Skip to main content

Ironwood Carnegie Library

Computer and Internet Use

POLICY 3.0: COMPUTER/INTERNET USE POLICY

3.1     Access

 

The library provides access to computer equipment, programs, databases, and the Internet (collectively “computer resources”) for informational and educational purposes.  All users of the library’s computer resources, both staff members and patrons, are expected to use these resources correctly and only for legal purposes.  The use of the computers and accessing the Internet is a privilege.  Access is conditioned upon the user’s compliance with the computer use policies and the continued availability of the Internet.

 

3.2     Computer Access

Computers may be accessed by:

  • Patrons-patrons must have a library card with no fines. Patrons may access the computer independently without assistance from staff.
  • Guests- guests may access public computers through a guest pass. Guests may request a pass from staff and the patron will then be logged on to the computer. A guest pass will cost $1.00 and be good for one session per day.  Sessions are typically one hour, but may be modified to accommodate service provision, health and safety protocol, etc.
  • Printing can be done from public computers for a pre-determined fee. Patrons should make certain they are printing only the pages they require, and are asked to limit the number of pages printed to 50 or less, unless permission is granted by staff prior to printing.  The library is unable to take credit or debit cards for payment.

 

Computers may be blocked at certain times of day for maintenance, library usage, etc. and may shut down 15-30 minutes before library closure.  Patrons are expected to respect requests by staff to log off public computers when needed.

 

          3.2-1  Downloading Files

Files cannot be downloaded onto the public computer hard drives. All files must be downloaded to the user’s flash drives.

 

 The library assumes no responsibility for damages to a user’s computer, disks, or files due to library use.

 

3.3     Internet Access

The library provides Internet access to the public in order to make available a vast array of information and resources.  Please note that the library staff cannot control access to information.  Users are responsible for the access points they reach.  Please also note that material found on the Internet may be inaccurate, incomplete, illegal, controversial, inflammatory, offensive, or dangerous.   Users must use their own judgment on whether the information has merit and validate the information they access for themselves.  The library does not endorse information found on the Internet, only provides access to it.

 

  • Internet access is filtered on library computers. These filters may not limit access to websites that some may deem objectionable or inaccurate.  Accuracy, appropriateness, or accessibility of any electronic resources cannot be guaranteed by the library.

 

  • All copyright and communications laws and others privacy rights must be observed by computer users.

 

  • Illegal activities, use of library resources for illegal purposes as defined by state, local or federal law, and any activity intended to disrupt network or computer services is prohibited and may be subject to prosecution.

 

  • The library reserves the right to set limitations and access on the use of electronic resources.

 

3.3-1      Patron Emails

The library does not provide electronic mail (e-mail) accounts.  If you have an existing e-mail account, you may access your e-mail from the library’s computer providing you do not store any files on the library’s computers.  Patrons needing help setting up an email account can make an appointment with the director for assistance to do so.

 

3.4     Prohibited Activities and Conduct

.

  • Violation of any applicable federal, state, or local laws, ordinances, rules or regulations.
  • Harassment of other persons or parties including repeated, unsolicited, and unwanted communication of an intrusive nature.
  • Not respecting the privacy of others; for example, users shall not intentionally send information on, obtain copies of, or gain access/modify files, other data, or passwords belonging to others, or represent themselves as another user.
  • Libel or slander of other persons or parties.
  • Use of profanity.
  • Destruction of or damage to equipment, software, or data belonging to the library or other users.  Damage due to inappropriate action or inaction while using computers can result in fees being assessed for repair or replacement and charged to the patron, or in the instance of a minor, a parent or legal guardian. 
  • Gaining or attempting to gain unauthorized access to any computing, information, or communications devices or resources.
  • Creating connections which create routing patterns that are inconsistent with the effective and shared use of the network.
  • Disruption or unauthorized monitoring of electronic communications.
  • Unauthorized copying of copyright or other protected material, including illegal pirating of copywritten  software.
  • Violation of computer system security.
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
  • Use of computer communications facilities in ways that unnecessarily impede the computing activities of others (such as randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities, etc.).
  • Violation of software license agreements.
  • Violation of network usage policies and regulations.
  • Violations of another person’s or party’s privacy.
  • Creation, transmission, printing, or otherwise distributing: pornographic, obscene, sexually explicit, racist, sexist or homophobic material.
  • Misrepresenting oneself as another user.
  • Sending unsolicited material or “spamming.”
  • Computer stations are in public areas shared by people of all ages. Users are responsible for the selection of sites and should be aware that others may be involuntarily exposed to what is displayed.  Library patrons are advised that displaying pages depicting pornography is inappropriate for a public and open environment and is prohibited.  Library staff is authorized to ask computer users to stop using the Internet if they are displaying pornography.
  • Any and all other matters which the library, in its sole discretion, subject to constitutional limitations, and in consideration of the best interests of the public determines to be an unacceptable purpose.

