Yutan Public Library
Acceptable Use of the Internet and Library Public Computers and Devices
Last revised 12-1-2014
The library’s computers allow users to search a variety of electronic resources. Library resource computer is exclusively for searching the library’s holdings and selected electronic databases. Internet computers provide information beyond the confines’ of the library’s collection. Internet computers offer a full range of the most popular Internet browser plug-ins for searching the internet, displaying files, and viewing multimedia content. Internet computers also provide access to word processing. No station provides support for all file types, browser plug-ins, or Internet technologies.
Use all library computers in accordance with this policy and the Yutan Public Library Behavior in the Library policy.
Access to Internet resources
Yutan Public Library is committed to providing access to informational, educational, recreational and cultural resources for library users of all ages and backgrounds. The library’s computer system provides the opportunity to integrate electronic resources from information networks around the world with the library’s other resources. The library strives to balance the rights of users to access information resources with the rights of users to work in a public environment free from sound and images intended to harass other library users of library staff.
The library’s goal in providing Internet access is to enhance its existing collection in size and depth as a public access agency, to give anyone who wishes to use the Internet the chance to do so.
Library staff will help you learn to use the search tools on Internet computers and to find the information you need.
The Internet offers access to a wealth of material that is personally, professionally, and culturally enriching to individuals of all ages. However, it also enables access to some material that may be offensive, disturbing, illegal, inaccurate, or incomplete. Users are encouraged to evaluate the validity and appropriateness of information accessed via the Internet.
Tests by the library and by independent agencies have shown that filtering software may help to block access to objectionable Internet sites. Software cannot block out all objectionable sites, and it does sometimes block useful material, including sites that are suitable for children, teens and adults.
Public Internet computers are equipped with commercial filtering software. The library’s filtering policy upholds the principles of intellectual freedom, allowing adults to make their own choices regarding filtering. The Policy also aims to ensure that our libraries are safe and welcoming places for children, and it affirms the right and responsibility of parents to make choices for their own children and teens.
*Adults (19 and over) may choose filtered of unfiltered searching
* Teens (13-18) have filtered Internet access
* Children (12 and younger) have filtered access
Time and other limits
To access the Internet a customer must use his or her own library card at the reference desk, and sign in to the log book at the computer stations. Each Individual is limited to two one-hour sessions per day of Internet access. Ask any staff person for help to sign up for an Internet computer. Staff may free up special- purpose stations, such as those provided for children and people with disabilities, and take other measures that will manage Internet use and achieve the goals of the policy.
The library’s computers are set up for use by a single individual. An maximum of two persons may sit/ work together and any one computer, except in special cases, such as computer labs and teen lounges, or when a parent /guardian is with children.
The Library takes a variety of measures to protect your privacy when you use the library computers. However, we cannot prevent other library users from seeing what you are viewing. The library’s computers are in a public area. Others may be involuntarily exposed to what you are viewing. The library asks that you remain sensitive to the fact that you are working in a public environment shared by people of all ages.
You are responsible for complying with copyright law, licensing agreements and the policies of individual websites that you view.
Notice: warning of Copyright Restrictions
As a patron, your ability to post or link to copy righted material is governed by United States copyright law. In accordance with 17 USC S 512 (i) (1) (A), the library may terminate a patron’s access to the system or net work for disrespect of the intellectual property rights of others, or for repeat infringements of copy right. The library has adopted this policy and will make all reasonable effort to enforce in appropriate circumstances.
Rules governing use of library computers
Failure to comply with the following rules may result in loss of computer privileges, loss of library privileges and prosecution.
At each log in, patrons are acknowledging these rules and agree to follow them.
1. Sign up for an Internet computer before using it; log on using your own library card and promptly give-up the computer when your time has elapsed.
2. Promptly give up the computer when requested by the staff.
3. You may download files using supported media. The library is not responsible for damage to your media or for corruption of your data, including damage caused by mechanical malfunction or corruption caused by virus or spyware infection while using library computers, DO NOT attempt to run or execute programs or applications from personal storage media.
4. There is a donation requested for printing from public computers, except when printing your patron record or event finder search results. $.10/page
5. Respect others privacy by not attempting to observe or comment on what others are viewing. Remain sensitive to the fact that you are working in a public environment shared by people of all ages.
6. Stop viewing any site that creates a hostile environment for other library users and staff if a staff member asks you to stop, and do not view similar sites when others are present.
7. Use headphones when listening to audio content. and keep volume low so you do not disturb others.
8. As a courtesy to others, log off completely when you are finished with your session. This also protects the privacy of your search. To do this, press ctrl-alt-del keys. Select Log Off, then log off again.
9. Do not gather around computers when doing so may obstruct others or create noise that distracts others.
10. Do not use another’s identification, barcode or pin number with or without permission, to sign up or log on to a computer
11. Do not misuse computer equipment or software.
Misuse includes but is not limited to:
*Viewing material that violates federal, state or local laws or regulations, including those regarding accessing, viewing printing and distributing obscenity or child pornography
*Hacking into the library computer system or any other computer system
*Mishandling, damaging or attempting to damage computer equipment or software tampering with computer settings
* Interfering with systems operations, integrity or security
*Attempting to gain or gaining access to another person’s files or authorization code
* Displaying or printing material that violate Saunders County’s Policy on sexual harassment.
* Engaging in any activity that is deliberately offensive or creates an intimidating or hostile environment.
*Telnetting to outside locations on a Library Resource Computer
* Violating copyright laws and software licensing agreements or the policies of the individual websites that you view
* Failing to pay for printing
* Refusing or ignoring a staff person’s request to give up a computer
*Failing to sign up for a computer; failing to log in using you own library card
* Failing to comply with time limits
* Any other violation of the acceptable use of the Internet and Library Public Computers statement