Skip to main content

Services

To search for books, Browse Our Catalog

Computers & Printing: Policies & Guidelines

Policies and Guidelines

By logging on to a Centerville – Center Township Public Library computer or by using the library’s wireless internet, you are agreeing to abide by the terms listed below in addition to adhering to all other library policies and procedures.

Rules for Technology Use

  1. A user of the library’s public access computers must be a CCTPL cardholder or an individual possessing acceptable identification.*
  2. CCTPL cardholders must meet existing CCTPL rules for checking out materials and/or equipment.*
  3. All public access computers have a time limit that will be enforced accordingly. Computer use is on a first come, first served basis. Additional time is allowed if no one is waiting. A reservation system is available to ensure a patron waiting for a computer is given the opportunity for computer time before someone whose time limit has been reached is allowed to add additional time.
  4. Sexually explicit or sexually suggestive (obscene/pornographic) material access and/or viewing is prohibited.
  5. Attempts to reconfigure or change hardware or software settings may be grounds for revocation of computer privileges.
  6. Users of the Library’s wireless access services must comply with all applicable rules and guidelines in this policy.

*Any patron who wants to access government documents and does not meet the requirements stated in #1 and #2 above will be provided with mediated (staff-assisted) access. Mediated access should be requested at the adult services desk.

Technology Use Policy

Access to Government Publications

Centerville – Center Township Public Library is a Federal and State depository library. As such, any person, including unaccompanied minors, has the right to access government publications regardless of library standing. Citizens who are unable to connect using the library’s public access computers for any reason will be provided with mediated (staff-assisted) access. Mediated access should be requested at the youth services desk or the adult services desk.

Warning About Security and Confidentiality

Internet activities can be extremely vulnerable to unauthorized access and modification. For this reason, electronic communication and work carried out via Centerville – Center Township Public Library computer stations is not considered confidential. When necessary, such communication may be used as evidence in criminal investigations and/or prosecutions. Evidence of illegal activity may prompt Centerville – Center Township Public Library to report such activity to legal authorities.

Display/Dissemination of Sexually Explicit Materials

Display or dissemination of sexually explicit or sexually suggestive (obscene or pornographic) material is prohibited. Violators of this policy may be removed from the library building and may have their library privileges revoked.

Legal Use

The public may use computers only for legal purposes. Examples of unacceptable purposes include, but are not limited to, the following: harassment of others; libeling or slandering others; destruction of or damage to equipment, software, or data belonging to the Library or others; disruption or unauthorized monitoring of electronic communications or unauthorized copying of copyright-protected material.

Ethical Use

Computers should be used in accordance with ethical standards of the Library. Examples of unacceptable use (some of which may also have legal consequences) include, but are not limited to, the following: violation of computer system security; unauthorized use of computer accounts, access codes, or network identification numbers assigned to others; use of computer communications facilities in ways that unnecessarily impede the computing activities of others (randomly initiating interactive electronic communications or email exchanges, overuse of interactive network utilities, and so forth); violation of software license agreements; violation of network usage policies and regulations or violation of another user’s privacy.

Centerville – Center Township Public Library endorses the practice of responsible use of computing equipment. It includes refraining from the following: overuse of connect time, processing capacity, interactive network utilities; use of sounds and visuals, which might be disruptive to others, or use of any computing resource in an irresponsible manner. Headphones are available for borrowing at the front desk. We ask that you please use headphones if you will be doing any task that requires sound.

Sanctions

Violations of the policies described above for legal and ethical use of computing resources will be dealt with in a serious and appropriate manner. Illegal acts involving Library computing resources may also be subject to prosecution by local, state or federal authorities.

Disclaimer

Since the Internet is a global network, there is no single regulatory control over its users or content. The Internet and its sources may contain controversial material. Parents of minor children must assume responsibility for their children’s use of the Internet through the Library’s connection. Library staff cannot control the availability of information links that often change quickly and unpredictably. Not all sources on the Internet provide accurate, complete, or current information. Centerville – Center Township Public Library assumes no responsibility for any damages, direct or indirect, arising from use of the Internet, the public access computers or the Library’s wireless access points.

Limitation of Liability

By using a Library computer or connecting to the Library’s wireless internet, the user acknowledges that they have read and understand the Centerville – Center Township Public Library Technology Use Policy. The user acknowledges and agrees that Centerville – Center Township Public Library assumes no liability for any loss or damage to the user’s data or equipment. The user further acknowledges and agrees that Centerville – Center Township Public Library assumes no liability for any damage or injury arising from invasion of privacy occurring through any computers/electronic devices, accounts, programs, or files.