Body
CS2.1 Policy Statement
These regulations establish policies and procedures for use of the City Library Technology Center. The policies and procedures governing use of the Technology Center are in accordance with the Library’s mission and designed to maintain the good order of the Library. The purpose of the area is to provide a training facility for library staff, a training facility that can be booked for use by outside groups, and an open lab that can be utilized by individuals when it is not otherwise scheduled for training. All users must comply with the facility rules.
CS2.2 City Library Use
The City Library has first priority for reserving the Technology Center for formal training. A part of the facility will usually be available for use by the staff when not scheduled for library-related training.
CS2.3 Outside Group Training Sessions
Outside groups must apply in advance through Computer Services in conjunction with the Business Office and comply with the City Library’s current Meeting Room Use policy (see MTG1 and 2).
CS2.4 Patron Use
The Technology Center will be used to:
-
Provide training in the use of the City Library’s On-line Public Access Catalog.
-
Provide training in navigating the Library’s web site, especially electronic data base products such as periodical indexes, directories, etc.
-
Teach introductory Internet navigation and evaluation skills.
-
Provide basic instruction on selected computer applications (e.g., word processing), specific data base products (e.g., Pioneer), and Internet tools or subjects (e.g., search engines, investment sites).
-
Provide open lab time for individual computer application use.
Training for the public may take the form of classes or one-on-one sessions as requested by patrons. Since the facility has software products not available in other areas of the Library, users of these products have priority over other patron uses. Since these products often require extended time periods to be used effectively, patrons may request appointments for extended use.
CS2.5 General Rules
The City Library endorses and promotes intellectual and academic freedom principles and encourages access to information. While users generally have the right to read and view materials of their choice, this right is limited by the rights of others to work in a setting free of intimidation, harassment, and/or hostility. Illegal uses are prohibited. Activities that create a hostile and/or intimidating environment for others are prohibited.
CS2.5.1 Users are expected to behave in ways that respect a shared environment with others and ensure the reliable operation of laboratory computer systems.
CS2.5.2 Food and drinks are prohibited in the lab.
CS2.5.3 Users may not alter laboratory computer systems or other equipment.
CS2.5.4 Users should report problems with computer lab equipment to library staff.
CS2.5.5 Parents are responsible for their minor children’s behavior, safety, and the content of information resources viewed or accessed by them in library facilities.
CS2.6 Copyright Protection
It is not appropriate to make or use illegal copies of copyrighted or patented materials, information, or software. Almost all forms of original expression that are fixed in a tangible medium are subject to copyright protection, even if no formal copyright notice is attached. Written text, video, recorded sound, digital images, and computer software are some examples of works that are usually copyrighted.
CS2.7 Use of Computing Lab Hardware and Software
Some lab systems are configured for specific applications. Users that require the specific resources provided by these systems have priority. Users are required to use the lab computer in a manner that does not have a detrimental impact on the stability and functionality of the systems or networks. The following activities are specifically prohibited:
Installing or connecting unauthorized technical devices, changing system or software configurations, installing any software of any type, disconnecting hardware, installing hardware, or changing hardware configurations.
Engaging in any activity intended to compromise system security, interfere with the proper operation of, or compromise the security of other computers or network systems, compromise the privacy of other users, or obstruct the work of others. This specifically prohibits port scanning, network sniffing, keystroke logging, using remote control software, password cracking, and similar activities.
Using lab systems to send forged e-mail, bulk mail, unsolicited commercial e-mail, illegally share copyrighted materials with others, or to fraudulently misrepresent the user’s identity in any communications.
Using lab systems to initiate any communication intended to intimidate, coerce, harass, or threaten others.
Installing any server software, including, but not limited to, FTP, telnet/ssh, Web, SMTP, file sharing, and game servers. This specifically prohibits “peer to peer” file sharing software such as KaZaA, Gnutella, or similar programs.
Laptops may only be connected to network jacks specifically provided for this purpose in other areas of the Library. Disconnecting lab systems to connect laptop computers is prohibited.
CS2.8 Policy Enforcement
A violation of the provisions of this policy may result in the withdrawal of access and may subject the user to disciplinary action consistent with City Library policies and procedures. All criminal activities will be referred to police, state, and/or federal agencies.
Approved by Library Board of Directors, January 2003