ࡱ> <>;y "bjbj l9{{66666d$48egggggg$666---66e-e---rq*-Q0-4-6-$-- : GRAY PUBLIC LIBRARY COMPUTER USE POLICY General/Statement The purpose of The Gray Public Library Internet Policy is to ensure appropriate use of the library's WWW Internet connection, which provides access to information beyond the physical confines of the library. All computer/wireless users must read and comply with this "Computer Use Policy." Use of library computers and computer hardware and/or software, including the wireless network, constitutes acknowledgment that you have read and will comply with this policy. Failure to comply with this policy may result in loss of privileges of computer use, wireless service, other library services, and/or criminal prosecution. The library provides computer resources, including Internet and wireless access, to implement its goal of providing information to people of all ages in the community to further the pursuit of educational, personal and recreational interests. In keeping with principles found in the First Amendment to the U.S. Constitution, the library Bill of Rights, Access to Electronic Information Services and Networks, and the Freedom to Read Statement, the Library provides equal access to all. Currently, the Library offers eight public access computers. Time is limited to one hour per session with up to three sessions per day; such usage shall be on a first come, first served basis. Patrons must pre-pay to print and are responsible for all copies printed, regardless of mistakes made by patrons. Printing cost 35 cents per page and shall be paid for prior to printing. Responsibility for the use of any library computer rests with the person using it. As the Library does not operate in loco parentis, responsibility for the use of a library computer by anyone under the age of 18 rests with the parent/guardian. The Internet is an unregulated medium that does not necessarily contain accurate, complete or current information. The Internet may contain pornographic, disturbing or illegal information or copyrighted material. The Library does not filter or censor material on the internet. Users are encouraged to be good information consumers by evaluating the validity of information accessed via the internet. The Library staff is available to provide assistance to identify appropriate sites. Also the library's website offers access to Marvel, fb88's virtual library databases. Library staff may assist customers in using the internet and locating the information they need. Because of other customer service responsibilities, however, staff cannot provide extended training or technical support for internet users. Patrons using Library computers or computer systems must use them in a responsible manner, respecting the rights of others and taking care of the equipment. Computer users are liable for any damage done to the equipment or software. The Library is committed to providing an environment free from any harassment. Patrons are expected to avoid displaying on the screen material that may be objectionable to other patrons and staff members. Please be considerate of other users and library staff and patrons. Patrons use the library's computer resources at their own risk. Loss of a patron's time, work or property shall not be the responsibility of the Library for any reason. The Library staff does not provide in-depth support for computer users and may not have time to assist patrons in setting up e-mail accounts. Use of Computers in the Library Patrons are not allowed to use any of the Library's computers or computer resources for fraudulent, unlawful or malicious purposes, including but not limited to: Sending, receiving, printing or displaying any text or graphics that are legally defined by State of fb88 law as "obscene" or "child pornography." {This information is cited in fb88 Revised Statutes Annotated, Title 17, Section 2911 (dissemination of obscene matter to minors) and Title 17-A section 281 et seq.;). Intentionally expose others (especially children) to material they may find disturbing, Transmission of unlawful material Unauthorized access, disclosure, use or dissemination of personal identification information Attempting to violate computer system security or software license agreements Spamming Unauthorized entry to any computer Knowingly transmitting viruses, worms, or any other malicious programs or codes. Harassment of