ACRL News Issue (B) of College & Research Libraries 4 0 2 / C&RL N e w s ■ J u n e 2 003 ACRL STANDARDS & GUIDELINES Guidelines regarding thefts in libraries Approved by ACRL an d ALA, Jan u ary 2003 by the Security Committee o f ACRL’s Rare Books and Manuscripts Section S ec tion I. P re v e n tin g lib ra ry t h e f t A. A ppoint a Library Security Officer (LSO) T h e LSO sh o u ld b e g iv e n au th o rity b y th e li­ brary an d the parent institution to act o n their behalf w hile w o rk in g w ith th e institution’s legal counsel a n d security force. Consult Section II o f th e ACRL “G uidelines for th e Security o f Rare Books, M anu­ scripts, a n d O th e r Special Collections” fo r a fuller d e s c rip tio n o f th e LSO’s role, av ailab le from th e ACRL office a n d p u b lis h e d in C&RL N ew s (O c to ­ ber, 1999); see also the RBMS Web site/Guidelines. B. Form a secu rity p la n n in g group A security planning group, m ad e u p o f the LSO a n d o th er ap p ro p riate p erso n n el, will b e re sp o n ­ sible for developing a security plan to prevent theft a n d a detailed plan o f action to follow w h e n a theft is d isc o v ered . T h e p la n m a y b e a p a rt o f th e institution’s disaster plan o r constitute a separate plan. T h e pla n s sh o u ld n o t b e pu b lic d o c u m e n ts (e.g., they should not b e posted o n a Web site), bu t acces­ sible o n ly to a p p ro p ria te library a n d institutional personnel. C. C om m unicate w ith th e public relations departm en t E stablish a w o rk in g re la tio n sh ip w ith th e in stitu tio n ’s p u b lic relatio n s office so th a t tim ely a n d accurate an n o u n c e m e n ts can b e m ad e to the press w h e n a theft is discovered. D. C om m u nicate w ith law e n fo r c e m e n t a g e n c ie s Establish contact a n d foster g o o d w orking rela­ tions w ith law enforcem ent agencies— institutional, local, state, a n d /o r federal— a n d determ ine w hich o f th e m h a s original jurisdiction o v e r th e library (e.g., cam pus security, local o r state police, etc.) and u n d e r w hich circum stances th ey should b e called. T he library should m aintain a list of contacts in each level o f law en fo rc e m e n t a n d discuss th e p la n o f action w ith each. (See A ppendix I for “Networking Resources Directory for Protection a n d Recovery.”) The FBI, as w ell as U.S. C ustom s o r Interpol, m ight b e c o m e involved if sto len item s are su s p e c te d of b ein g sm uggled into o r o u t o f th e country. E. Work for in stitu tio n a l and legislative su pp ort 1. Work with th e library’s institutional adm inis­ tration to en su re their s u p p o rt for th e prosecution of thieves. T his support m ay range from th e collec­ tion of evidence, w hich w ould b e shared with pros­ ecutors, to direct participation w ith th e prosecution in preparation for a n d during th e trial. 2. Work with appropriate institutional, local, and state groups to lobby for strengthening o f state laws regarding library thefts an d for diligent prosecution o f such crimes. (See A ppendix II for “Draft o f Model Legislation: Theft a n d Mutilation o f Library Materi­ als.”) F. Report to library- and b o o k an d m an u ­ scrip t-related groups 1. Inform th e local rare b o o k , m anuscript, a n d se c o n d h a n d booksellers o f th e library’s collecting areas an d establish a procedure for quickly inform­ ing th e m o f a n y th eft th a t h a s o c c u rre d in y o u r library. T hieves som etim es try to sell stolen p ro p ­ erty quickly, a n d se lle rs w ith k n o w le d g e o f th e library’s co llectio n s c a n reco g n ize, o r a t least b e suspicious of, these genres o f materials w h e n they are offered. 2. Report the nam e of th e LSO to th e designated m e m b e r o f th e RBMS Security C om m ittee. K eep this p e rs o n in fo rm e d if su c cessiv e LSOs a re a p ­ pointed. 