Use a computer
Internet/Computer Use Policy
The Garrett Memorial Library has 2 desktop computers, 1 laptop, and 6 tablets available for public use, as well as free wi-fi for personal devices.
The Garrett Memorial Library (GML) endeavors to develop collections, resources, and services that meet the cultural, informational, recreational, and educational needs of the community. It is within this context that the library offers public access to the Internet. The following guidelines describe the terms of access to the Internet through computers provided on premises at GML or through its wireless connections and constitute official institutional policy on this matter.
* Absolutely no food or drink is allowed in the computer areas.
* Paper is provided for printing at $0.50 per sheet of colored ink and $0.25 per sheet of black and white.
GML does not monitor and has no control over the information available through the Internet and cannot be held responsible for its content. The Internet is a global entity with a highly diverse user population and library patrons use it at their own discretion and risk. Individual patron access to the Internet through GML computers or wireless connections is unsupervised and unmonitored by GML staff.
All Internet resources accessible through library channels are provided equally to all adult (age 18 and older) library users. Parents and guardians - neither the library nor its staff - are responsible for the Internet information selected and/or accessed by their children. Only parents and guardians may restrict their children - and only their children - from access to Internet resources accessible through library channels. Parents are advised to supervise their children’s Internet sessions.
As a participant in the Universal Service discount program (commonly known as ERate), funded as part of the Library Services and Technology Act and Title III of the Elementary and Secondary Education Act, GML complies with federal law (Children’s Internet Protection Act and Neighborhood Internet Protection Act) mandating the use of filtering software in public libraries. Internet filters are software programs that block access to content that is considered inappropriate for viewing in a public place. It employs filtering software to protect against the visual depiction of pornography, obscenity, and child pornography. Per the previously stated statutes, other types of content subject to filtering include:
* Matter on the Internet that is inappropriate for minors.
* Unsafe or unsecure direct communication forums including email and chat rooms.
* Unauthorized websites or applications used for “hacking” and other unlawful activities.
* Unauthorized attempts to disclose, use, and disseminate personal information about minors or any other protected group.
* Any web-based software or programs that may be harmful to the CPL network or computer equipment.
GML will employ filtering measures on any publicly accessible computer that may display or disseminate harmful content to minors. No filtering software is totally accurate. Filters may falsely block material that is appropriate in a public library setting or they may fail to block access to illegal or objectionable material. Patrons may submit a Request for Reconsideration of a Website to block or unblock a specific site. GML will respond to questions and concerns regarding the filter's accuracy by communicating with the filtering software vendor towards improving its product.
*GML follows state and federal law regarding privacy of library users' records and information.
Response to Violations
The user’s access to the Library’s computer network and Internet is a privilege, not a right. Failure to comply with this policy and its procedures will result in the forfeiture of the user’s right to access these computers.
The Library’s wireless network is not secure. Information sent from or to your laptop can be captured by anyone else with a wireless device and the appropriate software, within three hundred feet.
Library staff is not able to provide to provide technical assistance and no guarantee can be provided that you will be able to make a wireless connection. The library assumes no responsibility for the safety of equipment or for laptop configurations, security, or data files resulting from connection to the libraries network. The laptop/ device owner is responsible for setting up their equipment to access the Garrett Memorial Library Wireless Network.
Inappropriate Use Of Library WIFI
A. Copyright Violations: The downloading or distribution of unauthorized copies of copyrighted materials, including, but not limited to motion pictures, images, files, or songs constitutes copyright infringement under the Copyright Act, Title 17 United States Code Section 106(3). This conduct may also violate the laws of other countries, international law, and/or treaty obligations. (Amendment April 14, 2011) Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them. Any responsibility for any consequences of copyright infringement lies with the user; the Garrett Memorial Library expressly disclaims any liability or responsibility resulting from such use.
B. Behavior which Violates Local, State, Federal Laws or Encourages Others to Violate Said Laws. Iowa law (Code of Iowa, Section 716A) prohibits damaging or destroying a computer or computer program, software, or system. Transmitting of offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; viewing, transmitting or downloading pornographic material or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials are prohibited. Unauthorized access is also prohibited. Persons attempting such action can be prosecuted.
C. Uses that Cause Harm to Others or Damage to Their Property. Engaging in defamation (harming another's reputation by lies); uploading a worm, virus, "trojan horse," "time bomb," ransomware, or other harmful form of programming or vandalism; participating in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems. Compromising the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communications.