Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March...

46
Building the Perfect Library – Security and Technology Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003

Transcript of Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March...

Page 1: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Mr. Neal’s

Preparing for the S.A.T.

March 7, 2003

Page 2: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Question #1Question #1

What do the letters “S” and “T” stand for What do the letters “S” and “T” stand for in “Preparing for the S.A.T.”?in “Preparing for the S.A.T.”?

a) Scholastic, Test

b) Security, Technology

c) Sick, Twisted

d) A & B

e) A, B & sometimes C

Page 3: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

SyllabusSyllabus

Incorporating security into building designIncorporating security into building design

Access controlAccess control

Impact of technology on building designImpact of technology on building design

Another day another new technologyAnother day another new technology

Questions, answers and more questionsQuestions, answers and more questions

Page 4: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Involved from Start to FinishInvolved from Start to Finish

Budgeting –rough security and technology Budgeting –rough security and technology cost estimatescost estimatesDesign – architect allocates space, Design – architect allocates space, conduit, powerconduit, powerBid specification – scope of work, final Bid specification – scope of work, final costs, bid awards, contractual termscosts, bid awards, contractual termsConstruction – installation coordinationConstruction – installation coordinationOperation – training, debugging, Operation – training, debugging, maintenancemaintenance

Page 5: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

securityMr. Roger’s Neighborhood

Alcatraz

Page 6: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Environmental ScanEnvironmental Scan

How close to police station?How close to police station?

How close school (current/future)?How close school (current/future)?

Problems with gangs?Problems with gangs?

Homeless population?Homeless population?

Is building isolated from other buildings?Is building isolated from other buildings?

Check local crime statistics; are they Check local crime statistics; are they changing?changing?

Page 7: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Operational ScanOperational Scan

Are there evening hours of service, Are there evening hours of service, especially in winter?especially in winter?

Do staff members frequently work alone?Do staff members frequently work alone?

How far apart are the service desks?How far apart are the service desks?

Page 8: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Case StudyCase Study

Don’t underestimate the potential for a problem.Don’t underestimate the potential for a problem.

Page 9: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Primary Visual ControlPrimary Visual Control

Ensure that sight lines from service desks are Ensure that sight lines from service desks are not obstructed by columns or high shelvingnot obstructed by columns or high shelving

Page 10: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Primary Visual ControlPrimary Visual Control

Offer adequate lighting Offer adequate lighting throughoutthroughout

Use plenty of glass in public Use plenty of glass in public roomsrooms

Glass from staff offices?Glass from staff offices?

Staff entranceStaff entrance– Avoid walls and treesAvoid walls and trees– Good lighting as long as staff Good lighting as long as staff

is working (don’t forget is working (don’t forget cleaning staff)cleaning staff)

Page 11: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Secondary “Visual” ControlSecondary “Visual” Control

High-traffic public areasHigh-traffic public areas

Rest rooms without doorsRest rooms without doors

What areas don’t fall under primary or What areas don’t fall under primary or secondary?secondary?

Surveillance systemsSurveillance systems

Page 12: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Question #2Question #2

Suitable locations for surveillance Suitable locations for surveillance cameras include:cameras include:

a) Public entrances

b) Public restrooms

c) Exterior book drop areas

d) Local history rooms

e) All but B

Page 13: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Surveillance SystemsSurveillance Systems

Placement of camerasPlacement of cameras– public entrancepublic entrance– book dropbook drop– staff entrancestaff entrance– local history roomlocal history room

Color versus black and whiteColor versus black and whiteDigital versus analogDigital versus analogLocation of equipmentLocation of equipmentMonitored versus unmonitoredMonitored versus unmonitoredPrivacy issuesPrivacy issues

Page 14: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Physical ControlPhysical Control

Special areas to controlSpecial areas to control

Special doorsSpecial doors

Ways to controlWays to control

Page 15: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Golden RuleGolden Rule

You can secure your building like You can secure your building like Fort Knox, but at the end of the Fort Knox, but at the end of the day the master key gets handed day the master key gets handed over to the new temp working for over to the new temp working for your janitorial services vendor.your janitorial services vendor.