3. Establish liaisons with appropriate Internet elec­ tronic mailing lists a n d national stolen a n d missing b o o k d a tab ases (se e A p p en d ix I for “N etw orking Resources Directory for Protection a n d Recovery”) so th a t thefts c a n b e r e p o rte d im m ediately u p o n discovery. C&RL News ■ June 2 0 0 3 / 403 A b o u t th e g u id e lin e s T he last revision o f th e ACRL “G u idelines Re­ garding Thefts in Libraries” w as published in draft form in C&RL N ew s 5 5 ,5 (1994) a nd approved in J u n e o f th at year, just p rio r to th e ALA A nnual Conference. Just p rior to the 1999 ALA A nnual Conference, the ACRL Standards a n d Accredita­ tion C om m ittee a n d th e RBMS Executive Com ­ m ittee a sk e d th e RBMS Security C om m ittee to notify them w hether the guidelines required revi­ sion. After a review a n d d iscussion o f the 1994 guidelines at the Security Committee’s m eeting at the 1999 Annual Conference, both the ACRL Stan­ dards and Accreditation Committee and the RBMS Executive Committee were notified that the guide­ lines w o uld b e revised. The guidelines w ere fur­ ther discussed a nd revised by the Security Com­ G. Know and im plem ent preventive se­ curity measures in the library 1. Im plem ent the ACRL “Guidelines for the Se­ curity of Rare Book, Manuscript, and O ther Special Collections” (1999), available from the ACRL office a n d p u b lished in C&RLNews(see RBMS Web site/ Guidelines). 2. Ensure that a unique ownership mark appears o n all o f th e library’s holdings; this will p ro v id e proof that materials, if stolen, belong to the library. RBMS strongly advocates the im plem entation of its m arking g u idelines for rare m aterials (se e ACRL “G uidelines for th e Security o f Rare Book, M anu­ script, a nd O ther Special Collections,” Appendix I.). RBMS also strongly advocates describing distinctive characteristics o f individual c opies in cataloging notes as a nother m eans o f identifying appropriate items. 3. W hen providing com plete catalog records at the p o in t o f receip t is n o t possible, som e form of ownership record, how ever brief, is recom mended. It should contain a brief author/title statement and a description o f at least several copy-specific features (e.g., binding, m arks o f previous ow nership, com ­ pleteness, and bookseller and auction house descrip­ tions). T hese records o f purchase, gift, a n d p rov­ enance are especially important w hen materials are going to b e ad d ed to a cataloging backlog. 4. Eliminate cataloging backlogs. T hough diffi­ cult, this is a n essential step in enhancing the secu­ rity o f a library’s collections. Even if th e b a cklog c annot b e entirely elim inated, each library should reduce its backlog as m uch as it can. Stolen books that have b een described in detail are far m ore easily identified a nd recovered than those that are not. Use mittee at the 2000 Midwinter Meeting and the 2000 Annual Conference. In January 2001, a draft ver­ sion w a s m o u n te d o n th e RBMS W eb site a n d public com m ents sought. A public hearing w as h e ld o n Ja n u a ry 20, 2002, at w h ic h additional changes w ere proposed. Some o f the p ro p o se d changes w e re incorporated in th e draft version su b seq u e n tly p u b lish e d in C&RL News in May 2002. At its June 17, 2002, m eeting, the RBMS Se­ curity Committee approved the revised version as p u b lish ed in C&RL News. At th e ALA M idw inter M eeting in Philadel­ phia (January 2003), the ACRL Standards a nd Ac­ creditation Committee, the ACRL Board, and the ALA Standards a n d Review Committee formally approved the guidelines, and that version is p u b ­ lished here. the catalog record to describe copy-specific charac­ teristics a n d bibliographic information that helps to distinguish am ong editions, issues, and states. Create m achine-readable records for local public access and the national bibliographic databases. Participate in bibliographic projects that record detailed biblio­ graphic descriptions. 5. Conduct regular inventories o f both cataloged and uncataloged collections. This task is m ost effec­ tively performed by staff m em bers working in teams a nd should be c o n ducted o n a random basis. Pro­ ceeding through the collection in a predictable m an­ ner is not wise, since it m ay allow thieves to tem po­ rarily replace stolen materials. A sim ultaneous in­ ventory o f shelf list cards is also recom m ended, if this is n o t alread y a p a rt o f th e p ro c e d u re b e in g followed. Inventories conducted even in small stages are valuable since they m ay reveal thefts (as well as m isshelved books) a nd serve as a d eterrent to any potential in-house thieves. 