Application: Library Staff and Patrons
All users of electronic resources are expected to use these resources in a responsible and ethical manner consistent with the standards and rules of the library and of the community.
A. Choosing and Evaluating Sources
The library offers access to the Internet as an electronic means of reaching ideas and information and greatly expanding its information services beyond the traditional collections and resources. Because of this, the library has been recognized by the New York State Department of Education as an Electronic Doorway Library.
The Internet provides access to many valuable local, national, and international sources of information. However, not all sources on the Internet provide accurate, complete, or current information. The library cannot control the accuracy of information, the validity of the information, availability of links, nor the availability of material that some may find offensive. A user MUST evaluate the validity of the information sources.
Library users access the Internet at their own discretion and are responsible for any access points they reach.
B. Rules Governing Use:
- A user must sign on the computer using their library card number and password or request a guest pass.
- A user may sign up for a second session after a half hour wait or extend their hour before time runs out, if no one is waiting.
- Use is limited to a maximum of two people per computer at a time.
- Computer use is limited to the hours that the library is open. Computers shut down 15 minutes before closing.
- Library staff is available to help navigate the Internet by offering suggestions for sites and searching assistance, or a person is available for training or assistance during the specified hours.
- Library staff reserves the right to remove inappropriate materials from a computer and instruct a patron to refrain from seeking similar sites.
C. User Must NOT:
- Use the PCs to gain unauthorized access to the Library’s network or computer systems or to any other network or computer systems.
- Obstruct other people’s work by consuming large amounts of system resources or by deliberately crashing any library computer system.
- Make any attempt to damage computer equipment or software.
- Make any attempt to alter software configurations.
- Make any attempt to cause degradation of system performance.
- Use any Library computer for any illegal or criminal purpose.
- Violate copyright laws or software licensing agreements in their use of library computers.
- Engage in any activity which is deliberately and maliciously offensive, libelous, or slanderous.
- Install or download any software.
The library may deny or withhold computer/Internet privileges and other library services for infractions of these policies. The parents or guardians of minors may also lose their computer privileges and other library services for infractions of these policies. Unlawful activities will be dealt with in an appropriate manner.
D. Access by Minors:
It is the policy of the library that parents or legal guardians are responsible for monitoring what library materials and resources, including Internet access, are appropriate for their minor children.
As the library is a public place, it reserves the right to remove sexually explicit materials from the computer screen and to instruct the minor to refrain from seeking similar sites. Failure to comply will result in loss of Internet privileges. Law enforcement will be called immediately upon observing any patron viewing any sexually explicit materials involving children.
The library cannot and does not guarantee that the filter will always block objectionable sites. Parents may wish to supervise their children’s Internet sessions. Library staff cannot be responsible for supervising minors while they are using the Internet.
E. User Agreement
The undersigned acknowledges that he/she has read, understands, and agrees to abide by the library Internet Use Policy and Guidelines.
The undersigned further acknowledges and agrees that the library assumes no liability for any loss or damage to the user’s data or for any damage or injury arising from the invasion of privacy.