By logging on to a Morrisson-Reeves Library computer you are agreeing to abide by the terms listed below in addition to adhering to all other library policies and procedures.
RULES for TECHNOLOGY USE
1. A user of the library’s public access computer must be an MRL library cardholder or an individual possessing acceptable identification.*
2. MRL library cardholders must meet existing MRL rules for checking out materials and/or equipment.*
3. The patron that checked out the computer must be present.
4. Users age twelve and younger have access to public access computers in the Youth Services area. Users older than twelve have access to the public access computers located throughout the library outside of the Youth Services area. “Teen Only” computers, for users 13-18 years old, are located just outside the Teen Space.
5. All public access computers have a time limit that will be enforced accordingly. Computer use is on a first come, first served basis. Additional time is allowed if no one is waiting. A reservation system is available to ensure a patron waiting for a computer is given the opportunity for computer time before someone whose time limit has been reached is allowed to add additional time.
6. Sexually explicit or sexually suggestive (obscene/pornographic) material access and/or viewing in prohibited.
7. Attempts to reconfigure or change hardware will be grounds for revocation of computer privileges.
8. Computer sharing is allowed based on space availability.
9. Users of the Library’s wireless access services must comply with all applicable rules and guidelines in this policy.
*Any patron who wants to access government documents and does not meet the requirements stated in #1 and #2 above will be provided with mediated (staff-assisted) access. Mediated access should be requested at the Information Services desk.
TECHNOLOGY USE POLICY
Access to Government Publications
Morrisson-Reeves Library is a Federal and State depository library. As such, any person, including unaccompanied minors, has the right to access government publication regardless of library standing. Citizens that are unable to connect using the library’s public access computers for any reason will be provided with mediated (staff-assisted) access. Mediated access should be requested at the Information Services desk.
Warning about Security and Confidentiality
Internet activities can be extremely vulnerable to unauthorized access and modification. For this reason, electronic communication and work carried on via MRL computer stations is not considered confidential. When necessary, such communication may be used as evidence in criminal investigations and/or prosecutions. Evidence of illegal activity may prompt MRL to report such activity to legal authorities.
Display/Dissemination of Sexually Explicit Materials
Display or dissemination of sexually explicit or sexually suggestive (obscene or pornographic) material is prohibited. Violators of this policy may be removed from the library building and may have their library privileges revoked.
The public may only use computers for legal purposes. Examples of unacceptable purposes include, but are not limited to, the following: harassment of others; libeling or slandering others; destruction of or damage to equipment, software, or data belonging to the Library or others; disruption or unauthorized monitoring of electronic communications or unauthorized copying of copyright-protected material.
Computers should be used in accordance with ethical standards of the Library. Examples of unacceptable use (some of which may also have legal consequences) include, but are not limited to the following: violation of computer system security; unauthorized use of computer accounts, access codes, or network identification numbers assigned to others; use of computer communications facilities in ways that unnecessarily impede the computing activities of others (randomly initiating interactive electronic communications or email exchanges, overuse of interactive network utilities, and so forth); violation of software license agreements; violation of network usage policies and regulations or violation of another user’s privacy.
The Library endorses the practice of responsible use of computing equipment. It includes refraining from the following: overuse of connect time, printing facilities or processing capacity; overuse of interactive network utilities; use of sounds and visuals, which might be disruptive to others or use of any computing resource in an irresponsible manner.
Violations of the policies described above for legal and ethical use of computing resources will be dealt with in a serious and appropriate manner. Illegal acts involving Library computing resources may also be subject to prosecution by local, state or federal authorities.
Since the Internet is a global electronic network, there is no regulatory control of its users or content. The Internet and its sources may contain controversial material. The Library cannot censor access to material not protect users from offensive information. Parents of minor children must assume responsibility for their children’s use of the Internet through the Library’s connection. Library staff cannot control the availability of information links that often change quickly and unpredictably. Not all sources on the Internet provide accurate, complete, or current information. Users need to be good information consumers, questioning the validity of the information. MRL assumes no responsibility for any damages, direct or indirect, arising from use of the Internet, the public access computers or the Library’s wireless access points.
Limitation of Liability
By using a Library computer or connecting to the Library’s WiFi, the user acknowledges that he/she has read and understands the Morrisson-Reeves Library Technology Use Policy. The user acknowledges and agrees that Morrisson-Reeves Library assumes no liability for any loss or damage to the user’s data or equipment. The user further acknowledges and agrees that Morrisson-Reeves Library assumes no liability for any damage or injury arising from invasion of privacy occurring through any computers/electronic devices, accounts, programs, or files.
Approved 12/17/99, Revised 12/15/00, Revised 6/21/02,
Revised 5/23/03, Revised 6/15/12, Revised 7/19/17