 

Anyone found to be abusing library computers in any way will forfeit further library computer use.  This includes illegally copying (pirating) copyrighted software from library computers.  Use of profanity and harassment of staff regarding computer use will result in the same treatment.

 

 

3.5     Violation of Computer Use and Conduct

 

 Library staff will determine if a patron or guest has violated the Ironwood Carnegie Library’s Computer and Internet Policies.  Consequences will be based on the severity of the infraction and circumstances.

 

 First Offense-The patron/guest will be informed verbally that the rules have been violated and asked to leave the library for a period of 24 hours

.

Second Offense-The patron/guest will be informed, verbally or by letter, that the rules have been violated.  The patron/guest will be banned from using public access computers for seven (7) calendar days.

 

Third Offense-The patron/guest will be informed, by letter, that the rules have been violated and banned from using public access computers/Internet for a period of thirty one (31) calendar days.

 

Fourth Offense-The patron/guest will be informed, by letter, that the rules have been violated and banned from using public access computers/Internet for a period of one hundred and eighty days (180) calendar days.

 

Immediate disciplinary action, including prosecution, will be taken if a patron uses the library’s public computers for illegal purposes, steals library property, vandalizes/abuses library equipment or property, or threatens/harasses/attempts to intimidate library staff.    Library employees will investigate complaints and will cooperate with state or federal authorities if necessary.

 

Users are responsible for any damage occurring to library hardware or software due to inappropriate actions or inactions while using the computers.  Fees will be assessed and charged to the patron for required repairs or replacement. 

 

Reinstatement of Computer and/or library privileges can only be resumed with Library Director and/or Library Board approval.

 

 

3.6 Computer Access by Minors

 

  • Computer users below the age of eighteen (18) must use only those public computers designated as Children’s, unless they are with a parent or guardian over 16.

 

  • Children below the age of six (6) should be accompanied by an adult or guardian when using computers that are designated for use by minors.

 

  • Inappropriate use of public computers by minors will result in parents/legal guardians being contacted and held responsible for any damages. Minors will be held to the consequences for offenses as stated under 3.4

 

  • Computer use is allowed as long as the patron has a library card in good standing. This includes the use of computers by minors.  The library will not restrict use of computers or other library materials.  It is up to the parents or legal guardians to monitor a child’s use of computers and other library resources/materials, including access to the Internet.    However, the library staff will not log a minor on to a computer with a guest pass.

