If you are logging into a computer in our Computer Lab,
please click on the "ACCEPT" button located in the top - right corner of this screen.
TECHNOLOGY USE POLICY
Rules for Internet Use
- User must be a MRL library cardholder or an individual possessing acceptable identification.
- Users age twelve and younger shall have access to Internet stations in Children's Services or the Family Computer Lab when accompanied by a parent/guardian or an individual over the age of eighteen appointed by the parent/guardian (parental appointment must be verified in writing).
- Users older than twelve shall have access to the Internet via stations in Media & Technology Services.
- MRL library cardholders must meet existing MRL rules for checking out materials and/or equipment.
- The patron that checked out the computer must be present.
- Sexually explicit or sexually suggestive (obscene/pornographic) material access and/or viewing is prohibited
- Time limits will be enforced when applicable.
- Attempts to reconfigure or change hardware will be grounds for revocation of Internet privileges.
- Computer sharing is allowed based on space availability.
Time limits per day
Initial use on the public access computers is thirty (30) minutes and will be on a first come, first served basis. Additional time will be allowed based on availability if no one is waiting.
Warning about Internet Usage Confidentiality
Users of electronic mail systems should be aware that electronic mail in its present form cannot be secured and is, therefore, extremely vulnerable to unauthorized access and modification. Electronic communication carried on via MRL computer stations should not be considered confidential. When necessary, such communication may be used as evidence in criminal investigations and/or prosecutions. Evidence of illegal activity may prompt MRL to report such activity to legal authorities.
Display/Dissemination of Sexually Explicit Materials
Display or dissemination sexually explicit or sexually suggestive (obscene or pornographic) material is prohibited. Violators of this policy may be removed from the Library building and may have their library privileges revoked.
The public may only use computers for legal purposes. Examples of unacceptable purposes include, but are not limited to, the following: harassment of other users; libeling or slandering other users; destruction of or damage to equipment, software, or data belonging to the Library or other users; disruption or unauthorized monitoring of electronic communications or unauthorized copying of copyright-protected material.
Computers should be used in accordance with ethical standards of the Library. Examples of unacceptable use (some of which may also have legal consequences) include, but are not limited to, the following: violation of computer system security; unauthorized use of computer accounts, access codes, or network identification numbers assigned to others; use of computer communications facilities in ways that unnecessarily impede the computing activities of others (randomly initiating interactive electronic communications or e-mail exchanges, overuse of interactive network utilities and so forth); violation of software license agreements ;violation of network usage policies and regulations or violation of another user's privacy.
The Library endorses the practice of responsible use of computing equipment. It includes refraining from the following: overuse of connect time, printing facilities or processing capacity; overuse of interactive network utilities; use of sounds and visuals which might be disruptive to others or use of any computing resource in an irresponsible manner.
Violations of the policies described above for legal and ethical use of computing resources will be dealt with in a serious and appropriate manner. Illegal acts involving Library computing resources may also be subject to prosecution by local, state or federal authorities.
Since the Internet is a global electronic network, there is no regulatory control of its users or content. The Internet and its sources may contain controversial material. The Library cannot censor access to material nor protect users from offensive information. Parents of minor children must assume responsibility for their children's use of the Internet through the Library's connection. Library staff cannot control the availability of information links that often change quickly and unpredictably. Not all sources on the Internet provide accurate, complete or current information. Users need to be good information consumers, questioning the validity of the information. MRL assumes no responsibility for any damages, direct or indirect, arising from use of the Internet, the public access computers or the library’s wireless access points.
Limitation of Liability
By clicking the “ACCEPT” or “I Agree” button the user acknowledges that he/she has read and understands the Morrisson-Reeves Library Technology Use Agreement. The user acknowledges and agrees that Morrisson-Reeves Library assumes no liability for any loss or damage to the user's data or equipment. The user further acknowledges and agrees that Morrisson-Reeves Library assumes no liability for any damage or injury arising from invasion of privacy occurring through any computers/electronic devices, accounts, programs, or files.
Approved 12/17/99, Revised 12/15/00, Revised 6/21/02,
Revised 5/23/03, Revised 6/15/12