Acceptable Use Policy

Acceptable Use of the Internet and Library Public Use Computers

 

Purpose

 

To fulfill its mission of providing easy access to books and information for all ages, the Kyle Public Library provides public access to the internet and to its public use computers. This policy and associated procedures and guidelines set forth the acceptable use of library technology resources and systems.

 

General Policy

 

The Kyle Public Library provides access to internet resources equally to all library patrons and upholds and affirms the right of each individual to have access to constitutionally protected material in accordance with the American Library Association's Library Bill of Rights.

 

Library computers and network systems may not be used for any purpose that violates federal, state, or local laws and Library policies.

 

Under Federal and Texas law, it is a crime to distribute or exhibit material that is "harmful" to minors, or to be reckless about "whether a minor is present who will be offended or alarmed by the display" of harmful material. Customers are prohibited from using the library's internet and computer network systems for illegal activity, to access illegal or obscene materials or to display material that violates the provisions of Sections 43.24 and 43.25 of the Texas Penal Code: Sale, Distribution or Display of Harmful Material to Minors. The library's policies and computer network systems comply with the Children's Internet Protection Act (CIPA) .

 

Prohibited use includes, but is not limited to:

 

    • "hacking" or otherwise attempting unauthorized use of the library, city or other networks;
    • attempting to interfere with or disrupt other users;
    • attempting to evade security measures;
    • invading the privacy of other users;
    • attracting the attention of others to sexually explicit images depicted on the screen or in copies made on library printers;
    • violation of copyright laws;
    • registering multiple logon IDs, sharing a logon ID, or using another user's logon ID;
    • violating software license agreements;
    • sending harassing, threatening or libelous messages or material; or
    • accessing peer to peer (P2P), torrent, or other file sharing sites are not allowed.

 

Not all information found on the internet is accurate, complete, up-to-date or otherwise acceptable to all individuals. The library is not responsible for the content of the internet, changes in content of the sources to which the library home pages link or for the content of sources accessed through secondary links.

 

Patrons using the library's technology resources and systems, including its Wi-Fi, or Library public use computers must agree to comply with:

 

    • Library Use Rules
    • Acceptable Use Policy for Public Use Computers
    • Acceptable Use Policy for Wireless Access

 

Library Administration reserves the right to set limits or internet use session(s) a customer may have per day with library-owned computer and network systems.

 

Library Administration reserves the right to establish policies governing internet use and consequences for misuse consistent with applicable rules and laws.

 

Failure to comply with library rules and policies may result in the loss of computer access privileges, library privileges, and report to law enforcement authorities.

 

Procedures

 

Security and Privacy

 

  • The library will not release information on the use of specific Internet resources by members of the public except as required by law or as necessary for the proper operation of the library.

 

  • The library is not responsible for the privacy practices or security of any web sites accessed by customers. The Kyle Public Library and the City of Kyle accept no liability for any loss of privacy or data customers may experience, or any damage or harm arising from such loss. Customers are responsible for having the proper hardware, software, and network settings on their personal devices to connect to the library's Wi-Fi.

 

  • The library is not responsible for any theft, damage or misuse of personal computer, mobile, or peripheral devices in the library.

 

  • Patrons are prohibited from making any attempt to gain unauthorized access to restricted files or networks, or to damage or modify library-owned computer equipment or software.

 

  • Patrons create, store and use personal files at their own risk.