Library cardholders receive two hours of computer access per day on Library computers; visitors receive one hour. Additional time may be purchased.
Electronic resources may only be used for legal purposes; per federal order (F.C.C. 03-188), filtering software is applied to all computers. Examples of illegal use include, but are not limited to, the following:
- Attempting to alter or damage computer equipment, software configurations, or file belonging to the Library, other users, or external networks
- Attempting unauthorized entry to the Library's network or external networks
- Intentional propagation of computer viruses
- Violation of Federal copyright or telecommunications laws (A.R.S. 13-3707)
- Violation of software license agreements
- Transmission of speech not protected by the first amendment
- Display of materials considered obscene as defined by the Children's Internet Protection Act Pub. L. 106-554, and as defined by A.R.S. section 13-3501 through 13-3512; especially statutes 13-3501, 13-306, and 13-3507
- Gambling on the Internet; Internet gambling is not amusement, social or regulated gambling as defined by A.R.S. 13-3304, and F.C.C. 6-01-001-0012
- Violation of any Federal, Arizona State, or City of Flagstaff laws.
Electronic resources must also be used in accordance with the ethical standards of the Library.
Examples of unethical use (which may also have legal consequences) include, but are not limited to, the following:
- Violation of computer system security
- Unauthorized use of computer accounts, access codes, or network identification numbers assigned to others
- Using computer communications facilities in ways that tie-up, interfere with, or impede others computer usage
- Violation of external networks' regulations and policies
- Violation of another user's privacy
Guidelines for use
When using electronic resources at the Library:
- Computer users must use their own library card. Visitors must acquire a guest pass.
- Workstations are available on a first-come, first-served basis. For every machine, patrons must observe all sign-up requirements and posted time limitations. In any case, patrons must relinquish usage of a workstation when asked by a Library staff member. Failure to do so will result in loss of computer-use privileges, potential loss of Library privilege, and potential legal consequences.
- Space is limited at the terminals; therefore, not more than 2 people may use any particular terminal at one time.
- City directives do not allow patrons to use their own software programs on Library computers.
- Use of peripherals, such as digital cameras and storage devices, is not supported by staff or computer equipment.
- There is a charge for printing.
The Library relies upon the cooperation of its patrons to efficiently and effectively provide shared resources and ensure access to a wide range of information. If individuals break these acceptable use rules in any way, their right to use networked resources may be suspended for a specified period of time, depending upon the damage caused by their actions. Notification will be given concerning the length of and the reason for the suspension. Individuals using Library computing resources for illegal purposes may also be subject to local, state or federal prosecution.
The Internet is an unregulated global entity and is the largest electronic information network in the world. Due to its constantly changing nature, the Library has no control over the information available on the network, its quality, accuracy or currency, except on pages designed and maintained by the Library. While the library is deeply concerned that children have a safe educational Internet experience, individual users must determine the appropriateness of materials for their needs. Parents and/or legal guardians are responsible for their child's exposure to ideas and information.
During open hours, library staff cannot provide in-depth, one-on-one training on Internet operations or personal computer skills. Staff may be able to offer searching suggestions and answer brief questions. Additionally, the library does offer tutoring to the public by appointment.
U.S. Copyright Law (Title 17, U.S. Code) prohibits the unauthorized reproduction or distribution of copyrighted materials, except as permitted by the principles of "fair use". Users may not copy or distribute electronic materials (including electronic mail, text, images, programs or data) without the explicit permission of the copyright holder. Any responsibility for consequences of copyright infringement lies with the user; the Library expressly disclaims any liability or responsibility resulting from such use.
The Children's Internet Protection Act (Pub.L. 106-554), and Arizona Revised Statute (ARS 13-3501-3512), prohibits persons from knowingly placing obscene material upon public display, or from knowingly failing to remove such a display from property in his possession or under his control after learning of its existence.
The Library assumes no liability for any loss or damage to users' data, disks, or peripherals, nor for any personal damage or injury (physical, emotional or mental) incurred as a result of using the Library electronic resources, including damage or injury sustained from invasions of user privacy.
In keeping with the Library's general policies, the systems administrators will protect our patrons' rights to privacy and confidentiality. Any communications residing on the main Library computer are confidential. However, in general, electronic communication is not secure and networks are susceptible to outside intervention. As part of normal system maintenance, network administrators do monitor system activity, but the Library does not reveal an individual's use of computer resources unless compelled to do so by court order, or relevant state or federal statutes.
System administrators at the Library reserve the right to modify system administrator and/or user policies at any time.