Internet and Wifi Policy
Internet and Wifi Usage Policy
The Lone Cone Library District (LCLD) provides public access to the internet in keeping with its role of providing access to informational and popular interest resources. LCLD provides free, equitable, and organized public access to internet resources. This access honors the fundamental Library District principle of intellectual freedom, an abiding respect for the dignity and privacy of individual inquiry. This policy applies to adults and minors.
LCLD staff will work in partnership with parents and guardians to help supervise minors in the safe use of the internet in compliance with Federal and State laws. Because we cannot control all aspects of this vast resource, we urge parents to continually participate in their child’s learning process by helping them make good choices in selecting appropriate materials and websites.
In total, LCLD has no control over information accessed through the internet and cannot be held responsible for its content. Much of the information on the internet is timely, useful, and/or entertaining. Some of it is dated, erroneous, offensive, or illegal. Patrons should cast a cautious and critical eye on any and all data they discover. The job of LCLD is access, not endorsement.
Filtering of Library District Computers
In 2000, Congress passed the Child Internet Protection Act (CIPA) (Pub. L. No. 106-554), which requires libraries receiving certain types of federal funding to install technology protection measures that block images (“visual depictions”) that are obscene, contain child pornography, or are harmful to minors; except that no technology protection measure may block scientific or medically accurate information regarding sexual assault, sexual abuse, incest, sexually transmitted disease, or reproduction health. In 2004, Colorado legislature passed a similar law (HB 04-1004 Internet Protection in Public Libraries, C.R.S. 24-90-601-606) mandating protective measures in all library district public computers. Therefore, LCLD provides specific computers for minor patron use while in the building. These computers have filters that comply with state and federal laws.
Filters may falsely block constitutionally protected speech, or they may fail to block access to illegal or objectionable material. LCLD utilizes commercial filtering software to block access to obscene and sexually explicit materials. Keep in mind, however, no filtering software is 100% accurate.
- Library patrons use the internet at their own risk. It may contain controversial material that some may find offensive.
- The library does not monitor and has no control over the information on the internet and cannot be held responsible for its content.
- Users should be aware that the internet is not a secure medium and that third parties may be able to obtain information regarding the user’s activities. The library is not responsible for any loss or damage incurred by a user of the library’s computer or telecommunications equipment.
- LCLD will not release information on the use of internet computers or specific websites accessed by members of the public, except as required by law or when necessary for the proper operation of the library.
- LCLD provides free wireless internet access inside and outside the building between the hours of 7:00 am and 10:00 pm daily. Contact library staff for the current password.
- Patrons need to be aware that the wireless network is not secure. Like many public wireless hotspots, information is not encrypted and is subject to electronic eavesdropping. Wireless users are responsible for providing security for their own equipment and electronic communications.
- By using the wireless network you are agreeing to comply with the library’s policies concerning use of the internet.
- The library exercises no control over and will not be held responsible for user-supplied equipment or internet content that users choose to access or create using personal equipment.
- While the library strives to provide a quality wireless system, it cannot guarantee the signal quality, bandwidth availability, or general internet site availability at any time.
Terms and Conditions
By using the internet service provided by LCLD, patrons hereby expressly acknowledge and agree that there are significant security, privacy and confidentiality risks inherent in accessing or transmitting information through the internet, whether the connection is facilitated through wired or wireless technology. Security issues include, without limitation; interception of transmissions, loss of data, and the introduction of viruses and other programs that can corrupt or damage a computer.
Accordingly, patrons agree that LCLD is NOT liable for any interception or transmissions, computer worms or viruses, loss of data, file corruption, hacking or damage to a computer or other devices that result from the transmission or download of information or materials through the internet service provided.
Use of the wireless network is subject to the general restrictions outlined as follows. If abnormal, illegal, or unauthorized behavior is detected, including heavy consumption of bandwidth, LCLD reserves the right to permanently disconnect the offending device from the wireless network.
Examples of Illegal Uses
The following are representative examples only and do not comprise a comprehensive list of illegal uses:
- Spamming and invasion of privacy – Sending of unsolicited bulk and/or commercial messages over the internet using the service or using the service for activities that invade another’s privacy.
- Intellectual property right violations – Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.
- Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate/circumvent security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- The transfer of technology, software, or other materials in violation of applicable export laws and regulations.
- Export Control Violations
- Using the service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.
- Uttering threats;
- Distribution of pornographic materials to minors;
- Child pornography.
Examples of Unacceptable Uses
The following are representative examples only and do not comprise a comprehensive list of unacceptable uses:
- High bandwidth operations, such as large file transfers and media sharing with peer-to-peer programs (i.e.torrents)
- Obscene or indecent speech or materials
- Defamatory or abusive language
- Using the service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.
- Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Distribution of internet viruses, Trojan horses, or other destructive activities
- Distributing information regarding the creation of and sending internet viruses, worms, Trojan horses, pinging, flooding, mail-bombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the node or any connected network, system, service, or equipment.
- The sale, transfer, or rental of the service to customers, clients or other third parties, either directly or as part of a service or product created for resale.
- Seeking information on passwords or data belonging to another user.
- Making unauthorized copies of proprietary software, or offering unauthorized copies of proprietary software to others.
- Intercepting or examining the content of messages, files or communications in transit on a data network.
Remedies and Enforcement
LCLD reserves the right to take appropriate remedial or disciplinary action as outlined in the Patron Responsibility and Conduct Policy to ensure compliance with this Internet and Wifi Usage Policy. Staff is authorized to take prompt and appropriate action to prohibit use by those who fail to comply with this policy. Unlawful activities will be dealt with in an appropriate manner, including referral to law enforcement authorities.
Guidelines on Access to Information
LCLD is guided by the following American Library Association statements on access to information:
LCLD is guided by a commitment to information policies that provide appropriate protections to its patrons while being consistent with its long-standing commitment to the principles of free expression as set form in the First Amendment to the United States Constitution.