Académique Documents
Professionnel Documents
Culture Documents
SLIB 510
Collection Development Policy
Table of Contents
A. Introductory analysis of
school..
3
B. Philosophy statementdivision/school..
4
C. Philosophy statementlibrary..
5
D. Selection
statement
6
E. Acquisitions
statement..
8
F. Gift
statement..
9
G. Cooperative resources and networking
statement.. 10
H. Intellectual freedom
statements... 11
I. Policy and procedure for handling
challenges.
12
J. Technology
statement.
13
K. Policy for evaluation of collection...
....
14
L. Weeding/deselection
statement....
15
M. Policy for revision of the
policy.. 16
N. Appendices
1. Division Policy 6-5.2-School Libraries/Media Centers.
.. 17
2. Library Bill of
Rights... 18
3. Code of Ethics of the American Library
Association.... 19
4. Diversity in Collection
Development.. 21
5.
Privacy
.. 23
6. Division Policy 6-5.7-Complaints Regarding Instructional
B. Philosophy statements-division/school
Mecklenburg County vision statement-Build a model, 21st-century
learning organization that cultivates thoughtful, engaged citizens
prepared to contribute to the prosperity of the County, Commonwealth,
Nation, and World.
Mecklenburg County mission statement-Foster a culture of excellence
where proud students become the craftsmen of beautiful, quality work.
Park View High School mission statement-The mission of Park View
High School is to provide a positive, challenging, teaching/learning
environment. This environment shall foster quality educational,
vocational, and social opportunities that will meet the individualized
needs of students. This mission shall lead to the development of
educationally, culturally, mentally, and socially productive graduates.
The school library program should provide the needed resources,
including print, digital, and media, to attain the necessary 21st-century
skills. These resources should meet the educational and social needs of
the students in the school. The school librarian needs to be prepared to
not only support the educational agenda of the school, but to
contribute to instruction as well.
C. Philosophy Statement-Library
The mission of the Park View High School library is to provide
students and staff with the tools necessary to become critical thinkers,
enthusiastic readers, skillful researchers, and ethical users of
information. (Adapted from Standards for the 21st-Century Learner by
the American Association of School Librarians, a division of the
American Library Association.)
The vision of the Park View High School library is to provide
support for all curriculum standards so that all students can
successfully organize, analyze and interpret information for class work,
as well as encouraging all patrons to become lifelong readers and
learners.
The library mission and vision statements support the school
mission statement by supporting students in both their educational
and recreational pursuits. The school librarian is dedicated to assisting
teachers in any way possible to achieve stated goals by having
appropriate information available for students of all levels.
D. Selection Statement
It is the goal of the Park View High School library to meet the
educational and recreational needs of its patrons. With that in mind,
the librarian takes careful care to cultivate a collection that is as varied
as it is useful. Careful attention must be paid to meet the diverse
needs of the school community.
The Park View High School Librarian is a certified professional
and assumes final responsibility for the selection of materials for the
library collection. Input from other subject-level professionals,
administrators and students will be considered, but final decisions on
selection rest with the librarian. The librarian will consider all requests
made in writing by students and/or faculty (see Section O).
Suggestions and requests will be taken at all times.
The following criteria may be considered when selecting
materials (including print, digital, and media resources) for the
collection of the Park View High School Library:
1. Curriculum
2. Appropriateness for audience
3. Relevancy
4. Accuracy and currency
5. Quality of literature or illustrations
6. Interest level for audience (either student or faculty)
7. Cost in relation to quality
8. Collection as a whole
Additional criteria below may be considered when selecting items:
1. Books (fiction and nonfiction)
a. Appropriate for audience
b. Fulfills diversity in reading levels
c. Attractiveness of book jacket and page set-up
d. Durability
e. E-books-availability/type of readers in school; cost of ebooks compared to print
2. Multimedia (DVDs, CDs, etc.)
a. Appropriate content
b. Access to players
c. High visual and/or sound quality
d. Duration of accuracy
e. Copyright restrictions
3. Periodicals
a. Connection to curriculum
b. Interest/appropriateness to readers
8
c. Frequency of issues
d. Availability of electronic versions
4. Databases and Online Journals
a. Availability of full text
b. Search procedures
c. Access outside of school
d. Accuracy and frequency of updates
e. Subscription through district
When making selections, the librarian will seek out positive
reviews when possible using professional selection aids including, but
not limited to, School Library Journal, Booklist, and The Horn Book. The
librarian also reserves the right to personally review materials for the
collection.
