POLICIES AND PROCEDURES
Computer Access And Internet Policy
The Orange Public Library hopes to provide the people of Orange, through new communication and new information technology, networks, access to information and library materials that meet their diverse and changing needs locally, statewide, nationally, and globally.The internet is a worldwide entity with a diverse user population. Our patrons access and use it at their own risk. The Library does not monitor, nor does it have control over the information found through the internet and is not responsible for its content, timeliness, or accuracy.
1.1 Subject to the conditions set forth below, the Orange Public Library (the "Library") is committed to providing free, open, and equal access to the Internet. This policy furthers the Library's mission of offering the broadest range of material to Orange's diverse community. It is consistent with the principles of intellectual freedom expressed in the American Library Association's Library Bill of Rights, which the Library endorses and follows.
1.2 The Internet is an unregulated medium. It offers access to material that may be personally, professionally, and culturally enriching. It also offers access to material that may be inaccurate, incomplete, untimely, illegal, and, in the view of some users, offensive to themselves or inappropriate for their children. The Library does not monitor and has no control over the information accessed through the Internet and is not responsible for its content. Under 47 U.S.C. Section 230, the Library shall not be treated as the publisher of any information on the Internet provided by another party.
2.2 Parents or guardians who wish to limit or restrict the access of their own children should personally oversee their children's use of the Internet. The Library does not monitor or supervise the use of computers by minors. The Library does not act in loco parent is; it does not take the place of parents or guardians in deciding what children may read or view. Parents and children are encouraged to read "Child Safety on the Information Highway," published by the National Center for Exploited and Missing Children, a copy of which is herewith provided.
2.3 As set forth in paragraphs 3.5 and 3.10 below, the Library supports users' right to privacy. The Library's workstations, however, cannot be made completely private or completely secure. Current technology cannot guarantee perfect security; users should be aware that electronic communications and files may become public. Users, moreover, should be mindful that the Library's computers are located in a shared and public space and that a user's research may be visible to passersby or to neighboring computer users.
2.4 Library staff is available to assist users with reference questions. Staff, however, is unable to give users extensive instruction in computer or Internet use or provide users with extensive aid in troubleshooting equipment or Web-related problems.
Rules of Conduct
3.2 Computers are available on a first-come, first-served basis. If all computers are in use, persons wishing to use computers may place their names on the waiting list for the next available computer by using a reservation station on the floor. Your time will be given to somebody else after 5 minutes of grace period.
3.3 All patrons with a library card may use a maximum of 75 minutes per day. Time may be limited per an individual depending on how busy the computers are. Printing must be completed within the allocated period of time.
3.4 Misuse of Library computers may result in the termination of a user's access session or in suspension or loss of the privilege to use the Library's computers. Misuse includes, but is not limited to, using the computer for illegal activities; hacking into the Library computer system or any system; damaging or attempting to damage computer equipment or software; interfering with systems operations, integrity, or security; gaining unauthorized access to another person's files or otherwise invading the privacy of another user; sending harassing messages to other users; altering or attempting to alter the Library's computer settings; and violating copyright laws and software licensing agreements.
3.5 Users may not save data or programs on the hard drives of Library computers. Users who plan to save their work or projects must bring in a floppy disk or USB flash drive.
3.6 The Library is not responsible for damage done to users' disks, data, hardware, or software by any virus that may have been contracted on or through Library equipment, or as a result of the malfunctioning of library hardware or software. Although the Library has installed virus protection on its computers, it is impossible to protect against the appearance of a new virus.
3.7 A user who has damaged, through inappropriate or unauthorized use, hardware or software owned or licensed by the Library will be liable for the cost incurred by the Library to repair the damage. If the damage is not repairable, the user will be liable for the cost incurred by the Library to replace the damaged hardware or software.
3.8 Users are asked to respect the privacy of other users. They may not seek access to another user's data or search history. They may not hover over a terminal being used by another. Persons invading the privacy user may be asked to leave the computer area; they also may lose computer privileges as set forth in paragraph 3.5 above.
3.9 The Library's computers are set up for the use of one person at a time. Parents or guardians, however, will be permitted to assist and supervise their children's use of the computers. Parents or guardians must supervise use of the computers by children ages seven or under.
3.10 The Library may, at its discretion, reserve computers for specific purposes, for example, maintenance or training.
3.11 The Library reserves the right to terminate the session, evict the patron, or suspend or terminate the library privileges of any one who engages in unacceptable use or whose computer use disrupts library service, or violates library procedures.
3.12 The last 'START TIME' for using a computer will be one hour before the Library closes. Computers will be closed down 15 minutes before the Library closes.
3.13 Computers in the ADULT Department are for use by patrons, middle school age and above. When the Children's Department is closed, a child may use the Gates' computers in the adult department.