Library Security: The Basics and Beyond

14
SYDNEY MCCOY BRANCH ADMINISTRATOR C.BURR ARTZ PUBLIC LIBRARY FREDERICK COUNTY PUBLIC LIBRARIES Library Security: The Basics and Beyond

description

Library Security: The Basics and Beyond. Sydney McCoy Branch Administrator C.Burr Artz Public Library Frederick County Public Libraries. Preventing Escalation. Assess situation Be calm and non-threatening Non-judgmental stance Listen Use their name Clarify messages. - PowerPoint PPT Presentation

Transcript of Library Security: The Basics and Beyond

Page 1: Library Security: The Basics and Beyond

SYDNEY MCCOYBRANCH ADMINISTRATOR

C.BURR ARTZ PUBLIC LIBRARYFREDERICK COUNTY PUBLIC LIBRARIES

Library Security: The Basics and Beyond

Page 2: Library Security: The Basics and Beyond
Page 3: Library Security: The Basics and Beyond

Preventing Escalation

Assess situation Be calm and non-threatening Non-judgmental stance Listen Use their name Clarify messages

Page 4: Library Security: The Basics and Beyond

Keep em’ happy

Hear the customer outDon’t argueShow you are sorryWin them over with empathyStart your investigationFind out what the customer wantsExplain what you can and cannot do Set up a planTake actionCheck back with the customer

Page 5: Library Security: The Basics and Beyond

Behavior Policy

Behavior Policy What should it include? What should it not include? How much is too much? Do I need a separate Internet Policy? Is it enforceable?

FCPL's Policy

Page 6: Library Security: The Basics and Beyond

Importance of Consistency in Enforcement

All patrons should be treated equally Patrons travel from branch to branchTreat teens with same standards as adultsIf it violates policy don’t ignore it

Page 7: Library Security: The Basics and Beyond

Incident Report

A formal way to document safety and security issues

A formal tool to pass issues up the line to administration

In some situations a way to pass on situations to risk management and Police Departments

FCPL Form

Page 8: Library Security: The Basics and Beyond

Each branch in the system has a blog. Blogs are used to track security issues and communicate all potential issues. It is also used to announce bannings.

Page 9: Library Security: The Basics and Beyond

Consistent Banning Procedure

Librarian in Charge is only one authorized to ban a patron

FCPL Banning ProcedureOnly offenses outlined in Behavior or Internet

Policy are grounds for banningCommunication happens instantlySample LetterHow we enforce banning (the cold hard

truth)

Page 10: Library Security: The Basics and Beyond

Banned Patron Log

Updated as needed on system-wide intranet.

When a patron is banned from one branch they are banned from the entire system.

Page 11: Library Security: The Basics and Beyond

Examples of Behaviors:

Public intoxicationIllegal substancesLewd behaviorWeaponsPublic outbursts, due to patrons with mental

health issuesTheftTampering with equipmentDomestic situations that occur inside the library.

Abuse, divorce, custody issues, distraught (sometimes suicidal) patrons

Page 12: Library Security: The Basics and Beyond

Benefits

Continue to learnCommunicationNetworkingSafety Staff MoralAwarenessSupportEmergency Preparedness

Page 13: Library Security: The Basics and Beyond
Page 14: Library Security: The Basics and Beyond

Questions