Computer & Internet Use Policy
1. The following Computer Use Policy has been developed as a complement to relevant laws and policies to define acceptable and unacceptable computer use practices, to promote an understanding of responsible usage of Library computing resources, and to protect and conserve those computing resources. The policy is not intended to be exhaustive, and the Library reserves the right to limit, restrict, or extend computing privileges and access to its computing resources.
2. In support of its mission, the Library provides access to computing resources for its patrons and other authorized users. The computing resources of the Library, including hardware, software, networks, and computer accounts, are the property of the Library. The use of these resources is a privilege granted by the Library to authorized users only. The Library requires all persons authorized to use its computing resources to do so responsibly and in compliance with all state and federal laws, all contractual and license agreements, and all policies of the Library and its Board of Trustees.
3. Authorized users of the Library's computing resources must act responsibly to maintain the integrity and security of these resources. Each user of a computing resource is ultimately responsible for the use of that computing resource. Patrons misusing the Library's computing resources in violation of federal and state laws, Board of Trustees and City policies, or this policy are subject to forfeiture of their computer privileges. In the event such misuse of computer resources threatens to compromise the integrity or jeopardize the security of Library computer resources or harm authorized users of those resources, the Library is authorized to take any and all necessary actions, including the immediate confiscation and/or disabling of a Library computer resource or the temporary or permanent termination of a computer account, to protect, investigate, and ensure the security and proper use of computer resources.
4. Use of any Library computing resource is restricted to those having proper authorization to use that particular resource. It is a violation of the law and Library policy to assist in, encourage, or conceal from authorities any unauthorized use, or attempt an unauthorized use, of any of the Library's computers or network facilities.
5. No one shall knowingly endanger the security of any Library computing resource, nor willfully interfere with authorized computer usage by circumventing or attempting to circumvent normal resource limits, logon procedures, or security regulations. Furthermore, use of all Library computing resources shall be subject to all provisions of the Library’s policies on the matter, which are incorporated by reference as part of this Computer Use Policy.
6. No technologies shall be connected to the Library’s computing resources that interfere with authorized usage of those resources. The Library reserves the right to restrict the use of any technologies that may endanger the security and/or integrity of its computing resources.
7. The Library’s computing resources shall not be used to attempt unauthorized use, or to interfere with another person's legitimate use, of any computer or network facility anywhere. All users shall share computing resources and cooperate fully with the other users of the same equipment. Encroaching on or disrupting another person's use of Library computers is prohibited. Examples of such acts include but are not limited to: initiating denial of service attacks; modifying system facilities, operating systems, or disk partitions; attempting to crash or tie up a Library computer; damaging or vandalizing Library computing facilities, equipment, software, or computer files; causing an inordinately large number of requests for files; spamming; sniffing; running scans; reconfiguring; or using an inordinately high percentage of bandwidth.
8. Passwords to any computing resource shall only be issued to authorized users. Password recipients are responsible for the integrity of their password and shall not distribute it to unauthorized users.
9. Misrepresenting a person's identity or relationship to the Library when obtaining or using Library computer or network privileges is prohibited.
10. Accessing, reading, altering, or deleting any other person's computer files without specific authorization is prohibited.
11. Copying, installing, distributing, infringing, or otherwise using any software, data files, images, text, or other materials in violation of copyrights, trademarks, service marks patents, other intellectual property rights, contracts, or license agreements is prohibited. All usage of computing resources shall be in compliance with federal and state copyright laws.
12. Creating, installing, or knowingly distributing a computer virus, “Trojan horse,” or other surreptitiously destructive program on any Library computer or network facility, regardless of whether any demonstrable harm results, is prohibited.
13. Only those persons with proper authorization shall modify or reconfigure any Library computing resource or network facility.
14. Users of Library computing resources shall have no expectation of privacy of materials stored on those resources. The Library reserves the right to access any of its computer resources when federal or state laws or Library policies may have been violated or where Library operations may be impeded or when deemed in the best interest of the Library.
15. Patrons should not place confidential information in computers. The Library cannot and will not guarantee the privacy or confidentiality of computer files or other information stored or transmitted by its computers. All computer usage on Library computing resources and network facilities is subject to the provisions of the Iowa’s Open Records Laws.
16. Violations will be classified as major or minor based on the following considerations:
a. Intent of the person committing the violation
b. Sensitivity of resource compromised
c. Effect on the Library
17. The accessing or use of Library computers shall constitute acknowledgement of this waiver and disclaimer and shall be deemed acceptance of its terms and conditions.
Columbus Junction Public Library
8a: Internet Use Policy
1. The Library provides resources in a wide variety of formats to meet the cultural, informational, recreational, and educational needs of the diverse, multicultural community it serves. The internet is an integral part of the resources available to assist Library patrons in finding the information they need.