Page 16: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Special AreasSpecial Areas

Study roomsStudy roomsRest roomsRest roomsOffice supply roomOffice supply room– Restrict staff accessRestrict staff access– Do not allow access to cleaning Do not allow access to cleaning

staffstaff

Bookkeeper/accounting officeBookkeeper/accounting office– Restrict staff accessRestrict staff access

Personal belongingsPersonal belongings– Offer lockersOffer lockers

Page 17: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Special DoorsSpecial Doors

The exterior staff entranceThe exterior staff entrance– Door phone/intercom if large Door phone/intercom if large

deliveries arrive heredeliveries arrive here– Camera to see who’s at the Camera to see who’s at the

doordoor– Should have glass to avoid Should have glass to avoid

collisions and to see if anyone collisions and to see if anyone is in the areais in the area

– Power assist device is very Power assist device is very helpfulhelpful

– Remote release to open for Remote release to open for visitorsvisitors

Page 18: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Special DoorsSpecial Doors

Fire escapesFire escapes– Controlled exit panic bar, e.g. Von Duprin ChexitControlled exit panic bar, e.g. Von Duprin Chexit– Identify any that staff will use frequentlyIdentify any that staff will use frequently

Page 19: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Good Ole KeysGood Ole Keys

Be prepared to develop a schemeBe prepared to develop a scheme– Lock functions: passage, storeroom, Lock functions: passage, storeroom,

classroomclassroom– Multiple facilities?Multiple facilities?– Who has access to what?Who has access to what?– What key opens what and doesn’t open what?What key opens what and doesn’t open what?

How many locks do you have to change if How many locks do you have to change if a particular key is lost or stolen?a particular key is lost or stolen?Cheap keys = cheap securityCheap keys = cheap security

Page 20: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Keys to SuccessKeys to Success

Contact your local fire Contact your local fire department to see if they department to see if they use key boxes, e.g. “Knox use key boxes, e.g. “Knox boxes”boxes”

Have groups of cabinets Have groups of cabinets keyed alike.keyed alike.

Be prepared to receive Be prepared to receive multiple keys of all shapes, multiple keys of all shapes, sizes and purposessizes and purposes

Page 21: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Electronic “Keys”Electronic “Keys”

Interface optionsInterface options– Keypads, swipe cards, fobs, proximity readers, biometricsKeypads, swipe cards, fobs, proximity readers, biometrics

Networked or standaloneNetworked or standaloneDecide early on if going to useDecide early on if going to useBenefitsBenefits– Precise controlPrecise control– LoggingLogging– No problem with lost keysNo problem with lost keys– FlexibleFlexible– Can use as photo I.D.Can use as photo I.D.

DisadvantagesDisadvantages– CostCost– Another “system” to maintainAnother “system” to maintain

Page 22: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Security AlarmsSecurity Alarms

The panelThe panel– Is it easy to read in low light?Is it easy to read in low light?– Is it easy to use?Is it easy to use?– How many codes can it handle?How many codes can it handle?– Standardize across branchesStandardize across branches

OptionsOptions– Motion/heat detectorsMotion/heat detectors– Sound detectorsSound detectors– Microphones in sensorsMicrophones in sensors– Interface with fire suppression systemInterface with fire suppression system

Page 23: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

technologyFlintsto

nesJetso

ns

Page 24: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Question #3Question #3

Where are the library’s “family jewels” Where are the library’s “family jewels” kept?kept?

a) Director’s office

b) Storytime room

c) Bookmobile garage

d) Computer equipment room

e) Local pawn shop

Page 25: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Equipment RoomEquipment Room

Not suitable as a staff workroom!Not suitable as a staff workroom!Centrally locatedCentrally locatedStatic electricity and humidity controlStatic electricity and humidity controlSpecial cooling requirementsSpecial cooling requirementsGroundingGroundingRectangular shapeRectangular shapeNo external windowsNo external windowsEasy access to front and back of racksEasy access to front and back of racksAccessible flooring if on first floor slabAccessible flooring if on first floor slab