6. In special collections, record and verify (with photo ID) every user’s name and address, and require them to com plete a p a p er or electronic callslip and registration form, a n d to sign a reading room log. W hether h o u se d in the collection o r in the institu­ tional archive, such docum ents should b e kept per­ m anently in o rd e r to b e available to law enforce­ m ent authorities if thefts or vandalism later com e to light. In o rder to safeguard reader confidentiality, access to filed or archived callslips sh o u ld b e re­ stricted to the collection curator, division chief, and library director. Library policies a nd practices, espe­ cially in the course o f investigating possible thefts, should not violate applicable federal, state, and local confidentiality laws. LSOs should b e familiar w ith 404 / C&RL N e w s ■ J u n e 2003 all applicable laws governing personally identifiable information ab o u t library use. 7. Follow th e m a n a g e m e n t p ractices reco m ­ m e n d e d in th e ACRL “S tandards for Ethical C on­ duct for Rare Book, Manuscript, a n d Special Collec­ tions Librarians, w ith G uidelines for Institutional Practice in Support o f th e Standards,” 2nd edition, 1994, available from the ACRL office, published in C&RL N ew s 54:4 (April 1993), a n d p o ste d o n the RBMS Web site. 8. Review materials in the library’s general collec­ tions and o p en stacks for possible transfer to special collections or to a caged, limited access section of th e library. Library staff sh o u ld consult th e ACRL “G uidelines on the Selection o f General Collection Materials for Transfer to Special Collections,” 2nd edition, available from th e ACRL office a n d p u b ­ lished in C&RL News 5 4 :ll (D ecem ber 1993; revised o n June 23,1999, and posted on the RBMS Web site). Some libraries have identified rare materials in the o p en stacks in the course of special projects, such as rep o rtin g to th e English Short Title C atalogue, or w orking through a collection d evelopm ent policy using the Research Libraries G roup Conspectus. 9. A recent theft or act o f vandalism may give an indication o f a building area, subject, o r artifactual genre that will b e the target o f future theft o r m uti­ lation. If it is appropriate, transfer to a m ore secure area materials related to those already stolen or m u­ tilated. Remember that subject relationships may cross genre lines. The theft or mutilation o f printed books o r m anuscripts m ay indicate th at o th e r g e n re s o f materials containing similar subject m atter will b e ­ com e th e targets o f thieves an d vandals. 10. Maintain a shelflist, preferably in p a p e r form for special collections, in a secure area o f the library. If the shelflist is electronic, it sh o u ld be eq u ip p e d w ith software that m akes it secure from tam pering a n d b e duplicated in a back u p tap e stored off-site. Since the shelflist tells the librarian precisely w here each book, pam phlet, tape, CD should b e located, a n d because it contains copy-specific inform ation about special collections materials, its maintenance a n d security are vital for detecting a n d recovering thefts. 11. Reader u se o f materials should b e confined to a secure area m o n ito red b y staff trained in sur­ veillance. C onsult th e ACRL “G u id elin es for th e Security o f Rare Books, Manuscripts, and O ther Spe­ cial Collections,” Section IV, for additional gu id e­ lines related to reading room security. 12. Install security cameras that cover special col­ lections reading room s a n d any access points that security professionals deem appropriate. If security cam eras u se tapes, these sh o u ld b e retained for at least one month. 13. In conformity with applicable laws, formulate a policy regarding the physical detention of suspects. Section II. Reacting to library theft Every case o f theft p o se s u n iq u e challenges, a n d many details of a library’s response to a theft must be left to th e ju d g em en t o f its LSO a n d its Security Planning Group. However, these are the general guide­ lines that ACRL recom m ends. A. If y o u o b serve o r h ave b e e n alerted to a th eft in p rogress Im m e d ia te a c tio n s • D iscreetly call for security p e rso n n e l o r the police (or signal a colleague to d o so) and engage the suspect in non-tthreatening conversation in the hope th at th e su s p e c t will rem ain in th e read in g ro o m until h elp arrives. • D o n o t confront a su sp ect w ith accusations. B ehave w ith th e su s p e c t as y o u w o u ld w ith any patron, requesting that circulated materials b e re­ tu rn e d befo re th e su s p e c t leaves. If m aterials are missing, politely ask for them. The suspect may have m ade an honest mistake. If the suspect denies that