Computer Use Policy

Last Updated:

Computer Use Rules

ndividuals are expected to use Library workstations in a courteous, reasonable and responsible manner. The Library is a public place. Users must use discretion in displaying text or graphics which may be offensive to others. The viewing of pages which display graphic pornography is inappropriate for a public and open environment and is prohibited.


The Library prohibits unlawful use of the Internet by any users. No person may send, receive, view or download any illegal material.


No one is permitted to use Library equipment to access obscenity and child pornography. Staff will actively intervene when they observe such behavior or it is brought to their attention.


Computers are available on a first come first served basis. Library users must sign up for blocks of time to use Library workstations. The Library reserves the right to limit and/or schedule workstation usage to accommodate the largest number of customers. Computer users must present a valid Library card to signup and log on to Library computers. Sessions are ½ hour long. Continued use is allowed provided no other users are waiting.


The public is not allowed access to the computer’s operating system, general software, or hard drives. Web access computers and software are secured and must be used as installed. Tampering with PC security which protects computers is prohibited.Only one person at a time may use a Library workstation.


Activities which disrupt the Library or its network are prohibited.


Computer users who deliberately tamper with computers will be charged for damaged equipment and/or software and legal action may be taken against them.


When conveniently available the public may use electric outlets for personal computer equipment. Phone lines or network connections for personal modems or networking are not available.


Library Staff Members are not responsible for computer equipment, software malfunctions or lost data.

The Library strives to keep computers working and available. However, Library computers may be unavailable to the public due to maintenance, upgrade, training or other reasons.


The Library can not guarantee the security of personal information transmitted over the Internet.


Failure to comply with these rules will result in loss of Internet and/or computer access.

 

WiFi Computer Use Rules

 

  1. The Library is a public place and used by people of all ages. Users are expected to use the library’s wireless access in a courteous, reasonable and responsible manner. Wireless users are asked to use discretion in displaying text or graphics which may be offensive to others.
  2. The Library prohibits use of the Internet for any illegal purpose. No person may: send, receive, view, or download any illegal material; degrade or disrupt equipment or system performance; vandalize the data of any other user; invade the privacy of individuals; violate federal, state, or local copyright laws or regulations.
  3. No one is permitted to access obscenity and child pornography. Staff will actively intervene when they observe such behavior or it is brought to their attention. WiFi privileges will be suspended or revoked.
  4. Activities which disrupt the Library or its network are prohibited.
  5. The Public may use electric outlets for personal computer equipment. Phone lines or hardwired network connections for networking of personal hardware are not available.
  6. Library Staff Members are not responsible for individuals’ personal computer equipment, software malfunctions or lost data. WiFi users should be certain that their laptops and other devices are secure at all times and should never be left unattended in the Library, even for brief periods of time. Theft of such devices is not the responsibility of the Library.
  7. The Library strives to keep Wifi access points working, available, and functional for all. However, bandwidth and transmission speed may be affected due to number of wireless users actively online, maintenance, upgrade, training or other reasons.
  8. As with most public wireless “hot spots,” this wireless connection is not secure. Another wireless user can potentially intercept any information being transmitted. The Library recommends that you do not transmit personal information such as credit card numbers and other personal identification numbers, or other sensitive information while using any wireless “hot spot.” WiFi users assume all risks and responsibilities to provide anit-virus software protection and appropriate security settings on their laptops.
  9. Failure to comply with these rules will result in loss of Internet and/or computer access.


Disclaimer: Use of the Cecil County Public Library’s wireless network is entirely at the risk of the user. The Library disclaims all liability for loss of confidential information or damages resulting from that loss.

 

Download Policy