By logging on to a Morrisson-Reeves Library computer or wi-fi you are agreeing to abide by
the terms listed below in addition to adhering to all other library policies and procedures.
- Food and drinks are not allowed at the Computer Workstations.
- Use your Evergreen Library card to log onto a computer. Visitors may request a guest pass
at a Service Desk. Wi-Fi access is open and does not require user login or a password. - Users age twelve and younger have access to public computers in the Youth Services area.
Users thirteen and older have access to the public computers located outside of the Youth
Services area. - Computers are available on a first come, first served basis. Computers check out for 60
minutes with possible time extensions as long as there are no reservations on that
computer. A reservation system is available to ensure that anyone waiting for a computer
has the opportunity for access before current users are allowed additional time. There are
Express Computers that allow 30-minute sessions with possible extensions allowed. There
is a 6-hour limit per day for patrons and 2-hour limit per day for visitors. - Any and all materials saved on a Library computer are automatically deleted upon
shutdown and cannot be recovered. - Sexually explicit or sexually suggestive (obscene/pornographic) material access and/or
viewing is prohibited. - Attempts to reconfigure or change library technology will be grounds for loss of computer
privileges. - Computer sharing is allowed based on space availability.
During Computer Classes
Only class attendees and MRL staff are allowed in the research lab while a class is being
conducted.
TECHNOLOGY USE POLICY
Access to Government Publications
Morrisson-Reeves Library is a Federal and State depository library. As such, any person, including
unaccompanied minors, has the right to access government publication regardless of library standing.
Citizens that are unable to connect using the library’s public access computers for any reason will be
provided with mediated (staff-assisted) access. Mediated access should be requested at the
Information Services desk.
Warning about Security and Confidentiality
Internet activities can be extremely vulnerable to unauthorized access and modification. For this
reason, electronic communication and work carried on via MRL computer stations is not considered
confidential. When necessary such communication may be used as evidence in criminal
investigations and/or prosecutions. Evidence of illegal activity may prompt MRL to report such activity
to legal authorities.
Display/Dissemination of Sexually Explicit Materials
Display or dissemination of sexually explicit or sexually suggestive (obscene or pornographic)
material is prohibited. Violators of this policy may be removed from the library building and may have
their library privileges revoked.
Legal Use
The public may only use computers for legal purposes. Examples of unacceptable purposes include,
but are not limited to, the following: harassment of others; libeling or slandering others; destruction of
or damage to equipment, software, or data belonging to the Library or others; disruption or
unauthorized monitoring of electronic communications or unauthorized copying of copyright-protected
material.
Ethical Use
Computers should be used in accordance with ethical standards of the Library. Examples of
unacceptable use (some of which may also have legal consequences) include, but are not limited to
the following: violation of computer system security; unauthorized use of computer accounts, access
codes, or network identification numbers assigned to others; use of computer communications
facilities in ways that unnecessarily impede the computing activities of others (randomly initiating
interactive electronic communications or email exchanges, overuse of interactive network utilities, and
so forth); violation of software license agreements; violation of network usage policies and regulations
or violation of another user’s privacy. The Library endorses the practice of responsible use of
computing equipment. It includes refraining from the following: overuse of connect time, printing
facilities or processing capacity; overuse of interactive network utilities; use of sounds and visuals,
which might be disruptive to others or use of any computing resource in an irresponsible
manner.
Sanctions
Violations of the policies described above for legal and ethical use of computing resources will be
dealt with in a serious and appropriate manner. Illegal acts involving Library computing resources
may also be subject to prosecution by local, state or federal authorities.
Disclaimer
Since the Internet is a global electronic network, there is no regulatory control of its users or content.
The Internet and its sources may contain controversial material. The Library cannot censor access to
material not protect users from offensive information. Parents of minor children must assume
responsibility for their children’s use of the Internet through the Library’s connection. Library staff
cannot control the availability of information links that often change quickly and unpredictably. Not
all sources on the Internet provide accurate, complete, or current information. Users need to be good
information consumers, questioning the validity of the information. MRL assumes no responsibility for
any damages, direct or indirect, arising from use of the Internet, the public access computers or the Library’s
wireless access points.
Limitation of Liability
By using a Library computer or connecting to the Library’s WiFi, the user acknowledges that he/she
has read and understands the Morrisson-Reeves Library Technology Use Policy. The user
acknowledges and agrees that Morrisson-Reeves Library assumes no liability for any loss or damage
to the user’s data or equipment. The user further acknowledges and agrees that Morrisson-Reeves
Library assumes no liability for any damage or injury arising from invasion of privacy occurring
through any computers/electronic devices, accounts, programs, or files.
Approved 12/17/99, Revised 12/15/00, Revised 6/21/02, Revised 5/23/03, Revised 6/15/12, Revised
7/19/17, Reviewed 02/21/22