Statement of Acceptable Use for Electronic Information Networks

The Cook Memorial Public Library provides access to electronic information networks, including the Internet, primarily for use as an information resource tool. All electronic traffic originating from library connections shall be in accordance with the following Acceptable Use Guidelines. Failure to use electronic resources within the guidelines of acceptable use may result in suspension of access privileges, and/or loss of library privileges.


1. Users are expected to follow all federal, state, and municipal laws in their use of electronic information networks.

      • Users may not use the networks for any illegal activity. Users may not place any material on the Internet related to any illegal activity or constituting or encouraging conduct that would constitute a criminal offense or give rise to civil liability.
      • Users may not use the networks to access child pornography or material that is obscene as defined by law.
      • Users may not use the electronic information networks in any way, which violates licensing agreements between Cook Library and network/database providers.
      • Users may not violate software license agreements or engage in unauthorized duplication of copy protected software.
      • Users are responsible to respect copyright laws and owners’ rights to private information and resources.

Illegal acts involving the library’s network connections may be subject to prosecution by local, state or federal authorities.

2.  Users are expected to utilize the library’s electronic information networks properly.
Users may not use the networks for any purpose that results in interference with or disruption of network users, services, or equipment. Interference includes but is not limited to:

      • Distribution of unsolicited advertising
      • Propagation of computer worms, viruses or other harmful components
      • Using the network to make unauthorized entry to any other machine accessible via the network
      • Destruction of, damage to, or unauthorized alteration of the library’s computer equipment, software, or network security procedures.

Users may not install software or download any files onto the hard drives of the network computers. All downloaded files must be saved to storage devices removable disks. Users will be held responsible for any damage to library software or hardware.The Library cannot ensure the security of account or credit card numbers entered using the network. Users are responsible to assume payment of fees for any fee-based services they incur.

3.  Users are expected to follow library rules of conduct while using the library’s electronic information networks.
Users may not use the networks for any purpose that results in harassment or intimidation of others, or in any manner that disrupts or significantly hampers its use or the use of the library by others. Unacceptable use includes but is not limited to:

      • Use or dissemination of information in a manner which violates the legal rights of others
      • Violation of the privacy of another user or library patron
      • Overuse of computer equipment which denies access to other users.

Approved by the Board of Trustees on 02-15-00

Revised: 7/15/03 Revised: 11/02/06