Skip to main content
Steele Public Library

Internet Use Policy

Policy for using computers and the internet.

INTERNET POLICY

General Policy:

The Library provides computer services, including free access to the Internet to card holders in good standing, in accord with its goal to enrich the community by connecting people to the world of ideas, information, and imagination to support their work, education, personal growth and enjoyment.  These electronic resources and services meet the cultural, educational, informational, and recreational needs of the community.

Internet Use Disclaimers:

The Internet is a global computing network that provides access to a wide range of educational, reference and recreational resources, many of which are not available in print.  The Internet does not fall under the control or governance of any single agency, government or organization, and therefore the Library can make no guarantees regarding the accuracy, content, nature or quality of information obtained through the Internet.  Further, the Library does not endorse viewpoints presented on the Internet.

In no event shall the Library have any liability for damages of any kind arising from its connection to the Internet.  Users of the Library’s computers and Internet access, wireless internet access, including, in the case of minors, their parents or guardians, agree to assume full liability (legal, financial or otherwise) for actions.

Disclosures:

Internet access in the Library allows access to ideas, information, images and commentary beyond the scope of the Library’s collections, selection criteria and collection development policy.  Some of the Internet material may be controversial.  Court decisions over the years have interpreted the Library to be a “limited public forum” and, as such, the Library may not discriminate against constitutionally protected content or viewpoints.

The exception to the “limited public forum” doctrine is the Children’s Internet Protection Act (CIPA).  Under CIPA it is not acceptable for a minor to receive any material through any website, email, chat room or other direct electronic communications, if it is deemed harmful to minors.  CIPA defines harmful as “any picture, image, graphic image file, or other visual depiction” that, with respect to minors which:

  1. Taken as a whole appeals to a prurient interest in nudity, sex or excretion.
  2. Depicts, describes, or represents, in a patently offensive way, an actual or stimulated sexual act or sexual conduct, actual or simulated normal or perverted sexual acts, or lewd exhibition of genitals.
  3. Taken as a whole, lacks serious literary, artistic, political or scientific value.

To offer some safeguards for children, the Library provides filtered access for individuals using library computers.  A filter is a third-party software that blocks access to certain websites.  Parents and guardians should understand that filters limit, but cannot eliminate, a child’s exposure to potentially harmful or undesirable information.  Therefore, it is a parent or guardian’s responsibility to monitor and control the internet usage of minor children.  The library will implement filters that endeavor to identify sites that would not comply with the provisions of CIPA, bur will not apply filters to generic word lists or lists of sites not relevant to CIPA.

The Library’s computers are also subject to access by law enforcement authorities, acting through federal or state law.  The Library will cooperate in the prosecution of violations arising out of use of its computers for illegal purposes and activities.

Guidelines for Use:

Therefore, library users may not perform the following actions and Library staff shall intercede when these policies are violated.

Persons using library-supplied Public Access Computers or wireless internet services may not:

  1. Use these services in a way that violates local, state or federal law. Illegal acts involving Library resources may be subject to prosecution by local, state or federal officials.  Electronic gambling via the Library’s computers is strictly prohibited by this policy.
  2. Post, transmit, access or display obscene and illegal material. This includes sending, receiving or displaying inappropriate materials, defined as text or graphics.
  3. Use the services for illegal or criminal purpose.
  4. Use the services to harass or defame others.
  5. Violate copyright laws or software licensing agreements.
  6. Use sounds or visuals which may be disruptive to others.
  7. Violate another Library user’s privacy.

Persons using library-supplied Public Access Computers may not:

  1. Attempt to change any pre-established system configurations.
  2. Install or download any software onto the computer hard drive or BIOS.
  3. Damage computer equipment or software.

Further Guidelines for Use:

  1. Communication services such as email, instant messaging and social networking sites are only available as internet services. The library does not provide accounts or storage for these services.
  2. Patrons may save data to preformatted discs, or to their own flash drives. They may not save to the hard drives of library computers.  If a working copy of a document is left on the library computer, there should be no expectation of that document or file being available at a future session.
  3. If a library computer user finds a site that is inadvertently and inappropriately blocked by a filter or other technological impediment, the user may report the site to staff. Staff will endeavor to review this site and determine whether it is actually being actively filtered, and if so, whether it should be and whether to permit temporary or unlimited access.

Security:

The Library endeavors to protect the privacy and confidentiality of library users.  Internet users should be advised, however, that because security is technically difficult to achieve, electronic transactions and files could become public.

Please note that the wireless access provided by the library is non-secured and potentially subject to monitoring by third parties within range of the building and with the technical capability to do so.

Patrons must be responsible for protecting their privacy and the confidentiality of their information.

Enforcement:

Enforcement of this policy will be done in accordance with the library’s behavior policies.