Art Deaccessioning Policy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Direct Care of Collections Ethics, Guidelines and Recommendations
Direct Care of Collections Ethics, Guidelines and Recommendations March 2019 Update Direct Care of Collections: Ethics, Guidance and Recommendations March 2019 For 25 years the Code of Ethics for Museums and accounting standards have been out of alignment regarding the use of proceeds from the sale of deaccessioned collections. The Financial Accounting Standards Board (FASB) updated its standard to bring the two into alignment: allowing for direct care as well as acquisition. The ethical principles regarding responsible governance and collections stewardship have not changed. In light of the updated FASB standard noted below, however, a museum should revise its collections management policy, as needed, to disclose its use of proceeds and its definition of direct care (if allowed). These disclosures are additions to the recommendations for Creating an Institutional Policy on page 8. The decision-making tools (pages 9-11) remain relevant guidelines for a museum to define “direct care of collections” depending on its mission, discipline and specific circumstances. Accounting Standards Update The Financial Accounting Standards Board (FASB) updated Topic 958, Definition of Collections (previously addressed in FASB 116) in March 2019. The update was made to align it with AAM’s Code of Ethics for Museums regarding the use of proceeds from the sale of deaccessioned objects. The updated standard permits museums not to recognize as revenue, nor capitalize, “contributions of works of art, historical treasures, and similar assets” if the donated items meet all of the following criteria: “a. They are held for public exhibition, education, or research in furtherance of public service rather than financial gain. -
Digital Preservation Workflows for Museum Imaging Environments
The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA From: Principles and Practices of Robust, Photography-based Digital Imaging Techniques for Museums. Contributors: Mark Mudge, Carla Schroer, Graeme Earl, Kirk Martinez, Hembo Pagi, Corey Toler-Franklin, Szymon Rusinkiewicz, Gianpaolo Palma, Melvin Wachowiak, Michael Ashley, Neffra Matthews, Tommy Noble, Matteo Dellepiane. Edited by Mark Mudge and Carla Schroer, Cultural Heritage Imaging. The 11th International Symposium on Virtual Reality, Archaeology and Cultural Heritage VAST (2010) A. Artusi, M. Joly, D. Pitzalis, G. Lucet, and A. Ribes (Editors) This is a pre-print copy of a paper that is currently under review. Please respect the intellectual property of the authors and the efforts of the publishers and reviewers until its publication. If you find any errors that need modification please contact the author at [email protected]. Meanwhile this pdf is distributed to interested readers under a Creative Commons 3.0 license. M. Ashley / Digital Preservation Workflows For Museum Imaging Environments Digital preservation workflows for museum imaging environments Michael Ashley1 1 Cultural Heritage Imaging, San Francisco, California, USA Abstract We discuss and demonstrate practical digital preservation frameworks that protect images throughout the entire production life-cycle. Using off the shelf and open source software coupled with a basic understanding of metadata, it is possible to produce and manage high value digital representations of physical objects that are born archive- ready and long-term sustainable. -
Introducticn Tc Ccnservoticn
introducticntc ccnservoticn UNITED NATTONSEDUCATIONA],, SCIEIilIIFTC AND CULTIJRALOROANIZATTOII AN INIRODUCTION TO CONSERYATIOI{ OF CULTURAT PROPMTY by Berr:ar"d M. Feilden Director of the Internatlonal Centre for the Preservatlon and Restoratlon of Cultural Property, Rome Aprll, L979 (cc-ig/ws/ttt+) - CONTENTS Page Preface 2 Acknowledgements Introduction 3 Chapter* I Introductory Concepts 6 Chapter II Cultural Property - Agents of Deterioration and Loss . 11 Chapter III The Principles of Conservation 21 Chapter IV The Conservation of Movable Property - Museums and Conservation . 29 Chapter V The Conservation of Historic Buildings and Urban Conservation 36 Conclusions ............... kk Appendix 1 Component Materials of Cultural Property . kj Appendix 2 Access of Water 53 Appendix 3 Intergovernmental and Non-Governmental International Agencies for Conservation 55 Appendix k The Conservator/Restorer: A Definition of the Profession .................. 6? Glossary 71 Selected Bibliography , 71*. AUTHOR'S PREFACE Some may say that the attempt to Introduce the whole subject of Conservation of Cultural Propety Is too ambitious, but actually someone has to undertake this task and it fell to my lot as Director of the International Centre for the Study of the Preservation and Restoration of Cxiltural Property (ICCROM). An introduction to conservation such as this has difficulties in striking the right balance between all the disciplines involved. The writer is an architect and, therefore, a generalist having contact with both the arts and sciences. In such a rapidly developing field as conservation no written statement can be regarded as definite. This booklet should only be taken as a basis for further discussions. ACKNOWLEDGEMENTS In writing anything with such a wide scope as this booklet, any author needs help and constructive comments. -