Page 26: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Equipment Room ContentsEquipment Room Contents

RacksRacksCable punch down blocksCable punch down blocksCable trayCable trayImportant computer and computer-like pieces of Important computer and computer-like pieces of equipmentequipment– Network servers, switches, routers, etc.Network servers, switches, routers, etc.– Uninterruptible power suppliesUninterruptible power supplies– Phone systemPhone system– Door access control systemDoor access control system– Digital security recording systemDigital security recording system– Paging system controlsPaging system controls

Page 27: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Golden RuleGolden Rule

An ounce of ownership is worth a An ounce of ownership is worth a pound of pride.pound of pride.

Page 28: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Staff SpaceStaff Space

Enclosed office for technology managerEnclosed office for technology manager

Close to equipment roomClose to equipment room

Not isolated from other staff areasNot isolated from other staff areas

Work surface with power and data for Work surface with power and data for setup and troubleshootingsetup and troubleshooting

Cabinets, files, and shelves to hold Cabinets, files, and shelves to hold manuals, spare parts, cables and lots of manuals, spare parts, cables and lots of odds and endsodds and ends

Page 29: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Question #4Question #4

In all public areas, the best type of power In all public areas, the best type of power outlets are ___________________.outlets are ___________________.

a) whatever code requires.

b) those labeled, “Insert fork here.”

c) standard outlets with plastic safety inserts.

d) childproof, adult-friendly safety outlets.

e) I want to say B, but my lawyer says D.

Page 30: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

PowerPower

Identify locations of coffee pots, printers, Identify locations of coffee pots, printers, fax machines, and copiersfax machines, and copiers

Identify heat dispersion of equipment in Identify heat dispersion of equipment in equipment roomequipment room

Twist-lock outletsTwist-lock outlets

Power failurePower failure

Some phone sets require AC powerSome phone sets require AC power

Vacuum cord theory of outlet placementVacuum cord theory of outlet placement

Page 31: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

CablingCabling

Category 6 is an approved standardCategory 6 is an approved standardUse same standard from end to endUse same standard from end to endWire voice and data the same if possibleWire voice and data the same if possibleAvoid secondary closetsAvoid secondary closets– Expense (fiber, additional switch, additional UPS)Expense (fiber, additional switch, additional UPS)– Single point of failureSingle point of failure– Traditional phones require direct to controller cablingTraditional phones require direct to controller cabling

Difficult areasDifficult areas– Slab floor (floor boxes, conduit, computer flooring)Slab floor (floor boxes, conduit, computer flooring)– Outlets on cinder block wallsOutlets on cinder block walls– Solid cubicle wallsSolid cubicle walls

Page 32: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

WirelessWireless

Wireless networking requires access pointsWireless networking requires access points– Plan for power and data outletPlan for power and data outlet– Delay purchase as long as possibleDelay purchase as long as possible– Possible personal laptop accessPossible personal laptop access

Cordless phonesCordless phones– Can be great for allowing staff to wander the stacksCan be great for allowing staff to wander the stacks– Have phone vendor test after stacks installed (lots of Have phone vendor test after stacks installed (lots of

metal)metal)– Metal roofing can make radio/emergency system Metal roofing can make radio/emergency system

reception poorreception poor

Radio frequency identification (RFID)Radio frequency identification (RFID)– Affects self check station designAffects self check station design

Page 33: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Furniture DesignFurniture Design

Cables and computers should be neither seen Cables and computers should be neither seen nor heardnor heard

Allow sufficient space for “cable blobs”Allow sufficient space for “cable blobs”

Try to keep design flexible for future Try to keep design flexible for future equipmentequipment

Page 34: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Computer WorkstationsComputer Workstations

Some with backs to walls to increase privacySome with backs to walls to increase privacyCan be attractive with flat panel monitors and compact Can be attractive with flat panel monitors and compact design PCs or thin clientsdesign PCs or thin clientsUsers still need some “personal space”Users still need some “personal space”Need to be able to secure small equipmentNeed to be able to secure small equipmentOn/off switch dilemmaOn/off switch dilemma