E. Acquisitions Statement
The librarian makes selections of materials for the Park View High
School library alone. All purchases made for the library must meet the
selection criteria set in place by the library selection statement (see
Section D).
Materials may be purchased from a variety of vendors; the
librarian is not limited in the vendors that can be used to purchase.
Vendors will be selected based on criteria that may include cost and
availability of items. The librarian is responsible for keeping a file for
future purchases, based on the needs of the collection and suggestions
made by faculty and students (see Section D). Materials are delivered
directly to the school library and are processed by the librarian.
The librarian will ensure that all purchases will be made by the
required date set forth by the bookkeeper, principal, and/or school
board office. The librarian is required to follow ordering procedures put
in place by the bookkeeper, including filling out the purchase orders
(see Section O).
10
F. Gift Statement
The Park View High School library welcomes gift materials. Gifts
made to the library become property of the library. The librarian cannot
and will not be responsible for returning items not selected for
inclusion in the collection. Gifts with attached conditions will not be
accepted under any circumstances. The librarian also reserves the
right to refuse any gift. Gifts are subject to the same collection criteria
as purchased materials; if the librarian finds that a gift does not satisfy
the selection criteria (see section D), the librarian reserves the right to
distribute the item(s) as he/she sees fit, whether it is to be donated to
classrooms, students, outside charities or disposed of.
Gifts to the library will not be met with any appraisal for tax
purposes from the librarian. Tax values must be attained from the
school bookkeeper.
All gifts made to the library must be accompanied by a
completed gift form (see Section O).
11
12
13
14
11.
The School Board may seek outside advice when reaching
a decision.
12.
The School Board will reach a decision no more than 30
days after the appeal is filed. The decision of the School Board is
final.
The challenged material will not be removed from the school
during the review period. Access to the material may be restricted from
the child of the complainant with a written request.
J. Technology Statement
Park View High School recognizes the need for students to learn
digital literacy. The librarian will support teachers and administrators in
their efforts to embed technology in all forms of learning through
training and collaboration.
Internet access can be found through many computers in the
library. The librarian encourages all students and staff to use the library
to access information on the Internet. Given the limited number of
computers in the library, access is prioritized first to academic pursuits
then to recreational. Students are not to use library computers to
access online gaming, shopping, chat rooms, or any other activities
deemed inappropriate by the library staff and the Mecklenburg County
Acceptable Use Policy. All students and faculty must sign and return
the Mecklenburg County Acceptable Use Policy (see Section O) before
using and hardware or software in the library.
15
16
Sections to be weeded
500, 600, Reference
900, Biography
000, 100, 200, 800
Fiction, Easy
300, 400, 700
17
18
19
20
22
24
Privacy
An Interpretation of the Library Bill of Rights
Introduction
Privacy is essential to the exercise of free speech, free thought, and
free association. The courts have established a First Amendment right
to receive information in a publicly funded library.1 Further, the courts
have upheld the right to privacy based on the Bill of Rights of the U.S.
Constitution.2 Many states provide guarantees of privacy in their
constitutions and statute law.3 Numerous decisions in case law have
defined and extended rights to privacy.4
In a library (physical or virtual), the right to privacy is the right to open
inquiry without having the subject of ones interest examined or
scrutinized by others. Confidentiality exists when a library is in
possession of personally identifiable information about users and keeps
that information private on their behalf.5
Protecting user privacy and confidentiality has long been an integral
part of the mission of libraries. The ALA has affirmed a right to privacy
since 1939.6 Existing ALA policies affirm that confidentiality is crucial
to freedom of inquiry.7 Rights to privacy and confidentiality also are
implicit in the Library Bill of Rights8 guarantee of free access to library
resources for all users.
