Flagstaff City-Coconino County Public Library

Technology Use Policy

Purpose Statement: The electronic resource objectives of the Library are to provide city and county patrons with computer access to a variety of networked electronic resources, including the Library catalog, online subscription databases, and the internet.

I. Responsibilities

1. User responsibilities

A. General Responsibilities for electronic resources

Electronic resources may only be used for legal purposes; per federal order (F.C.C. 03-188), filtering software is applied to all computers. Examples of illegal use include, but are not limited to, the following:

  • Attempting to alter or damage computer equipment, software configurations, or file belonging to the Library, other users, or external networks.
  • Attempting unauthorized entry to the Library's network or external networks.
  • Intentional propagation of computer viruses.
  • Violation of Federal copyright or telecommunications laws (A.R.S. 13-3707).
  • Violation of software license agreements.
  • Transmission of speech not protected by the first amendment.
  • Display of materials considered obscene as defined by the Children's Internet Protection Act Pub. L. 106-554, and as defined by A.R.S. section 13-3501 through 13-3512; especially statutes 13-3501, 13-306, and 13-3507.
  • Gambling on the Internet; Internet gambling is not amusement, social or regulated gambling as defined by A.R.S. 13-3304, and F.C.C. 6-01-001-0012.
  • Violation of any Federal, Arizona State, or City of Flagstaff laws.

B. Electronic resources must also be used in accordance with the ethical standards of the Library.

Examples of unethical use (which may also have legal consequences) include, but are not limited to, the following:

  • Violation of computer system security.
  • Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others.
  • Using computer communications facilities in ways that tie up, interfere with, or impede others computer usage.
  • Violation of external networks' regulations and policies.
  • Violation of another user's privacy.

2. Guidelines for use

A. When using electronic resources at the Library:

  • Computer users must use their own library card. Visitors must acquire a guest pass.
  • Workstations are available on a first-come, first-served basis. For every machine, patrons must observe all sign-up requirements and posted time limitations. Patrons must relinquish usage of a workstation when asked by a Library staff member. Failure to do so will result in loss of computer-use privileges, potential loss of Library privilege, and potential legal consequences.
  • Only 2 people may use any particular terminal at one time due to limited space at the terminals.
  • Patrons may not upload software programs on Library computers.
  • Permanent storage is not available on public computers.
  • Cameras are disabled on desktop computers. Cameras are available on in-house laptops.

B. Printing

  • There is a charge for printing.

C. Downloading

  • Files may be downloaded to personal storage devices or temporarily to the desktop.
  • Software downloads are not allowed.
  • A virus checker is installed on each machine to scan for current viruses. In the event that a patron's digital media is infected, downloading will not be allowed until it has been disinfected.

II. Sanctions

The Library relies upon the cooperation of its patrons to efficiently and effectively provide shared resources and ensure access to a wide range of information. If individuals break these acceptable use rules in any way, their right to use networked resources may be suspended for a specified period of time, depending upon the damage caused by their actions. Notification will be given concerning the length of and the reason for the suspension. Individuals using Library computing resources for illegal purposes may also be subject to local, state or federal prosecution.

III. Disclaimers

The Library has no control over the information available on the internet, its quality, accuracy or currency, except on pages designed and maintained by the Library. While the Library is deeply concerned that children have a safe educational Internet experience, individual users must determine the appropriateness of materials for their needs. Parents and/or legal guardians are responsible for their child's exposure to ideas and information.

Staff time for answering detailed questions about navigating the internet, software, or applications is limited. For in-depth assistance computer tutoring at the library is available. There are also books available for checkout from the library that can provide instruction on these topics.

U.S. Copyright Law (Title 17, U.S. Code) prohibits the unauthorized reproduction or distribution of copyrighted materials, except as permitted by the principles of "fair use". Users may not copy or distribute electronic materials (including electronic mail, text, images, programs or data) without the explicit permission of the copyright holder. Any responsibility for consequences of copyright infringement lies with the user. The Library expressly disclaims any liability or responsibility resulting from such use.

The Children's Internet Protection Act (Pub. L. 106-554), and Arizona Revised Statute (ARS 13-3501-3512), prohibits persons from knowingly placing obscene material upon public display, or from knowingly failing to remove such a display from property in his possession or under his control after learning of its existence.

IV. Liability Limitations and Patron Privacy

The Library assumes no liability for any loss or damage to users' data, disks, or peripherals, nor for any personal damage or injury (physical, emotional or mental) incurred as a result of using the Library electronic resources, including damage or injury sustained from invasions of user privacy.

In keeping with the Library's general policies, the systems administrators will strive to protect our patrons' rights to privacy and confidentiality. However, in general, electronic communication is not secure and networks are susceptible to outside intervention. As part of normal system maintenance, network administrators do monitor system activity, but the Library does not reveal an individual's use of computer resources unless compelled to do so by court order, or relevant state or federal statutes.

System administrators at the Library reserve the right to modify system administrator and/or user policies at any time.

Public Internet Access Fair Use Policy

Computers are available free of charge for public use, on a first-come, first-served basis. The library relies on the cooperation of its patrons to efficiently and effectively provide shared resources and to ensure community access to the internet. Violations of computer system security, circumvention of the computer use reservation program, unauthorized alteration of software configurations, attempts to damage computer hardware or software, or use of a workstation for illegal or criminal purposes, will result in losing internet privileges permanently. Illegal acts involving library resources, including violation of U.S. Copyright Law (Title 17 U.S. Code), may be subject to prosecution by local, state, or federal officials.

It is unlawful for any person to knowingly display visual depictions that are obscene, child pornography, or harmful to minors as defined by the (Children’s Internet Protection Act, Pub. L. 106-554), and (Arizona Revised Statutes 13-3501 TO 13-3512). It is also unlawful to gamble on the internet in a public place (ARS 13-3304, AND FCC 6-01-001-0012). Patrons violating these statutes will be told to cease and desist. If they refuse, they will be told to leave the library and will lose internet privileges.

The internet provides access to adult subjects. Current library policy does not allow our staff to determine what ideas or information may be presented to any patron. Individual users must determine the appropriateness of materials for their needs. Parents and/or legal guardians are responsible for their child’s exposure to ideas and information while in the library.

In general, electronic communication is not secure and networks are susceptible to outside intervention. Therefore, the library cannot guarantee patron privacy when using our machines to access the internet. Also, public computers may not have the same options as those available on a home computer. Staff time for answering detailed questions about navigating the internet, and software or applications is limited. For in-depth assistance computer tutoring at the library is available. Also, there are books available for checkout from the library that can provide instruction on these topics. To view the full Technology Use Policy, go to the bottom of the library website page and look at Policies under the category.