2. The internet is a global electronic network. The Library assumes no responsibility for any damages, direct or indirect, arising from use of its computer network or from its connection to other internet services. The internet is a continually evolving resource and the information and links on the internet change rapidly and unpredictably. The Library does not control or monitor the information available through the internet and assumes no responsibility or guarantee for its content, accuracy, timeliness or the method or manner in which the information, once obtained, is used. Furthermore, use of all Library internet resources shall be subject to all provisions of the Library’s policies on the matter, which are incorporated by reference as part of this Internet Use Policy.
3. The internet is, in its native state, unregulated and is not otherwise censored, filtered or screened. Some patrons may find information and/or materials that they feel are controversial, unlawful or personally objectionable. Internet contributors represent various points of view and may post information or material of a controversial nature. Access to the internet is permitted at the sole risk and discretion of the patron. The Library cannot guarantee that children's internet access will be limited to only these sites and assumes no responsibility for sites that may be accessed. Patrons should carefully evaluate the information they find when using this resource.
Because the library has received federal funding for technology, the Children’s Internet Protection Act (federal statute) will be followed, which means the internet will be filtered for pornographic material involving children, which is considered a criminal offense for accessing, owning, or viewing. Filtering will be turned on at all times, on all library owned devices. Patrons connecting to library wifi are expected, based on terms of the computer use and internet policies, to follow said policies and not access this type of content while accessing the library’s wifi. If through the process of accessing the internet patrons are unable to access what they wish to see, patrons may request library staff to suspend filtering on a specific computer/device for a specific reason, such as research or general knowledge, as filtering systems are not perfect. For example, should a patron request to view information on Super Bowl thirty (also identified as XXX), and find that images are unavailable, staff could remove filtering so the patron is able to access this material. Patrons should speak to the staff person on duty and request the filtering be turned off or explain the difficulty in accessing what they wish to. Staff will then assist patrons in turning off the filtering (which can be done remotely via website access or on the console computer/director’s computer). Filtering will then be turned back on after the user’s session or an agreed upon time limit.
4. The Library does not condone, authorize, or permit any person to send or receive any materials over the internet that may be classified as indecent, obscene, incitement to riot, or which have otherwise been declared unlawful or unconstitutional by any state, local or federal court of law. Illegal acts by patrons involving Library resources may be subject to prosecution by local, state or federal officials.
5. The Library reserves the right to revoke Library or internet privileges for violation of these or other Library or City policies and procedures or of any local, state or federal law.
6. All patrons shall expressly assume the risk of receiving incorrect, inaccurate, defective, fraudulent or unlawful information while accessing the internet through any equipment or service offered by the Library. Patrons accessing any service via the Internet which has a cost involved, or if a patron incurs other types of costs, the patron accessing such a service will be responsible for those costs. The Library cannot guarantee that software downloaded from the internet will be free of computer viruses. Anti-virus software installed on the Library's computers may not find every virus. The Library is not responsible for any loss of information or damage to personal disks or storage devices when downloading. The Library expressly disclaims any liability for injuries and/or damages of any kind whatsoever, including consequential damages, arising out of the use of the internet, the obtaining of any materials from or over any internet connection and the fitness for use or purpose of any materials, programs or information obtained through access to the internet.
7. The Library staff will not assume the role of parent/guardian and cannot monitor children's use of the internet or any information or materials obtained through such use. Parents/legal guardians must assume responsibility for deciding which Library resources are appropriate for their own children. The Library is not responsible for enforcing any restrictions which a parent or guardian may place on a minor’s use of Library resources. Parents/legal guardians are strongly advised to guide their children in use of the internet, supervise their children’s internet sessions and inform them about materials they should not use.
8. While the Library affirms and acknowledges the rights and responsibilities of parents/guardians to monitor and determine their children's access to Library materials and resources, including those available through the internet, the Library has adopted certain guidelines designed to assist in the safe and effective use of these resources by all patrons.
9. The accessing or use of the internet through any equipment or service offered by the City of Columbus Junction and the Library shall constitute acknowledgement of this waiver and disclaimer and shall be deemed acceptance of its terms and conditions. The Library’s Computer Use Policy is incorporated by reference.
Columbus Junction Public Library
8b: Computer and Internet Use Guidelines
To achieve an atmosphere conducive to the best use of its resources, the Library has developed the following guidelines regarding the use of public computers. By using a public computer/internet workstation at the Library you agree to the terms of the Library’s Computer and Internet Use Policies and the following guidelines:
1. Availability
a. workstations are available during all open hours.
b. use is based on a first-come, first-served basis.
c. there is no charge to use a workstation or view the internet.
d. Time limits will be imposed by staff should demand warrant this.
e. there is a limit of one person per workstation with no more than two by agreement with staff.
f. electronic mail accounts are not offered by the Library.
2. Reservations
a. Private study room computers may be reserved on a first-come, first served basis, and can be reserved in person, via electronic means, or via phone
b. patrons may not reserve workstations for others.
