Skip to main content

Bryan-Bennett Library

Computer and Internet Use Policy

Computer and Internet Use Policy

The purpose of this policy is to define the appropriate use of the technology resources available to the patrons of Bryan-Bennett Library.  These technology resources include computer equipment and software and the wireless internet connection.  This policy is used in conjunction with all other library policies, as well as all federal, state, and local laws.  The patron’s use of the library’s technology resources constitutes acceptance of this and all other applicable library policies.

Bryan-Bennett Library is not responsible for any loss or corruption of data, or damage to personal hardware or storage devices, or any liability that may occur through the use of the library’s network.

Staff are limited in their ability to enter data or fill out any online forms for any library user.  Internet users should be familiar with computer use.

The library may place limitations on time and manner of computer use in order to allocate computer and internet access as equitably as possible.

Bryan-Bennett Library has no control over information accessed through the internet.  The library only maintains the information found on their own website.  The information found online is not always accurate, reliable, or appropriate.  The Library does not endorse, sanction, or promote any content found on the internet, nor is it responsible for any damage, direct or indirect, arising from a library patron’s use of information obtained online.  Sharing personal information and/or the transfer of money (for purchase or otherwise) will be done at the patron’s own risk.

 

Responsible Use

The use of the library’s technology resources are a privilege.  As such, users should respect the library equipment and the rights of other users.

Those who want to use the library’s computers do not have to possess a library card, but must provide a valid ID and sign the Computer User’s Agreement and abide by this and all other library policies.  Users must check in at the circulation desk and show ID before each computer session.  The agreement is only signed the first time the equipment is used, and is stored at the library for future use.

 

Violations

  • Users may not use the library’s equipment and/or technology to perform any illegal activity or violate federal, state, and local laws or codes.
  • Users may not vandalize or damage any library equipment. They may not download any software or attempt to disable the library’s security software.
  • Users must not disrupt or interfere with any other patrons or computer users. This includes displaying images, videos (with or without sound) that may be considered disruptive to other patrons or staff.  This may include graphic images or pictures and websites of a sexual nature.  Staff may terminate a session for a failure to comply with this policy. 

 

Juvenile Use

Parents or guardians of children, not the library board or the staff, are solely responsible for internet information accessed by their children.  Parents or guardians are allowed to restrict their children from computer access and/or internet usage, and are expected to supervise their child’s usage of these resources.  All children 15 and under must have a parent or guardian sign a consent form in order for their children to access the internet, as well as monitor their activities.

Parent or guardians will be held responsible for any physical damage or vandalism done by their children to any technology resources and for any illegal activity performed either knowingly or unknowingly by their children.  Bryan-Bennett Library is not responsible for damages done to personal equipment or activity performed by their child while using the wireless internet connection.

 

Consequences

The first violation of the Computer and Internet Policy will result in a loss of privileges for 30 days.  The second violation will result in a 90 day loss of privileges.  The third violation will result in permanent loss of technology privileges.

Patrons will be held legally and financially responsible for any damages done to technology resources, and for any illegal or unethical acts performed through our system.

In the event that a patron believes that the termination of computer privileges is unjust or unfounded, that patron may appeal to the Board of Trustees upon written request.