per placement of gates, size Often specific requirements per placement of gates, size of conduit for cableof conduit for cable
Use conduit under flooring material rather than thresholdUse conduit under flooring material rather than threshold
Discuss with architects early or you’ll end up with ugly Discuss with architects early or you’ll end up with ugly chains or a potted plantchains or a potted plant
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Golden RuleGolden Rule
If you order all of the bells and If you order all of the bells and whistles, be sure you have a whistles, be sure you have a musician on staff.musician on staff.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Automated Materials HandlingAutomated Materials Handling
Machine takes over repetitive Machine takes over repetitive staff tasksstaff tasks– Unloading materials from book Unloading materials from book
dropdrop– Checking inChecking in– Reactivating securityReactivating security– Rough sortingRough sorting– Placing on book truck cartsPlacing on book truck carts– Removing book from holds shelf Removing book from holds shelf
and delivering to customerand delivering to customer
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Automated Materials HandlingAutomated Materials Handling
Bring prospective vendors in early to determine Bring prospective vendors in early to determine the most efficient designthe most efficient design– Avoid curves, rises and drops for conveyor beltsAvoid curves, rises and drops for conveyor belts– Need distance to hold materials before processingNeed distance to hold materials before processing– Will there be both inside and outside return/delivery Will there be both inside and outside return/delivery
points?points?– May require air compressorMay require air compressor
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Automated Materials HandlingAutomated Materials Handling
Can co-exist in a staff areaCan co-exist in a staff area
Can eliminate the need for a separate Can eliminate the need for a separate book return roombook return room
Can be a fascinating “attraction” for public Can be a fascinating “attraction” for public to watch in actionto watch in action
What happens if it stops working?What happens if it stops working?
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Other Influences on DesignOther Influences on Design
Sound domesSound domes
Ceiling-mounted LCD Ceiling-mounted LCD projectorsprojectors
24-hour lockers24-hour lockers
VideoconferencingVideoconferencing
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Question #5Question #5
““Whatever you buy today will be replaced Whatever you buy today will be replaced with a newer model ___________”with a newer model ___________”
a) next year.
b) next month.
c) tomorrow.
d) tonight.
e) after I buy it.
Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology
Larry P. NealAssistant Director
Clinton-Macomb Public Library (MI)
larry@cmpl.org
(586) 226-5011
See you in Seattle!
Thank you to our sponsors at Gaylord!
Recommended