Rights of Library Users
The Library Bill of Rights affirms the ethical imperative to provide
unrestricted access to information and to guard against impediments
to open inquiry. Article IV states: Libraries should cooperate with all
persons and groups concerned with resisting abridgement of free
expression and free access to ideas. When users recognize or fear
that their privacy or confidentiality is compromised, true freedom of
inquiry no longer exists.
In all areas of librarianship, best practice leaves the user in control of
as many choices as possible. These include decisions about the
selection of, access to, and use of information. Lack of privacy and
25
27
title=5&sec=552a.
5The phrase Personally identifiable information was established in
ALA policy in 1991. See: Policy Concerning Confidentiality of Personally
Identifiable Information about Library Users. Personally identifiable
information can include many types of library records, for instance:
information that the library requires an individual to provide in order to
be eligible to use library services or borrow materials, information that
identifies an individual as having requested or obtained specific
materials or materials on a particular subject, and information that is
provided by an individual to assist a library staff member to answer a
specific question or provide information on a particular subject.
Personally identifiable information does not include information that
does not identify any individual and that is retained only for the
purpose of studying or evaluating the use of a library and its materials
and services. Personally identifiable information does include any data
that can link choices of taste, interest, or research with a specific
individual.
6Article Eleven of the Code of Ethics for Librarians (1939) asserted that
It is the librarians obligation to treat as confidential any private
information obtained through contact with library patrons. See: Code
of Ethics for Librarians (1939). Article Three of the current Code (1995)
states: We protect each library users right to privacy and
confidentiality with respect to information sought or received and
resources consulted, borrowed, acquired, or transmitted. See:
http://www.ala.org/alaorg/oif/ethics.html.
7See these ALA Policies: Access for Children and Young People to
Videotapes and Other Nonprint Formats; Free Access to Libraries for
Minors; Freedom to Read
(http://www.ala.org/alaorg/oif/freeread.html); Libraries: An American
Value; the newly revised Library Principles for a Networked
World; Policy Concerning Confidentiality of Personally Identifiable
Information about Library Users; Policy on Confidentiality of Library
Records; Suggested Procedures for Implementing Policy on the
Confidentiality of Library Records.
8Adopted June 18, 1948; amended February 2, 1961, and January 23,
1980; inclusion of age reaffirmed January 23, 1996, by the ALA
Council. See: http://www.ala.org/work/freedom/lbr.html.
28
29
32
O. Forms
33
34
35
All items donated to the Park View Library become property of the
library. Selection and use of materials is at the discretion of the
librarian.
36
37
38
39
2. Students are prohibited from using the divisions computer network for
sending, receiving, viewing or downloading illegal material via the Internet.
3. The division will provide technology protection measures for the divisions
computer network to filter or block Internet access through such computers,
that prevents users from seeking access to:
a. child pornography as set out in Va. Code 18.2-374.1:1 or as defined
in 18 U.S.C. 2256
b. obscenity as defined by Va. Code 18.2-372 or 18 U.S.C. 1460
c. material that the school division deems to be harmful to juveniles as
defined in Va. Code 18.2-390
d. material that is harmful to minors as defined in 47 U.S.C. 254(h)(7)
(G)
e. material that is otherwise inappropriate for minors
4. Technology protection measures will be enforced during all use of the
Divisions computer network.
5. Computer network and Internet activities will be consistently monitored by
school and division staff.
6. Guidelines have been designed to protect the safety and security of minors
when using electronic mail, chat rooms, and other forms of direct electronic
communications.
7. Guidelines for system security have been designed to prevent unauthorized
online access by students, including hacking and other unlawful activities.
8. Policies have been set forth that prohibit the unauthorized disclosure, use,
and dissemination of personal information regarding all MCPS users.
Computer Network and Internet Guidelines
Parent Notification/Responsibility
Parents and students shall be notified in writing of the school systems Computer
Network, Internet & Photograph Acceptable Use Agreement. The user agrees to
indemnify the School Board for the any losses, costs, or damages incurred by the
School Board relating to or arising out of any violation of these procedures. Parents or
guardians and their child must sign this agreement before the student may
participate in computer network or Internet activity.
