It is the mission of the Joshua Hyde Public Library to provide materials for information, for general educational advancement, and for the enrichment and recreation of its patrons. In support of this mission, the Library provides its patrons free access to computers and the internet. The internet allows users to connect to global resources, networks, and information, much of which may not be available in print. Library patrons are encouraged to take advantage of these services.
The Joshua Hyde Public Library does not produce or monitor, and has no control over, the information accessed through the internet. Likewise, the Library does not have complete knowledge of what might be available via the internet. Information on the internet may be reliable and current or it may be willfully inaccurate and out of date. The information may be unavailable at times. Patrons must be good and critical information consumers, questioning the validity of anything found on the internet. The Joshua Hyde Public Library cannot be held responsible for the content of the internet.
As with other library materials, a child's use of the internet is the responsibility of the parent/legal guardian. The parent/legal guardian should guide their children in the use of the internet.
Staff will assist patrons with internet use as time permits but cannot offer personal instruction.
Unacceptable Use
Patrons are expected to use the Library’s computer and internet resources in a responsible manner, respecting the rights of others. It is not acceptable to use internet access for any purpose that violates federal or state law. Using Library computers to copy and distribute copyright protected works may be an infringement of the copyright law (Title 17 U.S. Code). Computer privileges may be suspended or revoked, at the discretion of the Librarian if a patron is found tampering with the computers. Examples of unacceptable use include, but are not limited to:
disruptive behavior or harassment of other Library users or staff;
invading the privacy of others;
degrading or disrupting equipment, network, or system performance;
destruction of or damage to equipment, software, or data belonging to the Library or other users;
gaining unlawful access, including “hacking” and other unlawful activities;
unauthorized use of computer accounts, access codes, or identification numbers;
disruption or unauthorized monitoring of electronic communications;
violating software license agreements and copyright laws;
violating other federal, state, or local laws;
deliberately displaying obscene images.
Computer Usage
Patrons must sign up to use the Library’s computers. Each time slot is 1 hour long.
Patrons may sign up for a maximum of two time slots. Any extension of a patron’s computer session beyond two hours will be at the discretion of the Librarian.
Computers in the Children’s Room are reserved for patrons 12 years of age and under. No one over the age of 12 years may use those systems unless accompanied by a child.
All computers must be shut down 20 minutes prior to the Library’s closing time.
Printing services are available for a per-page fee.
Wireless Access
Wireless internet access is available to patrons who use the Library’s laptop computers or who bring their own portable wireless devices to the Library. As with any wireless internet access service, the Library cannot guarantee either a secure connection, or any specific connection speed. The quality of the wireless service may vary depending upon the number of users connected, and their location within the Library or on the grounds.
Library staff will provide general information on the settings necessary to access the internet over our wireless connection. If a patron has problems accessing the internet over this connection, staff will only verify that the Library’s connection is operating normally. Staff will not perform troubleshooting on the patron’s own wireless device.
Since the Library cannot in any way guarantee a secure connection to the internet in a wireless environment, patrons are strongly advised to protect all devices that connect to the Library network by keeping their operating system(s) and all their software fully patched and up to date. They are likewise advised to utilize anti-malware (viruses, spyware, Trojans, etc.) software that has the most current updates available to prevent unauthorized access to their own wireless devices while they are in use. Wireless users are also advised not to transmit credit card information, passwords, or any other sensitive personal or financial information while using any Library connection.
This policy governs the use of the internet via the Library’s wireless access points in all areas within range of the connection, both inside and outside the building.