Computer Use:

First time users must sign the computer use agreement and complete a brief orientation.  Users under 18 years of age must have the agreement signed by a parent or legal guardian and returned to the circulation desk by the parent or guardian.  Children age 8 or under must be accompanied by an adult while on the computers.

No more than two people may use the same computer at one time.

The library staff is available for basic guidance on the Internet and with library databases but cannot offer in depth instruction in the use of specific software.

The library staff reserves the right to terminate service to anyone who does not use the computer in a responsible manner.  Such people must reapply on another day before using the computer again.

Internet computers will not be used to access materials which by community standards would be obscene.

For protection of the library’s equipment no outside devices can be brought in to use on the computers.

The library will provide blank copier paper in the black and white printers and color printers at the cost of twenty cents per page.  Patrons may supply their own copier paper if a better quality paper is needed.   Copies in both cases are to be paid for at the circulation desk.  Construction paper is not to be used in the printers.

Problems arising when using the computer must be reported to the library staff immediately.

Users responsible for any damage to hardware or software will be liable for repair or replacement costs.

Users are asked to leave the computer turned on when they leave their station.

Users must end their session and leave the terminal when asked to do so by authorized Library Staff.

RESERVING THE COMPUTER:

Users must sign the reservation schedule before each use.   If two people plan to use the computer together, both must sign at the time of use.  Computer reservations may be made up to seven days in advance in person or by telephone.

Only two one half hour periods per person per week may be reserved in advance.  The number of access sessions available per day, per user, may be established by the Librarian in Charge.  Such limitations will be dependent on facility-specific demand in order to provide access for the majority of users.  Reservations are made for one half hour time periods.  If no one else is signed up for that computer in the following half hour the first person may remain.  Latecomers forfeit the unused portion of their reserved time.  Latecomers by more than ten minutes lose their reserved time.  The library staff may reassign this time after waiting the ten minutes.  Upon completion of an Internet access session, a user may be required to wait 30 minutes before signing up for another session.

Walk-in use is encouraged.  Time allowed on the computers will depend on the reservation schedule.

Adopted by the Library Board of Trustees at the regular meeting of August 14, 1996; Amended Sept. 8, 1999; Amended Nov. 8, 2000; Amended Nov. 13, 2002; Amended by the Library Board of Trustees at their regular meeting of Sept. 10, 2013.

LEGAL USE:

Computing resources may only be used for legal purposes.  Examples of unacceptable purposes include but are not limited to the following:

  • Harassment of others:
  • Libeling or slandering other users:
  • Destruction of or damage to equipment, software, or data belonging to the library or other users;
  • Disruption or unauthorized monitoring of electronic communications;
  • Unauthorized copying of copyright-protected material.

ETHICAL USE:

Computing resources should be used in accordance with the ethical standards of the library.  Examples of unacceptable use include, but are not limited to, the following:

  • Violation of computer system security:
  • Violation of guidelines of the networks traversed;
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others;
  • Installation, downloading, or modification of software;
  • Use of computer communications facilities in ways that unnecessarily impede the computing activities of others:
  • Violation of software license agreements:
  • Violation of network usage policies and regulations:
  • Violation of another user’s privacy.
  • Viewing pornography on public computers.

TERMINATION OR PROHIBITION OF USER ACCESS:

Violators of computing resources use policies may lose computer privileges.  Violations of the policies described above for legal and ethical use will be dealt with in a serious and appropriate manner.  Illegal acts involving library computing resources may also be subject to prosecution by local, state, or federal authorities.  Parents or guardians of children under the age of 18 will be notified in writing.  A course of action will be decided.  Disagreement with said process should be expressed in a letter to the Library Director.  If further action is needed, the matter will be referred to the Library Board of Trustees.

Adopted by the Library Board of Trustees at the regular meeting of August 14, 1996, Amended Sept. 8, 1999; Amended Nov. 8, 2000; Amended Nov. 13, 2002; Amended by the Library Board of Trustees at their regular meeting of Sept. 10, 2013.