top of page

Internet Use

 

 

The Internet is an essential medium for obtaining and transmitting information of all types. Therefore, public access to the Internet is germane to the Library Service's mission.

 

However, the Internet is an unregulated medium. It also provides access to information that is inaccurate, illegal, or that some may find offensive or disturbing. The Library will identify on its web site specific Internet sites that have potential interest for Library users, but the Library cannot control a user's access to other Internet resources.

 

Responsibilities of Library Staff and Users

 

Library staff will not monitor a patron's Internet use. The user, or the parent of a minor, is responsible for his or her Internet session, the material accessed, and any material printed at all times.

 

The Library reserves the right to terminate an Internet session that disrupts library services or that involves user behavior that violates the Library's policies.

 

As with all Library resources, the Library affirms the rights and responsibilities of parents/guardians, NOT Library staff, to determine and monitor minor children's use of the Internet. (Minors are defined in this policy as children and young people, aged 17 or younger.) Parents/legal guardians are responsible for their minor children's use of the Library's resources and facilities. Parents who believe that their children cannot responsibly use the Library's Internet access are requested to monitor their children's Internet use.

 

Disclaimers

 

While the Library endeavors to provide access to information of the highest quality, the Library specifically disclaims any warrant as to the information's accuracy, timeliness, authoritativeness, usefulness, or fitness for a particular purpose.

 

The Library will have no liability for direct, indirect, or consequential damages related to the use of information accessed through the Library's Internet service.

 

The Library, which incorporates filtering software provided by the Internet service provider under contract with the State of Mississippi, applies filtering on all computers and has no liability for damages related to the operation of, or failure of, filtering, or its circumvention by users.

 

Since software and information downloaded from any sources, including the Internet, may contain viruses or other harmful programs, users are advised to utilize anti-virus and/or anti-malware on their home computers. The Library is not responsible for damage to users' portable hardware or computers or for any loss of data, damage, or any other liability that may occur from use of the Library's computers.

 

Unacceptable Uses of Computers

 

Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:

  • Uses that violate the law or encourage others to violate the law. Transmitting offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; viewing, transmitting or downloading pornographic materials or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.

  • Uses that cause harm to others or damage to their property. Engaging in defamation (harming another's reputation by lies); uploading a worm, virus, trojan horse, or other harmful form of programming or vandalism; participating in illegal hacking activities or any form of unauthorized access to other computers, networks, or information systems.

  • Uses that jeopardize the security of access of the computer network or other networks on the Internet. Disclosing or sharing a user's password with others; impersonating another user; altering the Library's computer settings; damaging or modifying computer equipment or software.

  • Uses that compromise the safety and security of minors when using e-mail and other forms of direct electronic communications: Minors under age 17: Giving others private information about one's self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has "met" on the Internet without a parent's permission; or participating in chat rooms or other interactive sites without a parent’s permission.

  • Uses that Violate Confidentiality of Information: Records maintained by any library funded in whole or in part by public funds, which contain information relating to the identity of a library user, relative to the user's use of books or other materials at the library, shall be confidential. Such records may only be released with the express written permission of the respective library user or as the result of a court order. Mississippi Code of 1972, Annotated, §39-3-365. Personally identifiable information about users may not be disclosed or used in any way, except to law enforcement authorities as provided in the law. Users should be aware, however, that due to the technical difficulties involved in providing absolute security, transactions and files may become public.

 

Procedures

 

Library staff will develop such rules and procedures including, but not limited to, computer hardware and/or software measures, as are necessary to ensure the fair and reasonable use of Internet access.

 

Response to Violations

 

The user's access to the Library's network and to the Internet is a privilege, not a right. A user violates this policy by his/her actions, or by failing to report any violations by other users that come to the attention of the user. Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user's right to access computers.

 

Computer / Internet Acceptable Use Policy

 

Technological services, in particular public computers, Microsoft Office, and other software programs, as well as access to the Internet, are among the services offered by the Carnegie Public Library. The purpose of library-provided access to technological services is to supplement existing resources. Access is a privilege, not a right, and requires responsibility on the part of the user.

