Yutan Public Library
Acceptable Use of the Internet and Library Public Computers and Devices
Last revised January 2017
The library’s computers allow users to search a variety of electronic resources. Library resource computer is exclusively for searching the library’s holdings and selected electronic databases. Internet computers provide information beyond the confines’ of the library’s collection. Internet computers offer a full range of the most popular Internet browser plug-ins for searching the internet, displaying files, and viewing multimedia content. Internet computers also provide access to word processing. No station provides support for all file types, browser plug-ins, or Internet technologies.
Use all library computers in accordance with this policy and the Yutan Public Library Behavior in the Library policy.
Access to Internet resources
Yutan Public Library is committed to providing access to informational, educational, recreational and cultural resources for library users of all ages and backgrounds. The library’s computer system provides the opportunity to integrate electronic resources from information networks around the world with the library’s other resources. The library strives to balance the rights of users to access information resources with the rights of users to work in a public environment free from sound and images intended to harass other library users of library staff.
The library’s goal in providing Internet access is to enhance its existing collection in size and depth as a public access agency, to give anyone who wishes to use the Internet the chance to do so.
Library staff will help you learn to use the search tools on Internet computers and to find the information you need.
Internet filtering
The Internet offers access to a wealth of material that is personally, professionally, and culturally enriching to individuals of all ages. However, it also enables access to some material that may be offensive, disturbing, illegal, inaccurate, or incomplete. Users are encouraged to evaluate the validity and appropriateness of information accessed via the Internet.
Public Internet computers are equipped with commercial filtering software. The library’s filtering policy upholds the principles of intellectual freedom, allowing patrons to make their own choices regarding filtering. The Policy also aims to ensure that our libraries are safe and welcoming places for children, and it affirms the right and responsibility of parents to make choices for their own children and teens.
Time and other limits
The library’s computers are set up for use by a single individual. A maximum of two persons may sit/ work together and any one computer, except in special cases, such as computer labs and teen lounges, or when a parent /guardian is with children. Computers are available for use on a first-come, first-serve basis during regular business hours and up until 10 minutes before closing time. Patrons will be limited to one half hour per computer session when another patron is waiting and to 2 hours of use per day.
Privacy
The Library takes a variety of measures to protect your privacy when you use the library computers. However, we cannot prevent other library users from seeing what you are viewing. The library’s computers are in a public area. Others may be involuntarily exposed to what you are viewing. The library asks that you remain sensitive to the fact that you are working in a public environment shared by people of all ages.
Precautions
Illegal activities or activities that interfere with or disrupt the network, users, or services of equipment are prohibited and not protected by the library’s privacy policy. The library does not routinely monitor public computers, but reserves the right to do so when a violation of this policy or illegal activity is suspected. Staff is authorized to take immediate action to protect the security of computers and the network and to enforce the following rules. This includes confiscating any removable media, requiring a user to leave a computer or the premises and contacting law enforcement authorities.
You are responsible for complying with copyright law, licensing agreements and the policies of individual websites that you view.
Notice: warning of Copyright Restrictions
As a patron, your ability to post or link to copy righted material is governed by United States copyright law. In accordance with 17 USC S 512 (i) (1) (A), the library may terminate a patron’s access to the system or net work for disrespect of the intellectual property rights of others, or for repeat infringements of copy right. The library has adopted this policy and will make all reasonable effort to enforce in appropriate circumstances.
Rules governing use of library computers
Failure to comply with the following rules may result in loss of computer privileges, loss of library privileges and prosecution.
At each log in, patrons are acknowledging these rules and agree to follow them.
1. Sign up for an Internet computer before using it; log on using your own library card and promptly give-up the computer when your time has elapsed.
2. Promptly give up the computer when requested by the staff.
3. You may download files using supported media. The library is not responsible for damage to your media or for corruption of your data, including damage caused by mechanical malfunction or corruption caused by virus or spyware infection while using library computers, DO NOT attempt to run or execute programs or applications from personal storage media.
4. There is a donation requested for printing from public computers, except when printing your patron record or event finder search results. $.10/page
5. Respect others privacy by not attempting to observe or comment on what others are viewing. Remain sensitive to the fact that you are working in a public environment shared by people of all ages.
6. Stop viewing any site that creates a hostile environment for other library users and staff if a staff member asks you to stop, and do not view similar sites when others are present.
7. Use headphones when listening to audio content. and keep volume low so you do not disturb others.
8. As a courtesy to others, log off completely when you are finished with your session. This also protects the privacy of your search. To do this, press ctrl-alt-del keys. Select Log Off, then log off again.
9. Do not gather around computers when doing so may obstruct others or create noise that distracts others.
10. Do not use another’s identification, barcode or pin number with or without permission, to sign up or log on to a computer
11. Do not misuse computer equipment or software.
Misuse includes but is not limited to:
*Viewing material that violates federal, state or local laws or regulations, including those regarding accessing, viewing printing and distributing obscenity or child pornography
*Hacking into the library computer system or any other computer system
*Mishandling, damaging or attempting to damage computer equipment or software tampering with computer settings
* Interfering with systems operations, integrity or security
*Attempting to gain or gaining access to another person’s files or authorization code
* Displaying or printing material that violate Saunders County’s Policy on sexual harassment.
* Engaging in any activity that is deliberately offensive or creates an intimidating or hostile environment.
*Telnetting to outside locations on a Library Resource Computer
* Violating copyright laws and software licensing agreements or the policies of the individual websites that you view
* Failing to pay for printing
* Refusing or ignoring a staff person’s request to give up a computer
*Failing to sign up for a computer; failing to log in using you own library card
* Failing to comply with time limits
* Any other violation of the acceptable use of the Internet and Library Public Computers statement
Misuse of computers will result in loss of computer privileges. patrons and/or the parent/guardian are liable for any damage done to the Internet workstation hardware or software, and for any illegal or unethical acts performed through the system. This is not limited to physical damage or vandalism. Tampering with local or remote computer files and/or committing legal or ethical violations of acceptable internet use will result in a permanent loss of Internet privileges at the library, and could result in financial liability and/or criminal charges.
Internet User and Parental Responsibilities
The Public Library, unlike schools, does not serve in loco parentis (in place of an parent). Library staff cannot act in the place of parents in providing constant care and supervision of children as they explore the Internet. The responsibility for what minors read or view on the internet rests with the parents/guardians to be present when it is being accessed.
The Yutan Public Library has two computer stations that are for patrons 8 years of age and older. These terminals have a sign posted, however, it is only a suggestion.
All patrons are reminded of the following:
- Minors may not use library terminals for viewing, sending or receiving materials, which may be determined to be harmful to minors as defined by the State of NE Statute 28-807 5
- Users may not use library workstations for viewing, sending or receiving materials which may be determined to be obscene as defined by the State of NE Statute 28-807-10
- Users may not violate licensing agreements and copyright laws (Title 17, U.S. Code)
Yutan Public Library staff will not monitor an individual’s use of any Internet sites, except when material displayed on the screen is not appropriate in a public environment. Acceptability of screen displays will be left to the discretion of library staff.