Student Responsibility
Access to the computer network and Internet is a privilege, not a right, and with use
comes responsibility. The computer network and Internet is provided for students to
research and communicate with others. Access to network services, including the
Internet is given to students who agree to act in a considerate and responsible
manner. The user agrees to indemnify the School Board for the any losses, costs, or
damages incurred by the School Board relating to or arising out of any violation of
these procedures. Students are responsible for good behavior on the school computer
network or Internet just as they are in a classroom or on school property.
Communications on the network are often public in nature. General school rules for
behavior and communications apply.
Teacher Responsibility
Teachers will provide students with a sequential, structured approach to gaining the
skills that will allow them to become independent, responsible users of the computer
network or Internet. In all classes, teachers will make reasonable effort to ensure that
students are directed to sites with age and topic appropriate materials and resources.
40
1. In K-3, teachers (or other school staff) will actively supervise student use of
the computer network and Internet. Students will only access Internet
resources previously explored by the teacher.
2. In grades 4-5, teachers (or other school staff) will supervise and model
appropriate use of the computer network and Internet. Students will continue
to have computer network and Internet access under direct teacher (or other
school staff) supervision. However, students will experience guided practice
leading toward gaining skills to become independent and responsible users of
the Internet. Teachers will explore an Internet site before directing students to
that site.
3. In grades 6-8, teachers will provide guided practice and model appropriate
use of the computer network and Internet. Teachers (or other school staff) will
supervise student-initiated information-search activities and provide support
for students as they begin to assume responsibility for becoming independent
users of the computer network and Internet.
4. In grades 9-12, students will participate in independent computer network
and Internet use with teachers (or other school staff) serving as advisors and
providing monitoring as appropriate.
School System Responsibility
Individual users of the school divisions computer network and Internet are
responsible for their behavior and communications over that network. It is presumed
that users will comply with standards and will honor the Computer Network, Internet
& Photograph Acceptable Use Agreement they have signed. Beyond teaching and
clarification of such standards, the district is not responsible for restricting or
controlling the communications of individuals utilizing the network. The School Board
is not responsible for any information that may be lost, damaged or unavailable when
using the computer network or any information retrieved via the Internet.
Furthermore, the School Board will not be responsible for any unauthorized charges
or fees resulting from access to the computer network or Internet.
Access to Student Computer Files
Network storage is the property of the school division and can be monitored at all
times. Network administrators, building administrators, and teachers may review files
and communications to maintain the computer networks integrity and ensure that
users are using the computer network and Internet responsibly. Users should not
expect that files stored on district servers to be private.
Restrictions
1. General Network Usage
1. Students will follow all guidelines and rules set forth by their teachers while
using computers on the school network.
2. The Divisions computer network is not a public forum.
3. Users shall be held personally responsible for any electronic communication
created on the computer network.
2. Personal Safety
1. Students will not post personal contact information about themselves or
other people.
2. Students will not conduct online communication with anyone without the
express permission of their teacher. Students will not agree to meet anyone
without their teacher's knowledge and their parent's approval while using the
school's computer network or Internet access.
3. Students will promptly disclose to their teacher or other school employee
any message they receive that is inappropriate or makes them feel
uncomfortable.
41
3. System Security
1. Students will not attempt to gain unauthorized access to any computer
system or go beyond their authorized access. This includes attempting to log
in through another persons account or accessing another persons files.
2. Students will not make deliberate attempts to disrupt the computer
networks system performance or destroy data by spreading computer viruses
or by any other means. These actions are illegal.
3. Students are responsible for their individual user names and passwords and
should take all reasonable precautions to prevent others from being able to
use their accounts. Under no conditions should a user provide his/her
password to another person for any account provided or created by the school
division.
4. Students will immediately notify a teacher if they have identified a possible
security problem.
5. Students will not use any device or service to bypass the safeguards put in
place to protect the end user and the division from harmful and or malicious
content.
4. Inappropriate Language
1. All work performed on school equipment will be free of inappropriate
language, including profanity, on any platform. This stipulation includes, but is
not limited to public messages, private messages, and material posted on web
pages.
2. Students will not post information that, if acted upon, could cause damage
or a danger of disruption.
3. Students will not engage in harassment or personal attacks, including
prejudicial or discriminatory attacks. If a user is told by a person to stop
sending messages, he/she must stop.
4. Students will not knowingly or recklessly post false or defamatory
information about a person or organization.