Page 35: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Furniture DesignFurniture Design

Put printers and fax machines at service Put printers and fax machines at service desks on sliding flat drawers without lipsdesks on sliding flat drawers without lipsPut cutouts in shelvesPut cutouts in shelvesDesign holes between cabinetsDesign holes between cabinetsConsider flat panel monitors on armsConsider flat panel monitors on armsConsider power adjustable height for Consider power adjustable height for service desksservice desksEnsure ventilation for equipment in Ensure ventilation for equipment in cabinetscabinets

Page 36: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Self Check StationsSelf Check Stations

Defy traditional Defy traditional circulation desk circulation desk designdesign

Page 37: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Self Check StationsSelf Check Stations

Proven to handle 30-80% of circulation Proven to handle 30-80% of circulation transactionstransactions

Part of circulation desk versus standalonePart of circulation desk versus standalone

Locate in an “outbound” traffic patternLocate in an “outbound” traffic pattern

Still require hand holding and burpingStill require hand holding and burping

Page 38: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Security Gate DesignSecurity Gate Design

Avoid gates that call Avoid gates that call out “climb me”out “climb me”

Use wood studs Use wood studs rather than steel near rather than steel near security gates at security gates at public entrancepublic entrance

Page 39: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Security Gate DesignSecurity Gate Design

Often specific requirements per placement of gates, size Often specific requirements per placement of gates, size of conduit for cableof conduit for cable

Use conduit under flooring material rather than thresholdUse conduit under flooring material rather than threshold

Discuss with architects early or you’ll end up with ugly Discuss with architects early or you’ll end up with ugly chains or a potted plantchains or a potted plant

Page 40: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Golden RuleGolden Rule

If you order all of the bells and If you order all of the bells and whistles, be sure you have a whistles, be sure you have a musician on staff.musician on staff.

Page 41: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Automated Materials HandlingAutomated Materials Handling

Machine takes over repetitive Machine takes over repetitive staff tasksstaff tasks– Unloading materials from book Unloading materials from book

dropdrop– Checking inChecking in– Reactivating securityReactivating security– Rough sortingRough sorting– Placing on book truck cartsPlacing on book truck carts– Removing book from holds shelf Removing book from holds shelf

and delivering to customerand delivering to customer

Page 42: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Automated Materials HandlingAutomated Materials Handling

Bring prospective vendors in early to determine Bring prospective vendors in early to determine the most efficient designthe most efficient design– Avoid curves, rises and drops for conveyor beltsAvoid curves, rises and drops for conveyor belts– Need distance to hold materials before processingNeed distance to hold materials before processing– Will there be both inside and outside return/delivery Will there be both inside and outside return/delivery

points?points?– May require air compressorMay require air compressor

Page 43: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Automated Materials HandlingAutomated Materials Handling

Can co-exist in a staff areaCan co-exist in a staff area

Can eliminate the need for a separate Can eliminate the need for a separate book return roombook return room

Can be a fascinating “attraction” for public Can be a fascinating “attraction” for public to watch in actionto watch in action

What happens if it stops working?What happens if it stops working?

Page 44: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Other Influences on DesignOther Influences on Design

Sound domesSound domes

Ceiling-mounted LCD Ceiling-mounted LCD projectorsprojectors

24-hour lockers24-hour lockers

VideoconferencingVideoconferencing

Page 45: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Question #5Question #5

““Whatever you buy today will be replaced Whatever you buy today will be replaced with a newer model ___________”with a newer model ___________”

a) next year.

b) next month.

c) tomorrow.

d) tonight.

e) after I buy it.

Page 46: Building the Perfect Library – Security and Technology Mr. Neal’s Preparing for the S.A.T. March 7, 2003.

Building the Perfect Library – Security and TechnologyBuilding the Perfect Library – Security and Technology

Larry P. NealAssistant Director

Clinton-Macomb Public Library (MI)

[email protected]

(586) 226-5011

See you in Seattle!

Thank you to our sponsors at Gaylord!