Computer and Internet Access
Acceptable Use Policy
The Anderson Public Library provides access to a broad range of information sources and services for the public, including access to computers and the Internet. The Internet is a global electronic network of ideas, images, information, and commentary that enables the library to provide enhanced resources beyond the physical collection of materials owned by the Library.
The Library uses technology protection measures, in accordance with federal law, to protect against access to visual depictions that are (1) obscene, (2) contain child pornography, or (3) are harmful to minors. The Library does not provide access to sexually explicit sites. Other web sites that have been determined by Library staff as sites that overburden or disrupt the Library’s computer network may also be inaccessible. Technology measures are imperfect and it is possible that legitimate sites may be erroneously blocked. Adults may request access to websites that are erroneously blocked.
Rules of Access:
All library visitors are able to access the Library’s public computers under the following rules:
- Library cardholders must have their library card with them to use the computers. If a cardholder does not have their card present, they may be issued a guest pass one time only with the presentation of a valid photo ID. Cardholders whose card has been blocked due to lost items, late fines, or other reasons will not be issued a guest pass. Additional use after a one time guest pass has been issued will require the cardholder to have their current card present or to purchase a replacement card.
- Non-residents, visitors, and others ineligible for a regular library card must obtain a temporary guest pass by presenting a valid ID to library staff.
- Computers are available on a first-come, first served basis. Requests for access may only be made in person at the time access is desired. No advance reservations will be accepted.
- Persons accessing a library computer must enter their guest pass code or library card number along with their personal identification number (PIN). This PIN is initially set by the Library but may be changed by the user at any time by accessing their library account online or by speaking to a library staff member.
- Users may not use someone else’s card to gain access to the computers. Using someone else’s card may result in the denial of computer access for the violator and the cardholder.
In order to provide equitable access, the Library uses an automated time-keeping and sign-up system. The library has established standard time sessions for all users. The library monitors usage patterns and may alter the length of standard sessions as needed to maintain equitable access for all users. The Library also reserves the right to shorten individual sessions or to deny a second session if other patrons are waiting for computers or if a substantial number of the Library’s computers are currently in use.
Rules of Use and Restrictions:
- Users must utilize headphones or earbuds so that sound is not audible to others.
- Users shall refrain from the use of visuals which disrupt the ability of other Library patrons or the staff to use the Library and its resources.
- Users may not attempt, in any way, to alter, damage, abuse, or sabotage computer equipment or software, alter configurations, or install additional software or hardware.
- Users may not use library computers in any way that violates the Library Patron Rules of Conduct, or pertinent state, federal, and local laws. Any illegal actions will be reported to the appropriate law enforcement authorities.
- Users may not take any action that will cause disruption to the normal operations of the Library or result in the invasion of privacy or harassment of others.
- Users are not allowed to directly connect a personal computer or other personal hardware device to any library computer or the Library network.
- A maximum of two users may use a single computer at one time.
- Food and drink are not allowed in the Library or at Library computers.
- Misuse of the Library’s computers and/or the Internet will result in loss of access to Library computers.
Printing from the Library’s computers is available for a charge. Payment must be made in advance before print jobs are released to the print station. It is the user’s responsibility to verify that they are requesting the correct item for printing before releasing a print job. The Library will not refund charges for items printed in error by users. The copyright law of the United States (Title 17 US Code) governs the printing of copyrighted material. The user of any Library computer is liable for any infringement.
Downloading is permitted only to portable storage devices. Users must provide their own storage devices. Downloaded materials will not be retained on the Library’s computers. Information and files downloaded from the Internet may contain malicious elements (like computer viruses) that could result in loss of data or damage to other computer equipment. The Library is not responsible for damage to a person’s storage media or for any loss of data, damage or liability that may occur from the use of the Library’s computers. Users are prohibited from downloading any software or applications from the Internet to a Library computer and from uploading software or applications from a personal device to a Library computer. No physical devices, other than portable storage devices (flash drives, USB drives) may be attached to any library computer.
User Risks and Responsibilities:
The Internet offers unlimited global access to information. However, not all sources on the Internet provide information that is accurate, current, legal, or philosophically acceptable to all citizens. The Library is unable to control the content of the materials on the Internet. Users of the Internet are responsible for their own choices.
Use by Juveniles
As with all Library resources, the Library affirms the right and responsibilities of parents and guardians NOT the Library staff, to determine and monitor their children’s use of the Internet. The Library staff is trained and employed to provide library services, not to provide child-care or supervision. The staff cannot and will not act to monitor a juvenile’s access to the Internet except within the parameters of this policy. Parents and/or guardians are responsible for the use of these resources by their own minor children.
The Library does not provide privacy for individual users. The sending or receipt of any information through the Internet is at the sole risk of the user.
The Library assumes no responsibility for any damages, direct or indirect, arising from use of its computers or from its connection to Internet services.
The Library provides access to the Internet for users who bring their own computer or other mobile device. Users are responsible for configuring their own equipment. The library does not provide technical support for establishing or maintaining a connection or equipment configurations. The library is not responsible for any changes made to an individual device’s settings and does not guarantee that a user’s hardware will work with the library’s wireless connection.
Wireless users agree to abide by all Rules of Use for this policy while using the Library’s wireless network.
The Library is not responsible for any damage caused to hardware or software due to electric surges, security issues or consequences caused by viruses or hacking. All wireless access users are individually responsible for maintaining up-to-date virus protection on personal computers or other mobile devices.
Printing to library printers is not available from wireless connections.
The wireless network is configured separately from the Library's wired public-access computer network and is offered without any guarantee of service. While every effort will be made to render the wireless network functional and useful, the Library reserves the right to make any restrictions necessary to make maintenance and support of the wireless network manageable and practical, including but not limited to the use of passwords, filtering, limits on the number of simultaneous users, and the prohibition of certain technologies and Internet features and functions.