Deaccessioning Done Right by Jennifer Holt, Curator, Will Rogers Memorial Museums, Claremore
technical bulletin Deaccessioning done right by Jennifer Holt, Curator, Will Rogers Memorial Museums, Claremore Oklahoma Museums eaccessioning is the process used to ered; private sales can be problematic due to Association Dremove permanently an object from a transparency and accountability issues. The Technical Bulletin #47 museum’s collection or to document the rea- use of all proceeds should comply with the Published January sons for an involuntary removal of an object professional ethics and the law. from such a collection. The deaccession- 2009 ing process is used only when accessioned Procedures should be developed along with objects are at issue. Deaccessioning should policies. Deaccession check lists should not be viewed as a routine way to manage follow policy parameters. The registrar/col- indiscriminate collecting. The first rule is lection manager/curator should oversee the Back issues of techni- careful, focused collecting. process and maintain permanent records of cal bulletins published all deaccessions. by the Oklahoma There are a number of reasons why a mu- seum may be prompted to consider deacces- Problems may arise with the deaccession of Museums Associa- sioning. The condition of the object may be an object. The title to the object may be in- tion are available free so bad that it threatens other objects in the complete. Restrictions may have been placed to members. For a collection. A collection may contain unneces- on deaccessioning the object when donated. complete list of tech- sary duplicates. These dupes take resources Other issues that may appear include pri- nical bulletin topics, that could be used for new objects. -
Selection in Web Archives: the Value of Archival Best Practices
WITTENBERG: SELECTION IN WEB ARCHIVES Selection in Web Archives: The Value of Archival Best Practices Jamie Wittenberg, University of Illinois at Urbana-Champaign, United States of America Abstract: The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Web archiving selection criteria are driven by the limitations inherent in harvesting technologies. Observing core archival principles like provenance and original order when establishing collection development policies for web content will help to ensure that archives continue to assure the authenticity of the materials they steward. Keywords: Web Archives; Archival Theory; Digital Libraries; Internet Content; Selection and Appraisal Introduction The abundance of valuable material available online has mobilized the development of preservation initiatives at collecting institutions that aim to capture and contextualize web content. Methodologies for web collection practices are institution and collection-specific. Among institutions charged with preserving cultural heritage, web archiving has become commonplace. However, the disparity between institutional selection and appraisal criteria reveals the absence of standardization for web archive establishment. The Australian web archive, for example, accessions content that it evaluates as having long-term research value. The Library of Congress web archive, represented by its Minerva team, established a collection -
2016 Technical Guidelines for Digitizing Cultural Heritage Materials
September 2016 Technical Guidelines for Digitizing Cultural Heritage Materials Creation of Raster Image Files i Document Information Title Editor Technical Guidelines for Digitizing Cultural Heritage Materials: Thomas Rieger Creation of Raster Image Files Document Type Technical Guidelines Publication Date September 2016 Source Documents Title Editors Technical Guidelines for Digitizing Cultural Heritage Materials: Don Williams and Michael Creation of Raster Image Master Files Stelmach http://www.digitizationguidelines.gov/guidelines/FADGI_Still_Image- Tech_Guidelines_2010-08-24.pdf Document Type Technical Guidelines Publication Date August 2010 Title Author s Technical Guidelines for Digitizing Archival Records for Electronic Steven Puglia, Jeffrey Reed, and Access: Creation of Production Master Files – Raster Images Erin Rhodes http://www.archives.gov/preservation/technical/guidelines.pdf U.S. National Archives and Records Administration Document Type Technical Guidelines Publication Date June 2004 This work is available for worldwide use and reuse under CC0 1.0 Universal. ii Table of Contents INTRODUCTION ........................................................................................................................................... 7 SCOPE .......................................................................................................................................................... 7 THE FADGI STAR SYSTEM ....................................................................................................................... -
Collection Development Policy