 

3.7  Wi-Fi

 

The Library provides unfiltered Wi-Fi to library patrons. Any patron or visitor who complies with the Library’s Internet Policy may use the wireless access service. When using the Wi-Fi, patrons must respect the following policy, rules and regulations:

  • The Library does not require patrons to register or use a password to access the Wi-Fi. Patrons desiring to utilize the Library’s Wi-Fi must have their own device.
  • The library cannot provide detailed technical assistance to patrons using their own portable computing device.
  • Wi-Fi is accessible from inside the library and the grounds surrounding the building.  However, there is no guarantee that a wireless connection can be made or maintained.
  • The Library’s Wi-Fi does not provide a secure connection.  Patrons use the Library’s wireless Internet access at their own risk. The Library encourages patrons to use virus protection, a personal firewall, and other measures to protect personal information from disclosure. Patrons using their portable computing devices are solely responsible for protecting their personal information and assume all risks of an invasion of privacy or disclosure of personal information that may occur when using the Library’s Wi-Fi.
  • The Library’s Wi-Fi does not allow for printing from a patron’s personal device.
  • The Library is not responsible for any loss of information or damage that may occur, either directly or indirectly, to any personal equipment or data.
  • Patrons utilizing the Library’s Wi-Fi must comply with all other policies of the Ironwood Carnegie Library, including but not limited to the Internet Policy.  The Library reserves the right to terminate any wireless network connection in accordance with federal, state, and local laws, regulations and policies.

3.8 Laptop Lending

 

  • The library will offer loans of laptop computers for informational and educational purposes. Patrons must be 18 years or older and have an active Ironwood Carnegie Library account in good standing (current address and phone on file with no outstanding fines or overdue materials.)  A valid picture ID must be presented at time of check out.
  • Patrons must read, understand, and sign the Laptop Lending Agreement in the presence of a library staff person each time a Laptop is checked out.
  • A limit of one laptop loan will be allowed per valid adult address.
  • There is a 4 day check out period for laptops. They may not be renewed or placed on hold.  A Borrower cannot check out a laptop for one week after returning.  All laptops will be sanitized and quarantined according to library protocol.
  • Laptops must be returned directly to the circulation desk. DO NOT RETURN IN THE BOOK DROP BOX OR BINS. 
  • Borrowers must not alter or delete any settings or configurations. Doing so may result in the loss of borrowing privileges. 
  • Borrowers, along with a staff member, will verify that all accessories are present at the time of check out and check in.
  • Patrons should not attempt to repair, adapt, or alter the laptop in any way.
  • Patrons must adhere to all aspects of this the Library’s Using Public Computers Policy, including its Internet Policy, and all other applicable library policies while using the Library’s laptops.

 

Proper Care and Use

  • The laptop should always be kept in a temperature controlled environment. As with any electronic device, do not leave the Laptop in a hot vehicle for any extended period of time.
  • Do not remove any components for any reason.
  • Do not leave the laptop plugged in. Once it is fully charge, unplug until the battery is again run down.
  • No additional software may be downloaded or installed on the laptops. No changes are to be made to their system configurations. 

 

Disclaimer

  • The Ironwood Carnegie Library is not responsible for information accessed using this laptop for personal information that is shared over the internet.
  • Information sent to or from the laptop could be captured by anyone else with a wireless device and appropriate software.
  • The library is not responsible for any liability damages, or expense resulting from use or misuse of the laptop, connection of the laptop, to other electronic devices, or data loss resulting from the use of the laptop.
  • Laptop users are encouraged to follow safe Internet practices.
  • Tampering with library equipment, including bypassing security functions, is prohibited.
  • Patrons must abide by the Ironwood Carnegie Library Computer and Internet Policies. Policies are posted at the library and are available upon request.

 

 

Fines and Liability

When the laptop is 1 day past due, there will be a $10.00 fine added to the Borrower’s account.  An overdue fine of $10.00 per day, up to the full replacement cost of the laptop will be charged for any Laptop not returned.  Patrons are responsible for full replacement costs if the laptop or any parts are lost, stolen, damaged or otherwise not returned in a usable condition. 

POLICY # 3.0

Computer/Internet Use

Approved by Board:

 

(replaces policy 3.0 Using Public Computers)

 

Version 1

Lynne Wiercinski, Library Director

Policy Revision Date: 2/17/21

Version 2

Lynne Wiercinski, Library Director (addition of Laptop Lending)

Policy Revision  Date  2/17/21