 

Misuse of the public computers, or violation of these guidelines, will result in the following:

 

  • For a first offense, the user will be denied use of the computers for 3 months

  • For a second offense, the user will be denied use of the computers for 6 months

  • For a third offense, the user will be denied use of the computers for one year

  • At the end of the prohibition, the person may ask for reinstatement of privileges.  Reinstatement will be at the discretion of the library director based on the person’s past behavior in the library.

  • Unacceptable behavior may result in the patron being asked to leave the library, or, in the case of a criminal offense, the police being contacted.

  • In some cases, extreme violations of these guidelines may result in criminal prosecution.

 

Computer Use Guidelines

 

To assure compliance with library policies, the Library reserves the right to visually and electronically monitor patron use of public computers. Patrons should have no expectations of privacy when using the Library’s public computers. Patrons should also be aware that data may be retrieved by law enforcement authorities if criminal activity is suspected.

 

The Library employs the use of Time and Print Management software (Envisionware) to monitor public computers. This software requires that all users agree to the Library’s Computer/Internet Use Policy. It also requires that all pages requiring printing be paid in advance to Library staff.

 

Public computer use is available at no charge. A patron whose record reflects an unpaid balance owed to the Library is required to pay it in full before they may access a computer.

 

A visitor’s card will be provided for any non-resident who presents a valid picture identification card to staff.

 

Computer use time will be limited to one-half hour sessions. Patrons who wish to reserve a public computer may do so on a first-come, first-served basis through the reservation station or by requesting staff do so. Reservations may be made for the current day only. Sessions may be renewed if no one is waiting or has a reservation. Total time per day is limited to two hours per person.

 

During non-school hours, public computer use for school-related purposes (i.e., term papers, research, etc.) will be given first priority. That decision will be left to the staff on duty.

 

Printing is available at a reimbursement fee of $.25 per page for black and white, $.75 for color, and $1.50 for color ledger-sized print-outs.

 

Headphones are available for purchase for $1.25 at the Circulation Desk.  Personal headphone use is permitted.

 

Patrons needing to save their work may ask for assistance with cloud-based storage (Google Drive, Dropbox, etc.) or may use a flash drive, which may be purchased for $10 at the circulation desk. The Library assumes no responsibility for damages incurred to personal storage devices or to another computer due to viruses, spyware, harmful programs, or other corrupted files contained on devices used with the Library’s computers.

 

Changes to settings on library computers are prohibited.  Violators may have computer use privileges revoked.

 

In several areas of the building, wireless access to the Internet is available. Users are to abide by the Library’s Computer/Internet Acceptable Use Policy as well as the Wireless Computer/Internet Access Policy.

 

The Library provides public computers, restricted to use by children age 14 and under, in the Children’s Department and to children 13-17 in the Teen Room

 

No more than two people may be seated at a computer.

 

Use of a public computer or the Internet to engage in any activity which constitutes violation of local, state, and/or federal law, including, but not restricted to, identity theft, violation of copyright law, or acts of a criminal nature, is strictly prohibited.

 

Changes to public computer system files are prohibited; violators may be punishable by law under any or all of the Mississippi Code 1972, Annotated: §97-45-3, §97-45-7, or §97-45-9.

 

Amended and Revised by the Board of Trustees February 17, 2015


Internet Provisions

 

 

Patrons who wish to use the public computers provided for Internet access are advised of the following:

 

  • Computer Use Guidelines must be adhered to at all times.

  • Security of credit card numbers or any other personal information given over the Internet cannot be guaranteed.

  • Patrons may not access sites which display text or graphics which may reasonably be construed as obscene, pornographic, violent, or which espouse drug use or other illegal activities, or condone violence or discrimination toward others.

  • Filtering is provided through the Internet service provider under contract with the State of Mississippi.

  • Staff may assist patrons only as time allows. The Workforce Center provides free computer training. Patrons may also request an appointment for help with specific issues (downloading an app, setting up e-book checkout, etc.)