s / h e ever had the materials o r that they w ere returned, d o not press the issue a n d d o not p u t yourself at risk o f physical harm. Follow your local policy regard­ ing the physical detention o f suspects. • If the suspect is about to leave and help lias not yet arrived, try to verify h is/h e r registration infor­ m ation (e.g., contact a listed reference or call infor­ m ation to verify a residential address) before s/h e leaves. • If a police officer finds reasonable cause that a theft has occurred, insist th at th e officer place the suspect u n d e r arrest. (Laws regarding gro u n d s for arrest vary from state to state. Know the relevant laws o f y o u r state.) If th e re is e v id en ce o f theft, (e.g., library materials hidden o n the suspect’s person), do no t agree to th e su sp ect’s release in return for the su s p e c t’s assu ran ces th at s /h e will re tu rn to face charges. If th e officer will n o t m a k e an arrest, at­ tem pt to persuade th e officer to detain th e suspect until the officer can verify his/her identity and place o f residence. • At the first opportunity, describe in writing the suspect’s physical appearance a n d an account of the entire event as witnessed and / o r related. This docu­ m ent should b e presen ted to law enforcem ent au­ th orities w h e n they arrive. D o no t in any w ay alter materials that might b e considered evidence. • Notify the LSO. B. If y o u d isc o v e r a th eft after it has o c ­ curred N o tific a tio n Immediately notify th e LSO w h o will: C&RL News ■ June 2 0 0 3 / 405 • Notify a p p ro p ria te adm inistrative officers. • Notify a n d serve as liaison w ith institutional security personnel as well as local law enforcement personnel. • Notify institutional public relations office. G a th e rin g e v id e n c e T he LSO w ill c o m pile a list o f m issing item s. (This does not m ean that the entire library or collec­ tion n e ed s to b e inventoried.) H ow ever, after the immediate steps listed below have b e e n taken, it is suggested that works similar to those that have been stolen be inventoried (See Section I.G.9). In consulta­ tio n w ith th e a b o v e g ro u p s o f n o tified persons, gather all available evidence of theft. Such evidence should include: • Detailed, copy-specific descriptions o f miss­ ing materials. • Chain o f custody docum entation for missing m aterials (in clu d in g callslips or p h o to c o p ie s o f them). • Indications of unauthorized physical access to restricted areas. • Report o n any missing shelflist cards a n d call slips, and database tampering. • Report on any indication of systematic patterns of loss o f materials. A c tio n p l a n The LSO, in concert with appropriate library and institutional administration personnel, public rela­ tions personnel, security personnel, law enforce­ m ent (local, state, and federal, if necessary), and legal counsel will formulate a course o f action that should include the following steps (in an order to b e deter­ m ined by those responsible for the process): • C onsultation a n d c o o p e ra tio n w ith judicial a n d la w e n f o rc e m e n t e ffo rts o n b e h a lf o f th e library. • Notification of appropriate stolen a nd missing books, databases, a nd other appropriate netw orks (see A ppendix I for N etworking Resources Direc­ tory for Protection a nd Recovery). • Notification of local a n d regional booksellers and appropriate specialist sellers. • Transfer o f vulnerable items to a m ore secure location. • Arran g em en t o f appraisals u p o n discovery of missing items and, again, if they have b een returned damaged. • Q uestioning of staff regarding any suspicious behavior by users o r other persons. • Preparation of regular communications to staff a b o u t p ro g ress in th e case, c o nsistent w ith the investigation’s integrity. • Preparation of new s releases. • Preparation of responses by authorized library a n d institutional representatives to p ossible q ues­ tions p osed by the new s media. • Instructions to all library a nd institutional staff o n h o w to respond to new s m edia inquiries. • Maintenance of internal record o f actions taken during the case’s progress, from its discovery to its final disposition. A P P E N D IX I Networking resources directory for protec­ tion and recovery Intemational Association of Professio n a l Securi ty Consult­ ants. http://www.iapsc.oig; (949) 640-9918; fax: (949) 640-9911. Includes listing