Article I: General Policy.
The Cook Memorial Public Library District (“Library”) endeavors to develop collections, resources, and services that meet the cultural, informational, recreational, and educational needs of the District’s patrons. It is within this context that the Library provides access to electronic information, databases, media, and the Internet (“Electronic Information Networks”). Providing access to Electronic Information Networks is intended primarily for use as an information resource tool and is consistent with the Library’s Collection Development Policy and Mission Statement. Patrons can access the Electronic Information Networks inside of the Library using their own computer systems or personal devices utilizing the Library’s free, unfiltered wireless internet connection (“Wireless Internet Access”). Electronic Information Networks and Wireless Internet Access are collectively referred to as “Wireless Information Networks.”
Article II: Patron Rights, Responsibilities, and Risks.
Wireless Information Networks are dynamic, global resources that provide access to a wide variety of information. The Library does not have control over these resources and is not responsible for the content, availability, reliability, currency, accuracy or appropriateness of information accessed via their use. Library patrons use these resources at their own discretion and the Library is not responsible for any damages, indirect or direct, including but not limited to, loss of data or any violation of privacy arising from a Library patron’s use of Wireless Information Networks. Patrons using Wireless Information Networks agree that the Library may be required to disclose any information if directed to do so by a court of competent jurisdiction. The Library extends the protections of applicable confidentiality laws to all records of Internet activity maintained on the Wireless Information Networks. The Library reserves the authority to reasonably regulate these resources to ensure the proper and efficient operation of the Library.
Library patrons have certain rights with respect to the use of Library resources, including Wireless Information Networks. Library patrons have the right to equitable access and the right to confidentiality and privacy in the use of Wireless Information Networks to the extent possible given certain constraints, such as proximity of other patrons and staff in public access settings. Patrons also have the right to access and read all patron related Library service policies, and discuss questions with the appropriate Library staff. This policy is part of the Library’s overall policy structure and should be interpreted in conjunction with other existing policies. Copies of all patron related Library policies are available upon request and on the Library’s website.
The Library recognizes that the Internet may contain materials that are inappropriate for children and that may be objectionable to some adults. Parents or legal guardians, not the Library or its staff, are responsible for information selected, transmitted, and/or accessed by their children. The Library encourages parents to monitor and supervise their children’s Internet use.
Article III: Rules and Guidelines for Use.
The Library provides unencrypted/unsecure Wireless Internet Access for the convenience of patrons. Patrons use it at their own risk. It is available to the general public, and is NOT INHERENTLY SECURE. The providers cannot and do not guarantee the privacy of user’s data and communication while using the service.
- here are potentially serious security issues with any computer connected to the Internet without the appropriate protection, ranging from viruses, worms and other programs that can damage the user’s computer, to attacks on the computer by unauthorized or unwanted third parties. By using the Wireless Internet Access, a user acknowledges and knowingly accepts the potential serious risks of accessing the Internet over an unsecured network. It is recommended that users take steps to protect their own computer system, such
as installing current anti-virus software and maintaining appropriate firewall protection. Users should consult a computer security professional for further information.
- The Library accepts no responsibility regarding the ability of patron-owned equipment to connect to the Wireless Internet Access. Individuals accessing the Internet using their own equipment via the Library’s wireless connection are responsible for configuring their wireless equipment. The Library does not provide software or hardware technical support. Bandwidth is shared and limited, and patrons using more than their fair share may be blocked from wireless access. Users shall use Library resources for lawful purposes and respect copyright regulations.
- Destruction of, damage to, or alteration of the Library’s equipment, software, or network security is prohibited. The Library will take necessary action against anyone violating this policy, including, but not limited to:
- Asking individuals to discontinue their display of information and images that may cause a disruption; and/or
- Terminating a Wireless Internet Access session; and/or
- Revoking a patron’s library privileges.
- Prohibited uses include:
- Illegal Activity: Using the Wireless Internet Access in violation of applicable local, state and federal laws and regulations, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.Users may not place any material on the Internet related to any illegal activity or constituting or encouraging conduct that would constitute a criminal offense or give rise to civil liability.
- Licensing Violations: Use of the Wireless Internet Access in any way,which violates licensing agreements between the Library and network/database providers. Users may not violate software license agreements or engage in unauthorized duplication of copy protected software.
- Spamming: Sending of unsolicited bulk and/or commercial messages over the Internet using the Wireless Internet Access.
- Intellectual Property Right Violations: Engaging in any activity that infringes or misappropriates the intellectual property rights of others,including, but not limited to, patents, copyrights, trademarks, service marks,trade secrets, or any other proprietary right of any third party.
- Obscene or Indecent Speech or Materials: Using the Library’s Wireless Internet Access to advertise, solicit, transmit, store, post, display, or otherwise make available obscene images. The Library will notify and fully cooperate with law enforcement if it becomes aware of any use of the Wireless Internet Access in any connection with child pornography or the solicitation of sex with minors.
- Forging of Headers: Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.
- Hacking: Accessing illegally or without authorization computers, accounts,equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.
- Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities: Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mail-bombing, or denial of service attacks or like matters. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Wireless Internet Access or any connected network, system, service, or equipment.
- Facilitating a Violation of this Policy of Use: Advertising, transmitting, or otherwise making available any software product or service that is designed to violate this Policy, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail-bombing, denial of service attacks, and piracy of software.
- Export Control Violations: The transfer of technology, software, or other materials in violation of applicable export laws and regulations, including, but not limited to, the U.S. Export Administration Regulations and Executive Orders.
- Resale: The sale, transfer, or rental of the Wireless Internet Access to customers, clients or other third parties, either directly or as part of a service or product created for resale.
- Interference: Use of personal wireless networks and personal hotspots that interfere with other users’ Wireless Internet Access.
- By using the Wireless Internet Access, users acknowledge and agree that use of
this service is solely at their own risk. By using the Wireless Internet Access,
users also agree to all terms set forth in the following Disclaimer.
- Service provided “as is.” Wireless Internet Access provides access to the Internet on an “as is” basis with all risks inherent in such access. The providers of the service make no warranty that the service or that any information, software, or other material accessible on the service is free of viruses, worms, Trojan horses or other harmful components. By using the Wireless Internet Access, the user acknowledges and accepts the risks associated with public access to the Internet and public use of an unsecured wireless network.
- Service provided “as available.” Wireless Internet Access is provided on an “as available” basis without warranties of any kind, either express or implied, that the service will be uninterrupted or error-free, including but not limited to vagaries of weather, disruption of service, acts of God, warranties of title, noninfringement, nor implied warranties of merchantability or fitness for a particular purpose. No advice or information given by the providers, affiliates, or contractors of the service or their respective employees shall create such a warranty.
- Disclaimer regarding third party content. Wireless Internet Access offers access to numerous third party web pages, services and content available over the Internet. The Library does not exercise control over sites that users visit or services that users use. Users should read the privacy policies of all sites visited and services used to learn how personal information is handled. The Library does not control and is not responsible for data, content, services or products that users access or download through the service.
- Indemnity. Users agree to hold harmless and indemnify the Library, and its suppliers, licensors, officers, directors, employees, agents and affiliates from and against any claim arising from or in any way related to the use of the service.