Internet and Computer Use Policy
With regard to advances in technology and the growing needs of our communities, Olson Memorial Library endeavors to develop collections, resources, and services that meet the cultural, informational, recreational, and educational needs of the area. Access to the Internet is one of the services available to the public. Use of the computers implies agreement to comply with the library’s Internet and computer use policy.
All Internet resources accessible through the library are provided equally to all individuals to use at their own discretion. Olson Memorial Library does not censor access to material nor protect users from information they may consider offensive. The library’s policy does not contain a provision for the staff to monitor specific use of its public computers.
Therefore, parents and/or guardians who are concerned about access to Internet sites will be responsible for supervision of minor children in their care who use the library’s computers. Children under 16 years of age must show their library card to use the public computers. Good judgment and common sense are important when accessing sites on the Internet. Any activities that violate the rights of others to enjoy online use, or other services of the library, will result in direction to discontinue them. If such activities continue, computer privileges may be revoked. In extreme cases, violations of this policy may result in banishment from the library for a period of time to be determined by the library director.
Library staff will provide informal assistance (up to 10 minutes) when free to do so. Books and manuals with instructions on programs are available in the library collection and at the Internet stations.
USING THE LIBRARY COMPUTERS
In order to access the Internet, a person must have either a library card or, in the case of a visitor, a guest logon that may be obtained upon showing proper identification at the Circulation Desk.
The sign-up desk is the stand-alone desk next to the catalog computer. A monitor on the desk records the last four digits of your library card and the maximum time you will wait.
When your number reaches the top of the list, it will be highlighted in orange to indicate a computer is available. You will have 5 minutes to log onto your computer.
Library cardholders who have fines, bills, or other fees ($5.00 or more) on their accounts will be blocked from Internet use until their accounts have been cleared.
Cardholders under the age of 16 must have their library card with them to use a computer.
Internet use is available on a first-come, first-served basis. Computers are set up for single individual use. Permission must be obtained from library staff for more than one person to use a single computer.
Each person is limited to 45 minutes per session, or 90 minutes per day on regular computers. Sessions may be extended if no one else is waiting for a computer.
A black and white laser printer connected to all public computers is located at the end of the circulation desk. Persons wishing to print will be charged 10 cents per page. Pick up prints and pay at the circulation desk.
Personal software programs may not be installed on the workstations; personal software products may not be run. Personal laptop computers or mobile computer devices are not allowed on the local area network.
Persons who intend to use thumbnail drives, flash drives, personal floppy disks, compact discs, or other personal hardware in library computers must bring them to the staff at the circulation desk to be scanned with an anti-virus program. Preformatted disks are available at the desk for $1.00 per disk. CDs are available at $0.50 per disc. 2 GB flash drives are available for $7.50 and personal headphones can be purchased for $6.00.
Please log out of all programs that require a password. The internet is not a completely secure environment. Customers who handle financial transactions or other activities that require confidentiality do so at their own risk.
Activities prohibited under this policy include but are not limited to:
Violation of any federal or state law
False identification of oneself as another user
Acts of a threatening, harassing, or obscene nature
Unreasonable noise or disruptive conduct
Tampering with computer hardware
Attempting to violate computer security
Abuse of equipment
Installing software or running programs that have not been installed by the library