All users of the Internet are expected to use library resources in a responsible and courteous manner, consistent with the purposes for which it is provided, and to follow all library related rules, regulations and procedures established for its use including those of this policy. Computer resources may not be used for, including but not limited to, the following purposes:
- Violation of any applicable federal, state or local laws, ordinances, rules or regulations, including library policies.
- Harassment of other persons or parties
- Libel or slander of other persons or parties
- Any commercial or profit making use of the library’s account or equipment.
- Destruction of or damage to equipment, software or data belonging to the library or other users.
- Gaining or attempting to gain unauthorized access to any computing information, or communications devices or resources.
- Disruption or unauthorized monitoring of electronic communications.
- Unauthorized copying of copyright or other protected materials.
- Violation of computer system security.
- Misrepresentation of oneself including, but not limited to, unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
- Users of computer communications facilities in ways that unnecessarily impede the computing activities of others (such as randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, etc.)
- Violation of software license agreements.
- Violation of network usage policies and regulations.
- Violation of another persons or party’s privacy.
- Use of any software other than what is provided by the library is not permissible.
- Violation of policies and regulations that govern the use of the library’s Internet resources may result in the suspension or loss of the privileges to use these resources. Illegal activity involving the library’s Internet resource will be subject to prosecution by the appropriate authorities. Loss of privileges includes:
- First offense – verbal warning by any staff member
- Second offense – written warning with loss of Internet privileges for one month
- Third offense – permanent loss of Internet privileges
In some circumstances, such as instances where a minor or other person has been threatened or endangered, where damage to the computer systems has occurred or where illegal activities are undertaken, immediate and perhaps permanent revocation of Internet privileges may be appropriate.
Reinstatement of privileges will be at the discretion of the director. However, an appeal of the decision to revoke privileges or the decision to not reinstate privileges may be made to the Library Board at the next regularly scheduled board meeting following the decision.
- Patrons may download to their own disks or disks that they have purchased from the library at a cost of $1.00.
- Use of the Internet workstations is free of charge, but the library reserves the right to charge for printing as with other computer resources. The demand for use of the library’s Internet workstations may exceed the available supply. Therefore, each staff member will be authorized to employ whatever reasonable methods are deemed appropriate in order to ensure that access to Internet workstations is available to all patrons who wish to use them. Examples of methods that might be used include, but are not necessarily limited to, the following:
- Establish time limits and use of signup sheet to use. Patrons are guaranteed 30 minutes a day but may be granted more time if there is no computer demand. A patron may be limited to 30 minutes of Internet usage per day.
- Computers are available on a first come, first serve basis. Patrons must be at the library to place their name on a waiting list. Phone reservations will not be taken for computer time.
- Patrons will be asked to relinquish a workstation if the patron has used a computer resource for any of the above-stated unacceptable purposes or has otherwise violated any portion of library policy.
Adopted: April 27, 2005