Policy for Use of the Internet

Print

Policy for Use of the Internet

Use of the Internet implies agreement with the Internet Use policy.

If you DO NOT agree with the policy, EXIT IMMEDIATELY!

 

I. Purpose

To establish guidelines and protocols for staff to use in assisting Library's customer use of the Internet through the Library's various public access computer terminals.

 

II. Policy

The Mesa Public Library offers one hour per day per user, and unlimited wireless, filtered public access to the World Wide Web as an integral part of its reference and informational services. It provides direct access to selected sites to obtain information not contained in its printed or in-house electronic collections. It also provides a variety of search engines for access to other information sites.

The Library's Materials Selection Policy is used for selection of recommended sites linked to the Library Homepage. Sites accessible through the search engines reflect the diversity of resources available from many countries and cultures. The Library cannot be responsible for the accuracy, authority, or timeliness of these sites. All sites are located on the computers at locations outside the control of the Mesa Public Library. Thus the Library cannot completely protect its patrons from information and images which they may find offensive or disturbing.

The City of Mesa does maintain and support a web-site filtering utility that endeavors to maintain, block or obstruct access to pornographic or sexually specific sites. The intent of the filtering is to block obscene or sexually explicit sites. (See Arizona Revised Statutes ARS 13-3501, ARS 13-3502, ARS 13-3506, ARS 13-3507).

However, no filtering or monitoring program is completely effective. Parents and legal guardians have the responsibility to oversee their child’s exposure to and use of the Internet. Parents and children are encouraged to read Child Safety on the Information Highway (brochure also available) and to seek guidance from the Library staff regarding sites of interest to children and youth.

If a patron wishes to access a site that is blocked by filtering software, that patron may submit a request to have the site unblocked. Please go to the Ask Here desk for a form. Library staff will review the requested site for possible unfiltering. This review may take up to one week. Request forms are also available at any reference desk.

Under provisions of ARS 41-1354, the Mesa Public Library is required to protect the confidentiality of its patrons' borrowing and library use records. That privacy cannot be guaranteed for the patrons using the Library's terminals to access other computer sites. All users are advised that the Library cannot control a user's privacy if the user provides personal information of any kind while using its terminals to access sites not under the control of the Library.

The Mesa Public Library is not a full-service Internet provider. The Library does not provide e-mail accounts or file transfer protocols (FTP) and does not support access to bulletin board systems (BBS), newsgroups (Usenet), Internet relay chat (IRC), multi-user domain (MUD), or other on-line games.

Library equipment used to access electronic resources and/or networks may only be used for lawful purposes by Library patrons and staff. Illegal or unethical use includes violation of federal, state or local laws and regulations. Illegal use, access to sites that interfere with performance of the Library's computer system, and attempts to damage or alter the configuration of the Library's computer equipment or software will result in revocation of Library use and may involve legal prosecution.

III. Customer Responsibilities

Computers are located in public areas shared by people of all ages and backgrounds. Internet users must be considerate and respectful of other library users, and especially mindful of children in the Library, particularly when accessing information or images others may find offensive. All users of the Internet are expected to use this resource in a manner consistent with the educational and informational purposes for which it is provided and according to the policy stated above. Examples of acceptable and unacceptable use of the Internet include:

Acceptable Behavior

  • Refraining from illegal or unethical use, including violation of federal, state, or local laws and regulations.
  • Respecting intellectual property rights by making only authorized copies of copyrighted or licensed information or software on the Internet.
  • Respecting the privacy of others by not misrepresenting oneself as another user; by not attempting to modify or gain access to files, passwords, or data belonging to others; and by not seeking disallowed access to any computer system via the Internet.
  • Refraining from damaging or altering the configuration of the equipment to access the Internet or the software or data residing on the Internet.
  • Respecting the needs of other library users by conducting research in calm surroundings without interference from others.
  • Disconnecting from remote sites and retiring to the Library's Homepage when research is completed.
  • Relinquishing the computer terminal to another when time limits are imposed by staff.
  • Supervising any children's use of the Library's electronic resources in order to limit damage from play.
  • Understanding, as a parent, that you, not Library staff, are responsible for your children's use of the Internet and other electronic information resources accessed through a Library computer terminal.

Unacceptable Behavior

  • Abuse of timing, reservation system, i.e. using multiple library cards. Harassment or stalking of other Library patrons.
  • Destruction of, damage to, or unauthorized modification of equipment, software, or data belonging to the Library or others users (ARS 13-2316).
  • Unauthorized or illegal copying of copyright-protected material (US Code, Title 17).
  • Attempting to upload, download, install, set-up, run or execute any program or software not authorized by the Library.
  • Violation or attempted violation of computer system security.
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
  • Use of electronic communications facilities in ways that unnecessarily impede the activities of others (such as randomly initiating interactive electronic communications or chat exchanges, overuse of interactive network utilities, etc.).
  • Importing explicit sexual material into the Library by displaying explicit sexual materials as defined in (ARS 13-3506, ARS 13-3507).
Violation of the policies or these guidelines governing the use of the Library's Internet resources may result in the loss of Library privileges.Violators of the policies described above for legal and ethical use of electronic resources will be dealt with in a serious and appropriate manner. Illegal acts involving Library electronic resources may also be subject to prosecution by local, state or federal authorities. I have read and understand the Library's policy on public use of the Internet.