o f professional security consultants w ith varying areas o f expertise. Mem­ bers o f th e organization cannot sell anything or rep­ resent a ny security firm. “Library Security Resources: A Bibliography, ”http:// w w w .lib r a r y r e f e r e n c e .o rg /s e c u r ity .h tm l. Al­ th o u g h som ewhat dated, this bibliography includes d o z en s o f articles from various sources related to library security. ACRIARBMS Security Committee, c /o American Li­ brary Association, 50 E. Huron St. Chicago, IL 606l1; phone: (800) 545-2433, ext. 2516; fax: (312) 440-9374; e-mail: ala@ala.org; homepage: http://www.ala.org. RBMS homepage: http://www.rbms.nd.edu. Both ALA a n d ACRL have several publications related to d e ­ signing a library security program. Society o f American Archivists. 527 S. Wells, Chicago, IL 60607; phone: (312) 922-0140; fax: 6 1 2 ) 347-1452; e- mail: sfox@ archivists.org; h o m e p a g e : h t t p : / / w w w .archivists.org. This organization has several books in print o n special collections/archives secu­ rity. It also has a security-related discussion list at saasecurity-l@cornell.edu. This list is o p e n only to SAA members, however. Library Security Officers List. Susan Allen, moderator. Closed non-discussion electronic list for theft reporting and limited to library security officers only. For information contact the owner at e-mail sallen@getty.edu E xlib ris e le c tr o n ic d is c u s s io n list: E x lib ris@ library.berkeley.edu. Electronic discussion list o pen to subscribers only, but subscription open to all. Has extensive w e b archives that include security topics available at http://palim psest.stanford.edu. For fur­ ther information, contact m oderator Everett Wilkie at e-mail: ewilkie@ix.netcom.com. http://www.iapsc.oig http://www.libraryreference.org/security.html mailto:ala@ala.org http://www.ala.org http://www.ibms.nd.edu mailto:sfox@archivists.org http://www.archivists.org mailto:saasecurity-l@comell.edu mailto:sallen@getty.edu libraiy.berkeley.edu http://palimpsest.stanford.edu mailto:ewilkie@ix.netcom.com 406 / C&RL News ■ June 2003 Archives & Archivists Electronic Discussion list. Often includes discussions about library security. Archives are available at the host site. Address for posting is archives@listserv.muoh io.edu. Subscription address is listserv@listserv.muoh io.edu. A PPEN D IX II The draft o f p ro p o se d legislation p re se n te d b elo w m ay h ave to b e m odified in o rd e r to conform w ith federal a n d state law s regarding search a n d seizure. Also, th e reco u rse to civil law th at is available to a detain ed suspect m ay differ from state to state, a n d th e draft leg islatio n m a y h a v e to b e m o d ifie d in o rd er to m eet su c h potential challenges. H ow ever, th e w ording definitions should b e a d h ered to; they h av e b e e n form ulated w ith th e assistance o f legal co u n sel. N atio n w id e conform ity to th e definition o f essen tial term in o lo g y in crim inal legislation is desirable. Draft o f m o d e l legislation : Theft a n d m uti­ la tio n o f lib rary m aterials D e c la r a tio n o f p u r p o s e B ecause o f th e rising incidence o f library theft an d m utilation o f library m aterials, libraries are suffer­ ing serious losses o f b o o k s a n d oth er library p ro p ­ erty. In ord er to en su re that research m aterials are available for public use, it is th e policy o f this state to provide libraries an d their em ployees an d agents w ith leg al p ro te c tio n to e n s u re se c u rity fo r th e ir collections. It is th e policy o f this state to affirm that local, state, a n d federal prosecution o f crim es affect­ ing b o oks o r other library property is executed with the sam e degree of diligence as is exercised in pros­ e c u tio n o f crim es affecting o th e r fo rm s o f p r o p ­ erty. Federal statute pertaining to stolen property is designed no t only to im plem ent federal-state coop­ era tio n in ap p re h e n d in g a n d p u n ish in g crim inals w h o utilize, o r c a u s e to b e utilized, c h a n n e ls o f interstate com m erce for transportation o f property o f w h ich the ow n er has b e e n wrongfully deprived, b u t also to d eter original theft. D e fin itio n o f te r m s “Library” m eans any public library; any library o f an educational, benevolent, hereditary, historical, o r el­ eem osynary institution, organization, or society; any m u se u m ; a n y repository o f pu