Internet Use Policy

Internet Access at the Library

The Internet, a world-wide network of computer networks is an essential medium for obtaining and transmitting information of all types. Therefore, public access to the Internet is germane to the Library's mission.

The Internet is an unregulated medium that, as helpful and beneficial as it may be, also provides access to information that is inaccurate, illegal or that some may find offensive or disturbing. The Library may identify on its web site specific Internet sites that have potential interest for Library users; however, the Library cannot control a user's access to other Internet resources.

Responsibilities of Library Staff and Users

Library staff will not monitor a user's Internet use, except for length of use in order to ensure equal opportunity of access for everyone. The user, or the parent of a minor, is responsible for his or her Internet session at all times.

The Library reserves the right to terminate an Internet session that disrupts library services or that involves user behavior that violates the Library's policies.

As with all Library resources, the Library affirms the right and responsibility of parents/guardians, NOT Library staff, to determine and monitor their minor children's use of the Internet. (Minors are defined in this policy as children and young people under the age of 18 years.) Parents are responsible for their minor children's use of the Library's resources and facilities. Parents who believe that their children cannot responsibly use the Library's Internet access are requested to monitor their children's Internet use.

Disclaimers

While the Library endeavors to provide access to information of the highest quality, the Library specifically disclaims any warrant as to the information's accuracy, timeliness, authoritativeness, usefulness or fitness for a particular purpose.

The Library will have no liability for direct, indirect or consequential damages related to the use of information accessed through the Library's Internet service.

The Library, having installed and enforced the operation of filtering software in compliance with the Children's Internet Protection Act, will have no liability for damages related to the operation of, or failure of, the filtering software, or for its circumvention by users.

Since software and information downloaded from any sources, including the Internet, may contain computer viruses, users are advised to utilize virus checking software on their home computers. The Library is not responsible for damage to users' disks or computers or for any loss of data, damage or liability that may occur from use of the Library's computers.

Unacceptable Uses of Computers

Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:

  • 1. Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; viewing, transmitting or downloading pornographic materials or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.
  • 2. Uses that cause harm to others or damage to their property. Engaging in defamation (harming another's reputation by lies); uploading a worm, virus, "trojan horse," "time bomb" or other harmful form of programming or vandalism; participating in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems.
  • 3. Uses that jeopardize the security of access of the computer network or other networks on the Internet. Disclosing or sharing the user's password with others; impersonating another user; using one's own software programs on the library's computers; altering the Library's computer settings; damaging or modifying computer equipment or software.
  • 4. Uses that compromise the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communications: Minors under age 18: Giving others private information about one's self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has "met" on the computer network or Internet without a parent's permission.
  • 5. Uses that Violate Confidentiality of Information: The New Jersey Confidentiality of Library Records Law (NJSA 18A:73-43.2) prohibits unauthorized disclosure, use, or dissemination of personal information regarding Library users, including minors. Personally identifiable information about users may not be disclosed or used in any way, except to law enforcement authorities as provided in the law.

Technology Protection Measures

The Library, either by itself or in combination with its Internet access provider, has installed filtering software on all library computers with Internet access, and will enforce the operation of same during any use of those computers, to prevent minors from accessing visual depictions that are (1) obscene, (2) child pornography, or (3) harmful to minors.

The term "harmful to minors" is defined by the Communications Act of 1934 (47 USC Section 254 [h][7]), as meaning any picture, image, graphic image file, or other visual depiction that:

  • * taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
  • * depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals;
  •  
  • * taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors.

Filtering software is not foolproof. It diminishes the likelihood that searchers will inadvertently retrieve text or images that they may find offensive, but does not eliminate that possibility. Filters often block access to sites that users would consider both inoffensive and useful.

If you do not find what you need, please do not hesitate to ask a librarian for help. Technology protection measures may be disabled by a library staff member, as necessary, for bona fide research or other lawful purposes by people aged 18 and older.

Procedures

The Library staff will develop such rules and procedures as are necessary to ensure the fair and reasonable use of Internet access. See Rules for Computer Use.

Response to Violations

The user's access to the Library's computer network and Internet is a privilege, not a right. A user violates this policy by his or her own actions. Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user's right to access these computers.

Type of Page: