June 11,, 2009

advertisement
CTSC
June 11, 2009 notes:
Present: Dorsch (on phone), Fiscella (chair), Schuitema, Webb.
Books with licenses or passwords
The library is acquiring a number of books that are supplemented by a related
website; access to the website may be regulated by license and or user name and password.
The related web site may hold essential information such as data that can be manipulated
or problem sets; it may duplicate book information; it may be supplementary or enrichment
material. In some cases the vendor’s selection information may give no indication or only a
general indication of the related website.
These books raise at least two issues. One is legal: any book with a license obligates
the library to its terms (which we do not know at purchase). In general, only one person
can set up the password.
A related issue is that the first user to access the website will be the only one that
can use it.
Joan Schuitema reported that conversation among technical services librarians
indicate that bigger libraries make no attempt to enter specific information in the book
record, due to the labor required to examine and identify books with restrictions and enter
information in the record. If license and password information is regulated, it is often done
by reference librarians, sometimes as separate files and sometimes by entering non-public
information into the holdings record.
Jo Dorsch reported that LHS librarians have been blacking out name and password
on the book itself and entering them into a non-public note in the record. This allows the
staff doing reference to get to the information if it is needed.
Decision/Conclusion:
Flexibility is the main principle in dealing with books that come with licenses or passwords.
Purchases: such books may be deliberately purchased or selected without
knowledge of the additional restricted online access.
License or password may be found in regular processing or
License or password is brought to our attention: any UIC library may choose to
develop a procedure to hide the access info in a non-public note in the record. If it is to be
included in the online record, please consult with Daley Technical Services staff for
standard content and coding. The password may be used by a reference/info services
librarian at the desk, but may not be shared through the record or given to a user.
Update on WECT
In addition to information on the Blackboard course site (WORKFLOW EFFICIENCY
COORDINATING TEAM course): the team is looking at models that Schuitema provided for
organization of cataloging and acquisitions departments.
We understand that Majors and Yankee are looking at the possibility of sharing information,
so that we might continue to take advantage of the Majors selection services and the
processing and promptcat records services of YBP..
CARLI load of large loads of records
CARLI does the record loads for each of the member libraries. Such loads include
PromptCat records and MARC records for large e-resources collections such as Springer
books and ECCO with many thousands of records. CARLI reports that it can currently load
only 2,000 records per night. This limitation is beginning to prevent timely addition of
records into CARLI members’ catalogs. There are implications for our users being able to
identify and get to the resources. Joan Schuitema continues to look for ways to address the
issue.
Changes in Serials Solutions also requires us to capture records from their system before
they migrate to a new system; the changeover is to be by September.
CTSC looking forward
CTSC has been primarily a project related group, addressing standards and policies. It has
looked at priorities for cataloging, assessment of potential for digitization projects, and
interactions among Acquisitions, Cataloging, and Collections Development. The WECT
process and Google planning have taken over some activities that might have otherwise
found a home in CTSC. As we move forward, we will consider projects or directions that
arise out of the Library’s strategic plan. Public services perspective and communication are
essential.
Download