COLLECTION DEVELOPMENT POLICY Heather Saunders , Director of Library Leslie Cade, Director of Archives Collection Development Policy — Ingalls Library and Museum Archives July 25, 2018 TABLE OF CONTENTS Ingalls Library I. Purpose of the Policy 3 II. Description of the Collections 3 III. Selection Responsibility 4 IV. General Collection Guidelines 4 V. Collecting Categories and Formats 6 VI. Collecting Levels 10 VII. Subject Qualification by Collecting Level 11 VIII. Gifts 13 IX. Exchange Materials 13 X. Preservation 13 XI. Replacement and Desiderata 13 XII. Deaccessioning 14 XIII. Relation to Other Library Resources 14 Museum Archives I. Purpose of the Policy 16 II. Description of the Collections 16 III. Retention Responsibility 17 IV. Deacce ssioning 17 V. Relation to Other Archive Resources 17 VI. Recommendations 17 Appendix A I. Mission of the Ingalls Library and Museum Archives 18 II. Description of the Ingalls Library 18 Appendix B I. Mission of the Museum Archives 23 II. History of the Museum Archives 23 Appendix C Guidelines for the Library Purchase and Processing of Books with Original Prints and Photographs 26 2 Collection Development Policy — Ingalls Library and Museum Archives July 25, 2018 Ingalls Library I. Purpose of the Policy Ingalls Library of t he Cleveland Museum of Art is a nationally recognized art research library with rich collections encompassing a wide range of published materials covering art from all geographic areas and all periods of art history and archival collections documenting the history of the institution. Materials are collected in many languages and in all formats. Throughout their history the library and archives have been committed to excellence in support of the museum’s current and future collections, research, exhibitions, publications, lectures, programs and activities by identifying, acquiring, organizing and providing access to relevant research mat erials and information . -
Provenance in Digital Collections, Margo Seltzer
Provenance in Digital Collections Margo Seltzer Harvard School of Engineering and Applied Sciences September 20, 2012 Provenance: Special Metadata • From the French word for “source” or “origin” • The complete history or lineage of a object • In the art world, provenance documents the chain of ownership of an artifact. • In the digital world, provenance records: – The process that created an artifact – The transformations applied to an artifact – The human and computational agents that operated upon an artifact – Open question: sufficient information to reproduce the artifact? Designing Storage Architectures: 9/20/12 2 Example: Art Designing Storage Architectures: 9/20/12 3 Example: Art with Provenance Provenance < 1662 Simon de Vos, Antwerp (possibly) by 1662 Guilliam I Forchoudt, Antwerp (possibly) to 1747 Jacques de Roore, The Hague 1747 - 1771 Anthonis de Groot and Stephanus de Groot, The Hague 1771 - ? Abelsz to 1779 Jacques Clemens to 1798 Supertini and Platina, Brussels to 1814 Pauwels, Brussels to 1822 Robert Saint-Victor, Paris 1822 - ? Roux to 1924 Marquise d'Aoust, France 1924 Galerie Georges Petit, Paris to 1940 Federico Gentili di Giuseppe, died 1940, Paris 1940 - 1950 Mrs. A. Salem, Boston (Mr. Gentili di Giuseppe's daughter ) 1950 - 1954 Frederick Mont and Newhouse Galleries, New York 1954 - 1961 Samuel H. Kress Foundation, New York 12/09/1961 Seattle Art Museum Designing Storage Architectures: 9/20/12 4 Example: Data with Provenance Meleana e From the Library of Congress National Jukebox From the page: Musical Group: Irene West Royal Hawaiians Label Name/Number: Victo 17864 Matrix Number/Take Number: B‐15530/2 Recording Date: 12/19/1914 Location: Camden, NJ Size: 10” From http://www.loc.gov/jukebox/about/making‐the‐jukebox: “A slip that provides the elements of the filename of the digital copy is inserted in the sleeve of each selected disc: institution/collection code, label name, label number, disc copy, matrix number, and take number are all noted on the slip. -
Guidelines on Deaccessioning of the International Council of Museums
Guidelines on Deaccessioning of the International Council of Museums Introduction The following guidelines elaborate upon the principles of the ICOM Code of Ethics for Museums concerning the deaccessioning and disposition1 of objects2 from museum collections. The guidelines consider deaccessioning within the context of acquisition and accessioning and are intended to assist in the practical application of the Code of Ethics’ principles. Acquisition The decision to acquire an object (whether it is offered for donation, acquired at sale or auction or found during an archaeological excavation) and accession it into a museum’s collection should be made thoughtfully, considering the nature of the object and its provenance, the museum’s mission3 and the resources that will be required to care for, display and provide access to the object. A museum’s collections policy should thoroughly define the acquisition process and address the legal and ethical principles and professional responsibilities involved4. Acquisitions should be made in accordance with the highest standards of due diligence5 and in accordance with the applicable law6. Accessioning Once a museum acquires an object, the object is accessioned. Accessioning is the formal process involved in accepting and recording an item as an object in a museum’s collection and its inventory. A record of the acquisition, accession processes, and all relevant documents accompanying the object should be kept and preserved. 1 In the ICOM Code of Ethics for Museums, the term “disposal” is used instead of “disposition”. 2 For the purposes of these standards, the word object is used broadly to refer to all cultural objects, as defined in the relevant international legislation: cultural objects are those which, on religious or secular grounds, are of importance for archaeology, prehistory, history, literature, art or science. -
