Policy Statement

Authorized use of library-owned or operated computing and network resources should be consistent with the education, research, and public services mission of the City Library.
 

CS1.1 Acceptable Use

CS1.1.1 Privacy: No user should access, view, copy, alter, or destroy another’s personal electronic files without permission (unless authorized or required to do so by law or regulation). If another user has failed to close out their session, a new user must close that session and enter their own user name and password to use that computer. A password or other means of access is intended to assure confidentiality of the Library’s files and resources and does not guarantee privacy for use of library equipment or facilities.

CS1.1.2 Copyright: Written permission from the copyright holder is required to duplicate any copyrighted material, except where consistent with Fair Use Doctrine. This includes, but is not limited to, duplication of music, audiotapes, videotapes, photographs, illustrations, computer software, data, and all other information for educational use or any other purpose. Most software and databases that reside on the Library’s computing network are owned by the City Library or third parties, and are protected by copyright and other laws, together with licenses and other contractual agreements. Users are required to respect and abide by the terms and conditions of software use and redistribution licenses. Such restrictions may include prohibitions against copying programs or data for use on the City Library’s network or for distribution outside the Library, against the resale of data or programs, or against the use of software for noneducational purposes, or for financial gain, and against public disclosure of information about programs (e.g., source code) without the Library’s authorization.

CS1.1.3 Harassment, Libel, and Slander: No user may use the Library’s computers or networks to libel, slander, or harass any other person.

CS1.1.4 Sharing of Access: All library computer accounts, e-mail accounts, passwords, and other types of authorization are assigned to individual users and are not to be shared, other than selected departmental passwords. The assigned user is responsible for any use of the account. Sharing a personal computer account constitutes an inappropriate use and could lead to termination of that account, unless that account is departmental in nature.

CS1.1.5 Modifying Software or Software Installation: A user may not modify the software configuration on any computer provided for general access. Computer Services regularly tests, installs, and configures all software found on library computers. Installation of nonstandard software, including any third-party software or screen savers, is a violation of this policy. Users may not run or otherwise configure software or hardware to intentionally allow access by unauthorized users.

CS1.1.6 Termination of Access: When a user ceases to be a member of the library staff is assigned a new position and/or responsibilities within the System, the user’s access authorization will be reviewed and possibly changed to fit any requirements specified by their new job responsibilities. Users must not use facilities, accounts, access codes, privileges, or information for which they are not authorized in their new circumstances.

CS1.1.7 Circumventing Security: All staff members of the Library are prohibited from attempting to circumvent or subvert any of the system’s network or individual personal computer security measures. Users are prohibited from using any computer program or device to intercept or decode passwords or similar access control information.

CS1.1.8 Breaching Security: Activities or installation of nonstandard software which degrade the performance of an individual computer, the system or network, or deprive authorized users of resources or access to computers or networks, is prohibited. Users should be aware that the Library’s public network might be vulnerable to unauthorized access or tampering. Every precaution is taken to guard against this, but the Library cannot provide security from every virus, Trojan, or worm that is received from an outside party while connected to the City Library’s public space. The Library shall be held harmless if any personal computer is damaged in any way while connected to the Library’s wired patron access points.

CS1.1.9 Flooding: Generating excessive network traffic, including spamming and denial-of-service, is prohibited.

CS1.1.10 Private Commercial Purposes: The computing resources of the Library shall not be used for private commercial purposes or for financial gain via electronic mail or other means.

CS1.1.11 Political Advertising or Campaigning: The use of library computers and networks follows library policy on use of library facilities for political purposes.

CS1.1.12 Intrusion Security: The Library provides reasonable security against intrusion and damage to files stored on the central facilities and provides for some archiving of files based upon the operational needs of the Library. However, the Library is not responsible for the loss of users’ files or data. The Library provides timely network backups, but it is not responsible for user error in lost data. Computer Services staff can offer some individual data backup and may offer other options to increase network storage capacity for more timely information. Computer files, including electronic mail, may be considered "records," which may be accessible to the public under the provisions of the Freedom of Information Act.

CS1.1.13 Restrictions: Although the Library does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause, to determine if a user is violating this policy or federal laws. Nonlibrary-owned computers which house material which violates the Library’s policies are subject to network disconnection without notice.

 

CS1.2 Staff Use

Authorized users of City Library computing and network resources are defined as those individuals provided a username and password, for their own use only, through legitimate library processes for assignment of such identification from Computer Services. An authorized use of library computing and network resources is initiated by entering that individual’s username and password. Using another individual’s username and password is an unauthorized use. The only exception to this authorized use definition is access on designated computers provided in the Library where use of a username and password will not be required.

CS1.2.1 This policy applies to all the library computing and network resources and external computing and networking resources accessed via City Library computing and networking resources.

CS1.2.2 The Library reserves the right to limit access to its networks when applicable or library policies or codes, contractual obligations, or federal laws are violated.

CS1.2.3 The Library reserves the right to remove or limit access to material posted on library-owned computers when applicable or library policies or codes, contractual obligations, or federal laws are violated.

CS1.2.4 Although the Library does not generally monitor or restrict the content of material transported across networks, it reserves the right to access and review all aspects of its computing systems and networks, including individual login sessions and account files, to investigate performance or system problems, search for viruses and other harmful programs, or upon reasonable cause to determine if a user is violating this policy or federal laws.

 

Approved by Library Board of Directors, April 2012