Computer Use Policy

Share & Bookmark, Press Enter to show all options, press Tab go to next option
Print

PurposeDisclaimerPrivacyAcceptable UseRules of ConductUse of FiltersTermination of User Access

Purpose

Carrollton Public Library provides free access to the Internet through public access computers and walk-up tablets, and through WiFi and dataports for personal computers, tablets, and other mobile personal devices.

Disclaimer

While the Internet provides an array of educational and entertaining information, access to any information is not to be considered an endorsement by Carrollton Public Library in any way. Likewise, staff and the Library are not responsible for what a person may encounter when using the Internet at the Library.

Parents are responsible for their children’s activity on the Internet. Staff can recommend websites that are age-appropriate, but they cannot monitor any child’s use.

Privacy

The Library respects the First Amendment rights of all users and their privacy. However, absolute privacy is not guaranteed. Computer screens, whether on a public computer or tablet, or on a personal laptop or tablet, may be visible to other Library customers. Information accessed may be considered inappropriate for a public setting and offensive to others. All computer users in the Library are expected to respect the rights of other Library patrons and follow the Library’s Standard of Conduct. Failure to do so may result in a loss of library privileges. All Library records are confidential; information regarding a user’s activity will be released only as required by law or for the library’s business operations.

The "rules of conduct" apply to the behavior of patrons using computers. Failure to follow this policy could result in the loss of computer privileges and/or library privileges. Users are cautioned that the Internet is not a secure environment. Personal information included in all transactions, files and communications may be subject to unauthorized access by third parties. The Carrollton Public Library respects the confidentiality of those using its electronic resources and will only release library records as required by law or for the library's business operations.

Acceptable Use

Public access computers and tablets may be used for the following:

  • Personal email accounts and personal webpages available from a variety of sources. The Library does not provide support for personal email or webpages.
  • Websites that provide a variety of information, unless otherwise blocked. Users are expected to pay any fees associated with access to particular sites.
  • Software applications loaded onto the public computers. The public computers have Microsoft Office. Personal work must be stored on a flash drive.
  • Any applications loaded onto the tablets. The walk-up tablets in the Kids’ Place at each library provide a child-friendly image.

Library staff cannot:

  • Provide in-depth training
  • Access passwords or user IDs to email or other online accounts. The user is expected to remember these, or keep them in a secure place.

Rules of Conduct

  1. Internet access will not be used for illegal activity, or to access illegal materials. Illegal materials include, but are not limited to, obscenity and child pornography as defined in U.S. Code Title 18 and State Penal Code chapters 42 and 43. Access by minors to materials deemed "harmful to minors" is prohibited. Library administration reserves the right to determine based on community standards, materials considered to be "harmful to minors".
  2. Users must have a valid Carrollton library card or a guest pass to access a computer.
  3. Downloading to a personal flash drive is permitted on Library computers.
  4. Installation or modification of software is prohibited on Library computers.
  5. Users will respect copyright laws and licensing agreements.
  6. Users will not make any attempt to misuse the computers and internet access, including disconnecting or damaging the hardware or bypassing the filter.
  7. Users may print from public access computers. Printing fees are $0.15/page.
  8. Library computers and Internet ports for personal laptops are available on a first-come first-served basis.
  9. Computer sessions on Library equipment are limited to a maximum of 1 hour in length with automatic 10 minute extensions if there is no one waiting in the queue (waiting line). Use is limited to 10 hours per day.
  10. Users accessing the Internet with their own personal laptops or tablets via the ports or the library’s WiFi are expected to limit their time in a reasonable manner, and relinquish to others if conditions warrant.
  11. Users will end their session and leave the computer if asked to do so by Library staff, even if they have not completed their sessions.
  12. Users will respect the privacy of other users, and will refrain from attempting to view or read material being used by others. Users are prohibited from the unauthorized disclosure, use, or dissemination of personal information of others. Users are warned that other individuals may obtain unauthorized access to personal information and/or may misrepresent themselves.
  13. By mutual agreement, two or more persons may share one access session as long as their behavior and conversation does not disturb other users or Library staff and they do not physically block or impede access within the Library.

Use of Filters

The Library employs a filter appliance on the public access computers and tablets, and the WiFi to block certain categories of websites. A complete list of the categories of websites that are blocked is available from staff.

Parents are advised that no filter is a substitute for parental control. Parents are expected to monitor their children’s use of the Internet.

On rare occasions, the filter will block a site that may have a legitimate research value. Users may submit a request to have that site reviewed by staff.

Termination or Prohibition of User Access

Failure to comply with the Internet Use Policy may result in suspension of computer and internet privileges. Library Management will review incidents and determine the next steps, including suspension up to six (6) months, suspension of computer and internet privileges, and possible Criminal Trespassing.