b lic o r institutional reco rd s. “B o o k o r o th e r library p ro p e rty ” m ean s any book, plate, picture, photograph, print, painting, drawing, map, newspaper, magazine, pamphlet, broad­ side, m anuscript, d o cu m en t, letter, pu b lic record, m icroform , so u n d recording, audiovisual material in any format, magnetic or other tape, catalog card or catalog record, electronic d ata pro cessin g record, artifact, o r o th e r do cum entary, w ritten, o r p rin te d materials, o r equipm ent, regardless o f physical form o r characteristics, belonging to, o n loan to, o r other­ wise in th e custody o f a library. P ro p o se d w o r d in g S ection I.a. Any p erso n w h o willfully, maliciously, o r w a n ­ tonly writes u p o n , injures, defaces, teats, cuts, muti­ lates, o r destroys an y b o o k , do cu m en t, o r oth er li­ b rary pro p e rty b elo n g in g to, o n lo a n to, o r o th er­ w ise in th e custody o f a library is guilty o f a crime. S ectio n I.b. T h e w illful c o n c e a lm e n t o f a b o o k o r o th e r library property u p o n the perso n or am ong th e b e ­ longings o f th e p erso n o r co n cea le d u p o n th e p e r­ so n o r am o n g th e belongings o f an o th er w hile still o n th e p re m ise s o f a library shall b e c o n s id e re d p rim a facie e v id e n c e o f in te n t to co m m it larceny thereof. S ectio n I.c. Tire willful rem o v al o f a b o o k o r o th e r library property in contravention of library regulations shall b e c o n s id e re d p rim a facie e v id e n c e o f in te n t to com m it larceny thereof. S ectio n I.d. T h e w illful alteratio n o r d e s tru c tio n o f library ownership records, electronic or card catalog records retained apart from o r ap p lied directly to a b o o k or o th e r library p ro p e rty shall b e c o n s id e re d prim a facie e v id e n c e o f in te n t to co m m it la rc e n y o f a b o o k o r o th er library property. S ectio n Il.a. An ad u lt a g e n t o r em p lo y ee o f a library o r that library’s p aren t institution, w h e th e r o r n o t that em ­ ployee o r ag en t is part o f a security force, w h o has reasonable g ro u n d s to su sp ect that a p e rso n co m ­ mitted, w as committing, o r w as attem pting to com ­ m it th e acts d e s c rib e d in Section I m ay d e ta in th e su spect. Im m ediately u p o n d eten tio n , th e library e m p lo y e e shall identify him se lf/h e rse lf a n d state th e re a s o n fo r h is /h e r ac tio n . If, a fte r th e initial co n fro n tatio n w ith th e suspect, th e ad u lt a g e n t o r library e m p lo y e e h as re a s o n a b le g ro u n d s to b e ­ lieve th at at th e tim e o f d e te n tio n th a t th e p e rs o n com m itted, w a s com m itting, o r w a s attem pting to co m m it th e crim es se t forth in Section I, sa id e m ­ ployee o r agent m ay detain such a p erso n for a time sufficient to su m m o n a p e a c e officer to th e library. Said dete n tio n m ust b e accom plished in a reaso n ­ a b le m a n n e r w ith o u t u n re a s o n a b le restra in ts o r e x c e s siv e fo rc e a n d m a y ta k e p la c e o n ly o n th e p re m is e s o f th e library w h e re th e a lle g e d crim e o ccu rred . Library prem ises in clu d e th e interior of a building, structure, o r o th er enclosure in w h ich a library facility is located; th e exterior appurtenances to su c h building structure, o r o th e r enclosure; a n d mailto:archives@listserv.muoliio.edu mailto:listserv@listserv.muoliio.edu C&RL News ■ June 2 0 0 3 / 407 the land o n w hich such building, structure, or other enclosure is located. Any person so detained by an em ployee o r a g en t o f a library shall prom ptly be a sk e d to identify h im s e lf/h e rs e lf b y n a m e a n d address. O n c e p la c e d u n d e r d e te n tio n , th e su s­ p e ct shall n o t b e re q u ire d to p ro v id e a ny o th e r inform ation n o r shall any w ritten a n d /o r signed sta te m e n t b e e lic ite d fro m th e s u s p e c t u n til a police officer h as tak e n the suspect into custody. The said em ployee or agent may, however, exam ­ ine said p ro p e rty w h ic h th e e m p lo y e e o r a g en t has re a so n a b le g ro u n d s to b e lie v e w a s u n la w ­ fully ta k e n as se t forth in Section I.b a n d /o r I.c, or injured o r de stro y ed as set forth in Section I.a a n d /o r I.d. Should the d e ta in ed suspect refuse to surrender the item for exam ination, a search m