an individual, business entity or group of individuals Denial of service attacks Violation of copyright laws Changing computer settings or access. connect to services which will result in the library's receiving a bill. Time Limits and Non-Permitted uses Computer workstations are available to authorized users during library hours until 10 minutes before closing. Patrons may use a computer for up to 60 minutes at a time for a maximum of 180 minutes per patron per day; usage to be determined on a first come, first served basis. This time limit may be extended at the discretion of library staff if computer availability permits. Use of the Library's Internet computers requires a valid patron barcode from a Library Card, or Computer Guest Pass. . Due to space and noise concerns, no more than two persons at a time may sit at any computer workstation. Wireless Policy The Library provides unfiltered wireless Internet connectivity offered as a service for users with Wireless enabled laptops and who have a current, valid public library card from a public library in fb88 or a State of fb88 accredited post-secondary school, such as the University of fb88. This service may not be used as a permanent connection. Wireless patrons may be asked to present a library card, either from the Public Library or another Library in the state of fb88. Staff cannot assist customers in setting up, configuring, or troubleshooting their wireless computers or other devices. By choosing to use this free wireless service, you agree to abide by the library's Internet Use Policy that prohibits abusive or illegal activity while using the Library's Internet service. It is the responsibility of the user to understand the Internet Policy and his/her obligation to refrain from viewing inappropriate websites, spamming, any illegal activities or any other activity expressly prohibited by this Policy. Use of the wireless network is at your own risk, and neither the Library, nor the Town of Gray, nor any of their officers, agents or employees is responsible for any damage that may occur to your computer or other materials or work while connected. Limitations Wi-Fi is less secure than a wired network. Signal strength may vary in the building. Approved by the Gray Public Library Board of Trustees: 2/28/2012  Revised and Approved date *01<o p qr̛̰nYQ<'(hJB* CJaJfHphq (hJB*CJaJfHphq hJCJaJ(hJB*CJaJfHphq .hJ6B*CJ]aJfHph>9=q (hJB*CJaJfHph$q (hJB*CJaJfHph>9=q 7h56>*B*CJ\]aJfHph>9=q 7hJ56>*B*CJ\]aJfHph>9=q .hJ5B*CJ\aJfHph>9=q *< Fu[VgdJ+d3-DM ]+^gdJ+d -DM ]+^gdJ+d-DM ]+^gdJ+ dA-DM ]+^ gdJd<-DM gdJW d-DM ^W gdJW d-DM ^W gdJGG iO5d-DM ]^5gdJ9d -DM ]^9gdJGd-DM ^GgdJVd-DM ]^VgdJ`d-DM ]^`gdJ Ld -DM ] ^LgdJCLd-DM ]C^LgdJr~7:;_aָrjQ48hJB*CJOJQJRHz^JaJfHph=8<q 1hJ6>**䴳aڱ=8<q hJCJaJ(hJB*CJaJfHphq +hJ>*B*CJaJfHphq 5hJ5>*B*OJQJ\^JfHphq ;hJ56>*B*CJRH\\]aJfHphq (hJB*CJaJfHph@@Dq (hJB*CJaJfHphq  jA}cId -DM ]^gdJd-DM ]^gdJd-DM ]^gdJ&d-DM ]^&gdJ+d.-DM ]^+gdJ0d-DM ]^0gdJ0d<-DM ]^0gdJ:;_[hNd-DM ]^gdJ*d$-DM ]*^gdJd8-DM ]^gdJ*d-DM ]*gdJgdJd -DM ]gdJd-DM ]^gdJ dP-DM ]^ gdJaWX[\^!!"bOG2(hJB*CJaJfHphq hJCJaJ$hJB*RHWfHph=8<q 8hJB*CJOJQJRHY^JaJfHphq 8hJB*CJOJQJRHY^JaJfHph=8<q (hJB*CJaJfHph!"q 8hJB*CJOJQJRH^JaJfHph=8<q 8hJB*CJOJQJRHz^JaJfHph=8<q (hJB*CJaJfHph=8<q [7 }cIvd-DM ]v^gdJ.d.-DM ].^gdJ d-DM ]^ gdJ%d)-DM ]%^gdJd -DM ]^gdJ*dH-DM ]*^gdJd.-DM ]^gdJ !!!D"E"F"G""""""vtd$-DM ^gdJdgdJd-DM ]gdJdgdJd$-DM ]^gdJgdJ*d-L-DM ]*^gdJnd3-DM ]n^gdJ """ "D"E"G""""""""֭ΥΡhdlhJCJaJ8hJB*CJOJQJRHN^JaJfHphq hJhJCJaJ(hJB*CJaJfHphq (hJB*CJaJfHph..7q ;0P:pJ/ =!"N#a$h% Dp50P/ =!"(#$h% Dp50P/ =!"a#x$h% Dp50P/ =!"#$h% Dp8 00P/ =!"#$h% DpN 00P/ =!"#$h% P0 D Dp^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH H`H Normal CJOJQJ_HaJmH sH tH DA D Default Paragraph FontRiR 0 Table Normal4 l4a (k ( 0No List VoV JStyle1$7$8$H$$CJOJQJ^J_HaJmH sH tH PK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] ;EG8=8t8889ra"" [ "8@0(  B S  ?*;*;01 dlJ@1111@UnknownG* Times New Roman5Symbol3. * Arial?= * Courier NewA$BCambria Math"hG 0 0ar0KHX ?J2!xx $Mary-Margaret ("Mamie") Anthoine Ney$Mary-Margaret ("Mamie") Anthoine NeyOh+'0  <H h t (Mary-Margaret ("Mamie") Anthoine Ney Normal.dotm(Mary-Margaret ("Mamie") Anthoine Ney2Microsoft Office Word@Ik@t8<@6 *՜.+,0 hp  State of fb880   Title  !"#$%&'()*,-./012456789:=Root Entry Frq*?1TableWordDocumentl9SummaryInformation(+DocumentSummaryInformation83CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q