- User must be
a MRL library cardholder or an individual possessing acceptable identification.
- Users age twelve
and younger shall have access to Internet stations in Children's Services
or the Family Computer Lab when accompanied by a parent/guardian or
an individual over the age of eighteen appointed by the parent/guardian
(parental appointment must be verified in writing).
- Users older than
twelve shall have access to the Internet via stations in Media &
- MRL library cardholders
must meet existing MRL rules for checking out materials and/or equipment.
- The patron that
checked out the computer must be present.
- Sexually explicit
or sexually suggestive (obscene/pornographic) material access and/or
viewing is prohibited
- Time limits will
be enforced when applicable.
- Attempts to reconfigure
or change hardware will be grounds for revocation of Internet privileges.
- Computer sharing
is allowed based on space availability.
Initial use on the public access computers is thirty (30) minutes
and will be on a first come, first served basis. Additional time will
be allowed based on availability if no one is waiting.
about Internet Usage Confidentiality
Users of electronic mail systems should be aware that electronic mail
in its present form cannot be secured and is, therefore, extremely
vulnerable to unauthorized access and modification. Electronic communication
carried on via MRL computer stations should not be considered confidential.
When necessary, such communication may be used as evidence in criminal
investigations and/or prosecutions. Evidence of illegal activity may
prompt MRL to report such activity to legal authorities.
of Sexually Explicit Materials
Display or dissemination sexually explicit or sexually suggestive
(obscene or pornographic) material is prohibited. Violators of this
policy may be removed from the Library building and may have their
library privileges revoked.
The public may only use computers for legal purposes. Examples of
unacceptable purposes include, but are not limited to, the following:
harassment of other users; libeling or slandering other users; destruction
of or damage to equipment, software, or data belonging to the Library
or other users; disruption or unauthorized monitoring of electronic
communications or unauthorized copying of copyright-protected material.
Computers should be used in accordance with ethical standards of the
Library. Examples of unacceptable use (some of which may also have
legal consequences) include, but are not limited to, the following:
violation of computer system security; unauthorized use of computer
accounts, access codes, or network identification numbers assigned
to others; use of computer communications facilities in ways that
unnecessarily impede the computing activities of others (randomly
initiating interactive electronic communications or e-mail exchanges,
overuse of interactive network utilities and so forth); violation
of software license agreements ;violation of network usage policies
and regulations or violation of another user's privacy.
The Library endorses
the practice of responsible use of computing equipment. It includes
refraining from the following: overuse of connect time, printing facilities
or processing capacity; overuse of interactive network utilities;
use of sounds and visuals which might be disruptive to others or use
of any computing resource in an irresponsible manner.
Violations of the policies described above for legal and ethical use
of computing resources will be dealt with in a serious and appropriate
manner. Illegal acts involving Library computing resources may also
be subject to prosecution by local, state or federal authorities.
Since the Internet is a global electronic network, there is no regulatory
control of its users or content. The Internet and its sources may
contain controversial material. The Library cannot censor access to
material nor protect users from offensive information. Parents of
minor children must assume responsibility for their children's use
of the Internet through the Library's connection. Library staff cannot
control the availability of information links that often change quickly
and unpredictably. Not all sources on the Internet provide accurate,
complete or current information. Users need to be good information
consumers, questioning the validity of the information. MRL assumes
no responsibility for any damages, direct or indirect, arising from
use of the Internet, the public access computers or the library’s
wireless access points.
By clicking the “OK” or “I Agree” button the user acknowledges that
he/she has read and understands the Morrisson-Reeves Library Technology
Use Agreement. The user acknowledges and agrees that Morrisson-Reeves
Library assumes no liability for any loss or damage to the user's
data or equipment. The user further acknowledges and agrees that Morrisson-Reeves
Library assumes no liability for any damage or injury arising from
invasion of privacy occurring through any computers/electronic devices,
accounts, programs, or files.
Revised 12/15/00, Revised 6/21/02,
Revised 5/23/03, Revised 6/15/12