 

The Carnegie Public Library considers public computer use and/or access to the Internet as a privilege, not a right, for its patrons. Inappropriate use or violations may result in the cancellation of this privilege.

 

All referenced policies were approved by the Board of Trustees and are on file in the Director’s Office, at the Information and Circulation desks, and at the Children’s Librarian’s desk.

 

The Board of Trustees reserves the right to modify this policy at any time.

 

Amended and Revised by the Board of Trustees February 17, 2015

 

 

 

Children’s Computer Use Policy

 

  • Computers are available in the children’s section of the Library and in the Teen Room.

    Use is restricted to children ages 2 through 14 for the Children’s Room and 13-17 for the Teen Room

    Computer Use time will be “checked out” on the child’s library card, providing the child’s record is free of overdue fines and/or fees

    A “Visitor’s Card” is available for guests/non-residents

 

  • Computer Use Time

    Time is limited to half-hour sessions

    Sessions are restricted to one per child, per day, as demand dictates

    If no one is waiting to use a children’s computer, the session may be extended

    Maximum use per child, per day is 2 hours

     During non-school hours, computer use for school-related purposes (i.e.,    

     term papers, research, etc.) will be given first priority. That decision will

     be left to the staff on duty.

 

 

  • Headphone Use

    Headphones are available for purchase for $1.25 at the Circulation Desk

    Personal headphone use is permitted

 

  • Program availability

    Unrestricted Internet access is not permitted

    Use of personal software programs is not permitted

 

  • Printing

    Available from the system printer at the Circulation Desk

    Charges for prints are the same as outlined in the general Internet policies

 

  • Responsibilities

    Parents / Guardians are responsible for Children’s use of computers

    Parents / Guardians may deny their child(ren) access to the library’s computers by filling out a Parental Request Denying Child(ren) Computer Access form. 

    Parents / Guardians should be aware of the terms of the Board approved, Child Safety Policy.

 

Amended and Revised by the Board of Trustees February 17, 2015


Wi-Fi ACCESS POLICY

 

The Carnegie Public Library offers free Wi-Fi for Library patrons to use with their own personal laptops or other mobile devices. These access points are unsecured and filtered to comply with CIPA regulations. A patron’s use of this service is also governed by the Carnegie Public Library’s Internet and Electronic Information Resource Use Policy, a copy of which is available at the Circulation Desk. Users who wish to utilize this service do so under the following conditions:

 

  • Access to printers is not available via the wireless connection. If you need to print, please save your work to a USB drive, or email files to yourself, then login to a wired Library workstation and send print jobs to the public printer.

 

  • Signal strength may vary, depending on your location within the Library. Access is not available in all areas of the Library.

 

  • Library staff can advise you on troubleshooting connections only as time permits. The Library cannot guarantee that your device will work with the Library’s Wi-Fi.

 

  • All users are expected to use the Library’s Wi-Fi in a legal and responsible manner, consistent with the educational and informational purposes for which it is provided.

 

  • As with most public Wi-Fi, the Library’s wireless connection is not secure. There may be untrustworthy parties between you and anyone with whom you communicate, and any information being transmitted could potentially be intercepted by another wireless user. Cautious and informed wireless users should choose not to transmit personal information (credit card numbers, social security numbers, home addresses, PINs, passwords, online banking information, etc. or any other sensitive information) while using any public Wi-Fi. Please take appropriate precautions when using this service.

 

  • All Wi-Fi users should have up-to-date virus protection on their laptops or mobile devices. The Library will not be responsible for any information that is compromised or for any damage caused to your hardware or software due to electric surges, security issues or consequences caused by viruses or hacking.

 

  • All Library policies apply to wireless access users.

 

  • Use of the Library’s wireless network is entirely at the risk of the user. The Library disclaims all liability for loss of confidential information, damages resulting from that loss, or damages to personal devices as a result of use of the Library’s wireless network.

 

 

 

Amended and Revised by the Board of Trustees February 17, 2015

 

bottom of page