Old Town library sets rules for computer use> Connection to the Internet expected in December

loading...
OLD TOWN — The information superhighway is expected to make its debut at the Old Town Public Library during December, according to Librarian Valerie Osborne. In anticipation of the new service, library officials have developed a set of rules and conditions for acceptable Internet use.
Sign in or Subscribe to view this content.

OLD TOWN — The information superhighway is expected to make its debut at the Old Town Public Library during December, according to Librarian Valerie Osborne.

In anticipation of the new service, library officials have developed a set of rules and conditions for acceptable Internet use. The rules were approved by the City Council this week.

The first thing all who intend to use the new service must do is to sign the library’s Internet Use Agreement. In the case of patrons under the age of 18, the agreement must be signed by a parent.

Internet users also will need to obtain an Internet access card at the circulation counter. The card must be displayed during Internet use.

Library patrons will be able to use the Internet during the library’s usual operating hours, with the exception of periods when the staff is training the general public on the network’s use.

Users may sign up for 20-minute sessions on designated computer terminals. Appointments will be filled first-come, first-served, according to the guidelines for use. If the computer is not reserved for another user at the end of the session, users may sign up for more time.

Those who violate user rules may lose their library privileges, the policy states. It also stipulates that illegal acts could lead to prosecution by local, state or federal authorities.

Some examples of illegal actions are using the library’s computers to display or disseminate obscene material, or to reproduce or distribute copyrighted material.

Other prohibited activities include using the library’s computer equipment to harass, libel or slander others; violating computer security and other users’ privacy; and damaging or destroying equipment, software and data belonging to others.


Have feedback? Want to know more? Send us ideas for follow-up stories.

comments for this post are closed

By continuing to use this site, you give your consent to our use of cookies for analytics, personalization and ads. Learn more.