ay be m ad e only o f packages, sh opping bags, h a n d ­ bags, o r o th er p ro p erty in the im m ediate p o sses­ sion o f th e p e rs o n d e ta in e d ; n o c lo th in g w o rn by the suspect m ay b e searched. T he activation o f a n electronic article surveil­ lance device as a result of a person exiting the pre­ m ises or an area w ithin the prem ises o f a library w here a n electronic article surveillance device is located shall constitute probable cause for the de­ tention o f such p e rso n by such library or agent or employee o f the library, provided that such person is detained only in a reasonable m anner and only for such tim e as is n e ce ssa ry for a n inquiry into the circum stances su rro u n d in g the activation o f the device, a n d provided that clear and visible notice is posted at each exit and location within the premises w here such device is located indicating the pres­ ence o f a n anti-theft device. For p u rp o se s o f this section, “electronic article surveillance d e vice” m eans an electronic device designed a nd operated for the p u rp o se o f detecting the rem oval from the premises or a protected area within such premises, of any specially m arked o r tagged b o o k o r o ther library property. Section H.b. For the p u rp o se s o f Section Il.a, “re aso n a b le grounds” shall include, but not be limited to, knowl­ edge that a person has concealed or injured a book or o ther library property while o n the prem ises of the library or the inability of the suspect to produce the library m aterial for w hich there is a docum ent proving that person h ad u sed but h ad not returned said material. Section II.c. In detaining a person w ho the employee or agent of the library has reasonable grounds to believe has committed, w as committing, or w as attem pting to commit any of the crimes set forth in Section I, the said employee or agent may use a reasonable amount of non-deadly force w hen and only w hen such force is necessary to protect the em ployee or agent or to prevent the escape of th e person being detained or the loss of the library’s property. Section III. An a dult a g en t o r e m p lo y e e o f a library w h o stops, detains, a n d /o r causes the arrest of any per­ son p u rsuant to Section II shall n o t b e h e ld civilly liable for false arrest, false im prisonm ent, unlaw ­ ful detention, assault, battery, defam ation o f char­ acter, m alicious p rosecution, or invasion o f civil rig h ts o f th e p e rs o n s to p p e d , d e ta in e d , a n d /o r arrested, p rovided that in stopping, detaining, or causing th e arrest o f the p e rso n , th e ad u lt a gent o r e m p lo y e e h a d at th e tim e o f th e sto p p in g , d e te n tio n , o r a rre st re a s o n a b le g ro u n d s to b e ­ lieve th at th e p e rs o n h a d com m itted, w a s c o m ­ m itting, or w as a ttem pting to com m it a n y o f the crim es set forth in Section I. Section IV. T he fair m arket value o f p ro p e rty affected by crimes set forth in Section I determ ines the class of offense: value under $500 constitutes a misdemeanor; $500-$5,000 a Class I felony; above $5,000, a Class II felony. The aggregate value of all property referred to in a single indictment shall constitute the value thereof. Section V. A copy or abstract of this act shall be posted and prom inently displayed in all libraries. Section VI. This act shall take effect u pon passage. A P P E N D IX III Related publications A ssociation o f C ollege a n d R esearch Libraries. “G uidelines for the Security o f Rare B ook, M anu­ script, and other Special Collections.” In C&RL News (October, 1999, a nd posted o n the RBMS Web site). A ssociation o f C ollege a n d R esearch Libraries. “Guidelines o n the Selection of General Collection Materials fo r Transfer to Special C ollections.” In C&RL News 54:11 (D ecem ber 1993; revised o n 23 June 1999, a nd posted o n the RBMS Web site). Association of College a nd Research Libraries. “Stan­ dards for Ethical C o nduct o f Rare B ook, M anu­ script, a n d Special Collections Libraries an d Librar­ ians, w ith G uidelines fo r Institutional Practice in Support of the Standards.” In C&RL News 54:4 (April 1993), a nd posted o n the RBMS Web site. Society of American Archivists. Libraries a n d Archives: A n Overview o f Risk a n d Loss Prevenlion(l9)4). Society of American Archivists. Protecting Your Collec­ tions: A M anual of Archival Security (1995). ■ 408 / C&RL News ■ June 2003