policies – Internet-policy
The Library has chosen to offer access to the Internet because there are many valuable resources on it. Because of its size and complexity, the Internet cannot be monitored or controlled by the Library or any other organization. The Library recognizes that it has a responsibility to set policies and guidelines to encourage the public’s responsible and appropriate use of the Internet within the library’s buildings, particularly as that use includes children.
In providing Internet access the Library subscribes to the principles set forth in the Library Bill of Rights and its interpretation on the Access to Electronic Information, Services, and Networks adopted by the American Library Association.
The Library expressly disclaims any liability or responsibility arising from access to or use of information obtained through its electronic information systems, or any consequences thereof.
Rights and Responsibilities of Users
The Library does not have the ability to select, monitor, or control the content of the vast number of Internet sites available. The Internet provides access to information that may be inaccurate, controversial, illegal, personally offensive to the viewer, or inappropriate for children. Individual users must exercise judgment in evaluating the validity and appropriateness of information retrieved via the Internet and must assume personal responsibility for their use. The Horry County Memorial Library cannot be held liable for the content of any Internet site.
It is not acceptable to use the Library’s access to electronic information, services, and networks for any purposes that violate federal, state, and local laws. The user will be responsible for knowledge of all applicable federal, state, and local laws for which they may or may not be held in violation.
While the Horry County Memorial Library upholds users’ rights to privacy and confidentiality in their use of all library resources, the nature of electronic resources makes it impossible to guarantee these rights. Since some Internet sites may be inappropriate for viewing in a public setting, users should exercise discretion in consideration of the rights of others. Should such viewing become disruptive to the operations of a library facility, Library staff will follow the Rules of Behavior for Use of Library Facilities policy.
In compliance with the Children’s Internet Protection Act (CIPA) the library filters public Internet computers. Should an adult desire access to a website that has been blocked by the filtering software, he or she can request that the website be unblocked. If the website appears to be in accord with the Library’s Internet Use Policy, after being reviewed by designated staff, the library may comply with the request within a reasonable length of time.
As with other library resources, the Horry County Memorial Library affirms the responsibility of parents to determine the appropriateness of Internet resources for their children. The Library encourages parents to supervise their children’s Internet use. All computers, including Children’s, are content filtered using content filtering software as required by the Children’s Internet Protection Act (CIPA). Adults cannot signup and use the Children’s computers. (Only a child’s card can sign-up for a child’s computer)
It is the policy of Horry County Memorial Library to: (a) prevent user access over its network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications; (b) prevent unauthorized access and other unlawful activity; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children’s Internet Protection Act.
Key terms are as defined in the Children’s Internet Protection Act.*
Access to Inappropriate Material
To the extent practical, technology protection measures (or “Internet filters”) shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information.
Specifically, as required by the Children’s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors.
Inappropriate Network Usage
To the extent practical, steps shall be taken to promote the safety and security of users of the Horry County Memorial Library online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications.
Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
Education, Supervision and Monitoring
It shall be the responsibility of all members of the Horry County Memorial Library staff to educate, supervise and monitor appropriate usage of the online network and access to the Internet in accordance with this policy, the Children’s Internet Protection Act, the Neighborhood Children’s Internet Protection Act, and the Protecting Children in the 21st Century Act.
Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Director of Libraries or designated representatives.
Internet workstation users must behave in accordance with the Library’s policies and procedures
The Library may establish sign-up procedures and time limits for use of the Internet workstations
Library staff will assist Internet users in a manner consistent with other Library services. The availability of staff and needs of other Library users will necessarily affect the extent of assistance in Internet use. Library staff is available to assist you in your use of these resources, but may not be familiar with every application you might wish to use. Due to scheduling constraints, there may not be an Internet trained employee on duty at all times. Because of the many different Internet applications available, the Library cannot provide complete technical support.
The Library does not provide individual e-mail accounts.
Users may print from and/or download to jump drives or external USB devices as the Library is able to allow.
The Library will charge for services that consume supplies such as printing.
The following are considered to be a violation of Library policy and users are not to:
Instruct or demonstrate to another person how to bypass the Library’s web-filtering technology.
Damage or attempt to damage equipment; alter or attempt to alter software configurations.
Attempt to gain unauthorized access, cause interference or disruption of the Library’s computer system or any other computer system–Such interference or disruption includes, but is not limited to: distribution of unsolicited advertising; transmission of threatening, obscene, or harassing materials; propagation of computer worms or viruses; or use of the network to make unauthorized entry to other computational, information, or communications devices or resources.
Violate copyright laws or software licensing agreements.
Display or send obscene (as defined by S.C. Code 16-15-305) images, messages or files.
Violate state, federal, or local laws or regulations.
Install software on the Internet workstations.
Penalties for policy violations
Violations of this policy will result in the following actions.
First incident (where the patron either refuses to comply with staff directive or the patron has over time repeatedly been told of a need to comply)—banned from the Library for a day
Second incident—banned from the Library for 30 days
Third incident—banned from the Library indefinitely (after a one year period the patron may request to have his library privileges restored from the Library Director) The Library Director is not obligated to restore privileges rather weighs his decision based on the seriousness of the incidents caused that the banning and the potential for recidivism.
· CIPA definitions of terms:
TECHNOLOGY PROTECTION MEASURE. The term “technology protection measure” means a specific technology that blocks or filters Internet access to visual depictions that are:
1. OBSCENCE, as that term is defined in section 1460 of title 18, United States Code;
2. CHILD PORNOGRAPHY, as the term is defined in section 2256 of title 18, United States Code; or
3. Harmful to minors.
HARMFUL TO MINORS. The term “harmful to minors” means any picture, image, graphic image file, or other visual depiction that:
1. Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;
2. Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, an actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and
3. Take as a whole, lacks serious literary, artistic, political, or scientific value as to minors.
SEXUAL ACT; SEXUAL CONTACT. The term “sexual act” and “sexual contact” have the meanings given such terms in section 2246 of title 18, United States Code.
The library is not responsible for any damages from using the Internet including but not limited to: loss of data; damage to patron property; identity theft; or any other consequences of accessing the Internet. The library has no control of the security of sending any information including credit card numbers. The library is a public facility and encourages all patrons to use proper protocol for sending private information. All computer users agree to hold the Horry County Memorial Library System harmless from any and all claims, losses, damages, obligations, or liabilities directly or indirectly relating to the use of HCML and the Internet, caused thereby or arising there from. Please be aware that you will be connecting to the Internet on our public network. This network is susceptible to viruses and spyware because the clients aren’t protected. They have security software loaded that wipes them clean at log off. We do have a firewall in place on this network but it only protects from outside threats. If there is a virus or spyware roaming internally via someone’s jump drive for example your machine would be at risk.
ADOPTED BY THE HORRY COUNTY MEMORIAL LIBRARY
BOARD OF TRUSTEES: June 26, 1997
LAST REVISION: October 27, 2011