Weekly Wrap-U.P.! September 22, 2023

System Spotlight

By Staff

Future Dates & Training Opportunities

Sept 20 – 23, 2023 – ARSL Conference/Wichita, Hotel Booking/Conference Registration

Sept 28, 2023, 1:30 pm CT – After-lunch Course “Incorporating EDI into the Whole Collection Development Cycle/Registration Link

Sept 29, 2023, 1:30 pm CT – APPLE Webinar “HR Basics and Employment Law/Registration Link

Oct 27, 2023 – Deadline to Submit SEED Grant Application/Main Page, Application Page

Nov 1 – 3, 2023 – KLA Conference/Wichita, Registration Link


By Richard Brookman

Image provide by Pixabay.com contributor Bru-nO

Talking Points to Consider during Challenged Material

The following list is a list of talking points I created and interpreted. As always I have to mention that to get an authoritative opinion you will need to seek counsel.

1. Does the library have a mission and vision statement?

2. Libraries were created to be neutral places.

a. This means there might be topics of controversial nature in the collection.

3. If a patron comes across something they do not like they don’t have to read, listen, or watch that title.

a. The patron can put the item back and continue on until they find what they like.

4. The library reflects the 1st Amendment of the Constitution of free speech and religion.

a. “…make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press;…”

5. Freedom of religion is to allow a person or group of people to worship how they choose.

6. The library is there to help patrons with their daily lives.

a. Medical information; hat religion they wish to follow; how to control money; how to start and maintain a business; gain knowledge about political parties (Republican, Democrat, Independent, Green,…); Learn about history; & Provide a break from their daily lives to escape from work and news.

7. The library is supported with tax derived funds and is meant to reflect your community

a. No matter the culture, religion, social economical background, or the way they chose to live their life.

8. The library offers different points of views:

a. There are different religious, cultural, and political views and If one point of view is challenged it weakens the library’s collection as a whole and any view that someone doesn’t like can be challenged.

9. The Declaration of Independence has the statement, “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.”

a. You notice Creator is used which is a muti-use term for the head deity that created earth (All religions have their own head deity or it could be the same religion but because it is a different language the head deity is called something different.  {God in English; Yahweh in Hebrew}); &

b. The pursuit of happiness is a family and individual pursuit.

10. From the Constitution of the United States – “We the people of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defense, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.”

a. “insure domestic Tranquility” – interpretation to respect everyone’s ways of living even if they don’t line up with your ways; and

b. “secure the Blessings of Liberty” – definition of liberty “the state of being free within society from oppressive restrictions imposed by authority on one’s way of life, behavior, or political views.

11. From the Constitution of the State of Kansas Bill of Rights Sec. 1 – “All men are possessed of equal and inalienable natural rights, among which are life, liberty, and the pursuit of happiness.”

12. From the Constitution of the State of Kansas Bill of Rights Sec. 2 – “All political power is inherent in the people, and all free governments are founded on their authority, and are instituted for their equal protection and benefit…..”

a. Key words are, “instituted for their equal protection and benefit.”

13. From the Constitution of the State of Kansas Bill of Rights Sec. 7 – “…nor shall any person be compelled to attend or support any form of religion.”

14. When visiting with patrons with these concerns or they are at a board meeting, you need to remain calm and if you choose to talk only state facts or laws not opinions.

15. Pay attention to the patron’s complaints and don’t put on an air that you are placating them.

16. Say thank you to the patrons for taking the time to address the board and the board can discuss this further at the next board meeting by placing the topic on the agenda.

Cataloging, Collection Development, and ILL

By Sara Wilson

Collection Development Inspiration

Adult Fiction

Children’s & YA Fiction

All VERSO Users: Auto-Graphics updated VERSO on Tuesday, 09/19. The update was a maintenance update and did not include any defect or enhancement tickets.



by Christopher Dressler

In the rapidly evolving digital landscape, ensuring the security of sensitive information has become paramount. One of the fundamental aspects of safeguarding data and systems is implementing robust access control measures. Computer Access Control refers to the practices and technologies that restrict and manage user access to specific resources within a computing environment. This article explores the significance of Access Control and its role in fortifying cybersecurity.

The Importance of Access Control

Protecting Sensitive Data:
Access Control acts as a barrier, preventing unauthorized individuals or systems from accessing confidential information. This includes personal data, financial records, intellectual property, and other critical assets.

Preventing Unauthorized Usage:
Unauthorized access can lead to data breaches, identity theft, or even sabotage. By employing Access Control, organizations can mitigate these risks and maintain the integrity of their digital assets.

Compliance with Regulations:
Many industries are subject to stringent data protection regulations, such as government, health care, and private business. Implementing robust Access Control measures ensures compliance with these mandates, avoiding hefty fines and legal repercussions.

Types of Access Control

Role-Based Access Control (RBAC):
RBAC assigns permissions based on job roles within an organization. This approach streamlines access management by categorizing users into roles and granting appropriate permissions accordingly.

Discretionary Access Control (DAC):
DAC allows the owner of a resource to determine who can access it and what actions they can perform. It is a more flexible approach, but it requires vigilant oversight to prevent misuse.

Mandatory Access Control (MAC):
MAC is a high-level security model that restricts access based on security classifications and clearances. It is commonly used in military and government settings where data confidentiality is of utmost importance.

Attribute-Based Access Control (ABAC):
ABAC evaluates various attributes, such as user roles, time of day, location, and device type, to make access decisions. This dynamic approach offers a granular level of control.

Implementing Access Control Measures

Authentication and Authorization:
Robust authentication methods, including passwords, biometrics, and two-factor authentication, verify the identity of users. Authorization defines what actions or resources a user can access based on their authenticated identity.

Regular Auditing and Monitoring:
Continuously monitoring access logs and performing periodic audits help identify and rectify any anomalies or suspicious activities. This proactive approach ensures that access control policies remain effective over time.

Education and Training:
Educating employees and users about best practices in access management is crucial. This includes emphasizing the importance of strong passwords, the dangers of sharing credentials, and recognizing phishing attempts.


Computer Access Control is a linchpin in modern cybersecurity strategies. It plays a pivotal role in safeguarding sensitive information, preventing unauthorized access, and ensuring regulatory compliance. By implementing robust access control measures, organizations can fortify their digital fortresses and protect themselves from evolving cyber threats. Remember, a strong defense begins with controlling who has access to your digital assets.

Always feel free to contact me for training requests, library cards, or technology issues at cdressler@swkls.org or (620)225-1231. – Christopher Dressler – 9/22/2023

More Than A Toy

Hey there everyone, Bernardo here with a friendly reminder to visit our steam.swkls.org website if you’d like to find out what cool STEAM related, we have at the office! Everything is currently available in our STEAM collection and they’re all waiting on a chance to show off!

We also have 3D printers waiting to be loaned out to those interested!!