5. Respect for Privacy
1. Students will respect peoples rights to privacy including not posting private
information about another person.
2. Students will not repost or forward a message that was sent to them
privately without permission of the person who sent the message.
6. Respect for Equipment
1. Students will respectfully use technology equipment for its intended
purpose.
2. No food or drink will be used around equipment.
7. Plagiarism and Copyright Infringement
1. Students will respect peoples rights to ownership including copyright
owners.
2. Students will only use computer software, files or information which they
own or they have been given permission to use.
3. Students will only make copies of computer files and information that they
own or have written.
4. Students will not plagiarize works that they find on the Internet.
5. Students will respect the rights of copyright owners.
8. Inappropriate Network Usage
1. Students will not use the computer network to access material that is
profane or obscene, such as pornography.
2. Students will not use the computer network to access material that
advocates illegal acts, violence, or discrimination towards other people, such
as hate literature.
42
3. Students will not use the computer network to engage in any illegal act,
such as arranging the sale or purchase of drugs or alcohol, engaging in any
criminal activity, or threatening the safety of any person.
4. Student will not use the computer network while access privileges are
suspended or revoked.
Disciplinary Action
Violation of the above rules may result in a loss of computer network and Internet
access, as well as other disciplinary or legal action.
Use of Photographs, Artwork, Videos, and Audio Materials
1. Photographs, artwork, videos, and audio materials will be presented in such a way
to protect the individual student.
2. Photographs, artwork, videos, and audio materials may be used in the newspapers,
television, or the Mecklenburg County Public Schools website only if the
parent/guardian has signed and returned the Mecklenburg County Public Schools
Internet & Photograph Acceptable Use Agreement.
Adopted: May 15, 2000
Revised: August 20, 2001
Revised: September 17, 2001
Revised: May 16, 2005
Revised: September 18, 2006
Revised: May 21, 2007
Revised: June 16, 2008
Revised: June 03, 2010
Revised: July 30, 2012
Legal Refs: 18 U.S.C. 1460, 2256. 47 U.S.C. 254.
Code of Virginia, 1950, as amended, 18.2-372, 18.2-374.1:1, 18.2-390, 22.170.2, and 22.1-78.
If you have questions or concerns about the Computer Network, Internet &
Photograph Acceptable Use Agreement, please contact your childs
principal. A copy of the Mecklenburg County Public Schools Acceptable Use
Policy can be found at www.mcpsweb.org.
43
______________________________
REQUEST BY:
______________________________
44
___________________________________________
______________________________________________________________________________
45
P. Bibliography
Code of Ethics of the American Library Association. (n.d.). Retrieved
from
http://www.ala.org/ala/issuesadvocacy/proethics/codeofethics/codeethi
cs.cfm
Community Profile-Mecklenburg County, Virginia. (n.d.). Retrieved from
http://www.investinmeckva.com/mediaarchive/pdf/MecklenburgCounty-Profile.pdf
Diversity in Collection Development. (n.d.). Retrieved from
http://www.ala.org/advocacy/intfreedom/librarybill/interpretations/diver
sitycollection
Library Bill of Rights. (n.d.). Retrieved from
http://www.ala.org/advocacy/intfreedom/librarybill
Mecklenburg County School Board Policy Manual. (n.d.). Retrieved from
http://mcpsweb.org/wp-content/uploads/MCPS-POLICIES6.pdf
New Collection Development Policy for School Libraries. (n.d.). In
Chicago public schools policy manual. Retrieved from
http://policy.cps.k12.il.us/documents/604.7.pdf
Pine View High School Library Collection Development Policy. (n.d.).
Retrieved from
http://www.pineview.org/uploads/3/8/6/3/3863562/pvhs_library_collecti
on_policy_updated_oct-2010.pdf
Privacy. (n.d.). Retrieved from http://www.ala.org/Template.cfm?
Section=interpretations&Template=/ContentManagement/ContentDispl
ay.cfm&ContentID=103219
Whitefish High School Collection Development Policy. (n.d.). Retrieved
from http://wfps.k12.mt.us/Teachers/Kohnstammd/Collection%20Dev't
%20Policy%20for%20Web.htm
46