Guidelines for Reappraisal and Deaccessioning
Guidelines for Reappraisal and Deaccessioning Deaccessioning and Reappraisal Development and Review Team: Peter Blodgett, Huntington Library Jeremy Brett, University of Iowa Cathi Carmack, Tennessee State Library and Archives Anne Foster, National Parks Service Laura Uglean Jackson, University of W yoming (Chair) Chela Scott Weber, Brooklyn Historical Society Linda Whitaker, A rizona Historical Foundation, Arizona State University Marcella Wiget, Kansas State Historical Society Draft 7/12/11 0 TABLE OF CONTENTS Notes on Use of the Guidelines…………………………………………………………………………………………….2 Definitions …………………………………………………………………………………………………………………………….3 Introduction…………………………………………………………………………………………………………………………..5 Key Concepts………………………………………………………………………………………………………………………...6 Step-by-Step Process for Reappraisal and Deaccessioning…………………………………………………….8 I. Rationale……… ………………………………………………………………………………………………8 II. Preparation…………………………………………………………………………………………………..8 III. The Reappraisal Process………………………………………………………………………………..9 IV. The Deaccessioning Process………………………………………………………………………….13 V. Evaluation……………………………………………………………………………………………………..17 Appendix A: Example Checklist and Forms……………………………………………………………………………..18 Appendix B: Donor Letter Information and Templates…………………………………………………………..23 Appendix C: Deed of Gift with Language Addressing the Possibility of Deaccession………………25 Appendix D: Reappraisal and Deaccessioning Bibliography…………………….……………………………..26 Appendix E: Sample Policies…………………………………………………………………………………………………..30 1 NOTES ON USE OF THE GUIDELINES -
Provenance: What Is It and Why Do We Care?
Provenance: What is it and why do we care? What is it? PROVENANCE: “The pedigree of a book’s previous ownership. This may be clearly marked by the owner’s name, arms, bookplate, or evidence in the book itself; or it may have to be pieced together from such outside sources as auction records or booksellers’ catalogues.” --John Carter, ABC for Book Collectors (Oak Knoll Press, 1998) Why do we care? “Recorded ownership in a particular book at a particular time can tell us something about both owner and text; it can allow us to make deductions about the tastes, intellectual abilities or financial means of the owner, and it can show the reception of the text at different periods of history. If the book is annotated, we can see further into that world of private relationship between reader and text, and the impact of books in their contemporary contexts.” --David Pearson, Books as History (British Library, 2008) What are the common types of provenance? “There are numerous ways in which people have left traces of their ownership in books; they have written their names on the title page, they have pasted in printed bookplates, they have put their names or arms on the binding, they have used codes and mottos.” --David Pearson, Books as History (British Library, 2008) How do we explore? Each copy of a particular title has its own history. If a book, such as Thomas Paine’s Common Sense, is published in 1776, then each surviving individual copy of that work has its own 240- plus year history. -
Curator: Provenance Management for Modern Distributed Systems
Curator: Provenance Management for Modern Distributed Systems∗† Warren Smith Thomas Moyer Charles Munson The Weather Company, an IBM MIT Lincoln Laboratory Business UNC Charlotte Secure Resilient Systems and Andover, MA, USA Software and Information Systems Technology Charlotte, NC, USA Lexington, MA, USA Abstract systems have focused on the collection and usage of prove- Data provenance is a valuable tool for protecting and trou- nance data, often with the analysis occurring on the same bleshooting distributed systems. Careful design of the prove- system that collected the provenance. While this works well nance components reduces the impact on the design, im- for applications running on a single host, it quickly breaks plementation, and operation of the distributed system. In down on distributed systems. this paper, we present Curator, a provenance management In systems that have considered provenance for distributed toolkit that can be easily integrated with microservice-based systems, the proposed architectures treat provenance as systems and other modern distributed systems. This paper unique from other sources of metadata, such as log and au- describes the design of Curator and discusses how we have dit data. This requires users of provenance to build entire used Curator to add provenance to distributed systems. We infrastructures to manage the provenance data, increasing find that our approach results in no changes to the design the complexity of the application and system. This increased of these distributed systems and minimal additional code complexity can also increase the attack surface of the appli- and dependencies to manage. In addition, Curator uses the cation, negating the security benefits of adding provenance same scalable infrastructure as the distributed system and to a system.