3. Use
a. use of workstations is governed by the Library’s Patron Behavior Policy.
b. the same rules of conduct which govern use of all Columbus Junction Public facilities apply to the use of the Library’s workstations.
c. By using a workstation or accessing wifi, patrons are consenting to following computer and internet use policies
d. use workstations with care.
e. make no attempt to fix problems. Immediately report any problems to Library staff.
f. patrons may download to a storage device that they provide.
g. patrons may not use workstations for any illegal activity or criminal purpose or place any material on the internet related to any illegal activity or criminal purpose.
h. it is the responsibility of the patron to respect copyright laws and licensing agreements and assume responsibility for payment of fees for any fee-based service. Responsibility for all consequences of copyright infringement lies with the user. The Library disclaims any liability or responsibility resulting from such use.
j. some features may not be available on workstations. Audio capability, chat rooms and sites that collect personal information (such as ones that employ cookies) are examples of special features that may not be available.
k. patrons must end their session and leave the terminal when asked to do so by authorized Library staff, even if they have not completed their access session.
l. upon completion of an Internet access session, a patron may be required to wait 30 minutes before signing up for another session.
m. patrons are requested to return the computer to its home state of the Windows desktop leaving no application open for confidentiality purposes.
n. no food or drinks at the workstations or in the 1ibrary
o. The library offers free wireless internet service. The network name and password are available at the circulation desk. Security for personal wireless devices is the responsibility of the owner of the device. CJPL wireless service may not be used for unauthorized, illegal, or unethical purposes. No one may send or receive or display text or graphics that may reasonably be construed as obscene or violent.
p. CJPL has wireless devices available for use. Devices are available on a first come, first served basis, and users are expected to abide by the CJPL Internet Policy while using these items as well.
4. Consideration of Others
a. patrons should be aware that they are working in a public environment shared by people of all ages and sensibilities.
b. patrons may not display images, sounds, or messages in a way that will negatively affect those who find them objectionable or offensive.
c. patrons should be considerate of internet sounds and visuals which might disrupt the ability of other Library customers to use the Library and its resources.
d. patrons may not engage in any activity which is deliberately and maliciously offensive, libelous or slanderous.
e. patrons may not invade the privacy of others or engage in any activity that is harassing, defamatory, or threatening; or receive or display graphics which may reasonably be construed as obscene as defined by law.
f. the Library cannot guarantee privacy when using the internet.
5. Printing
a. printers are available for a cost per page.
b. patrons should check the length of a document before printing it. Many pages are very long and may print multiple pages.
6. Library Staff
a. limits on staff time allow the Library to offer only brief one-on-one assistance.
b. reserves the right to end a session at any time if it is creating a disturbance.
c. reserves the right to impose age restrictions on internet capable computers
Columbus Junction Public Library
8c: Other Important Information
The internet is a global computer network which allows millions of people to communicate and share information. It is also a reference tool with constantly changing resources. These resources provide access to a wide variety of government, academic, cultural, scientific, educational, business and recreational information. The internet is one of many resources available at the Library. The Library has chosen to make the internet available to the public because of its value as a reference and educational tool.
1. Children & the internet
Parents are responsible for their own children's use of all Library materials, including the internet. The Library staff does not take the place of a parent and cannot monitor children's use of the internet or any information or materials obtained through such use. To ensure a positive and productive experience, parents and their children should explore the internet together. Parents need to be aware that not all sites are appropriate for their children.
2. Internet Safety
a. Establish your own family rules and guidelines for internet use.
b. Teach your children never to give out their names, addresses, phone numbers or other personal, identifying or family information.
c. Get to know the sites your children use by viewing them.
d. Encourage discussion about all sites including those that make your children feel uncomfortable.
e. Make sure your children never arrange a face-to-face or telephone meeting with another internet user, regardless of how "nice" or "friendly" the user may seem.
f. Teach your children never to respond to messages or bulletin board items that are suggestive, obscene, belligerent, threatening or make them feel uncomfortable.
g. If you or your children become aware of the transmission, use or viewing of child pornography while online, immediately report it to the National Center for Missing and Exploited Children by calling 1-800-843-5678.
h. Choose sites wisely. While the internet makes a world of resources available to users, not all information sources on the internet provide complete, accurate or current information. Due to the unstructured nature of the internet, some search results may be misleading and/or inappropriate to your needs or your child's needs. Patrons can learn to be wise information consumers by asking the following questions about each internet site:
1. Usefulness
Is the site relevant to the search?
Is this the best site to answer the question?
2. Reliability
What is the authority, expertise and intention of the author?
Does the site present facts or opinions?
Is the source of the information given?
Is the site an advertising tool?
Has the site been recommended by a reliable source?
3. Appropriateness
Who is the intended audience?
Is the content appropriate for children or adults?
4. Timeliness
How up-to-date is the information?
When was the site last updated?
5. Organization
Is the information clearly presented?
Is the format easy to follow?
6. Cost
Are there fees?
Is the information available elsewhere at no charge or for a lower price?
Written February 2000
Adopted April 2000
Revised June 2002
Reviewed March 2009
Reviewed January 2016
Amended July 2019