Computer and Internet Access Guidelines

  1. To use a computer for Internet access all patrons must present a valid library card to the librarian on duty at the Reference Desk in Adult Services or at the Children’s Librarian’s desk in the Children’s Room and sign-in. First time users will receive a packet of Internet Access Information. All users and parents/guardians of users under 18 years of age must also sign the Internet Policy Agreement in the presence of library personnel before using the computers.

  2. Computer use for Internet access is on a first come, first served basis, in one-half hour slots with a maximum of one hour per day unless no one is scheduled. Reservations for computer time must be made in person at the Reference and Children’s Room desks, for a 24 hour period only, with no telephone reservations being accepted. Arriving 10 or more minutes late will cause you to forfeit your entire reserved time. A parent, or responsible adult, is required to assist children 7 years and younger when using the computer or the Internet. Otherwise, only one person at a time is permitted at a computer.

  3. Patrons may use their own data disks, and not their own software application disks, on the library computer reserved for word processing only. Under no circumstances may patrons use their own personal software on the library Internet computers. Installing software, or altering or attaching equipment to any of the library’s Internet computer hardware is prohibited and doing so will result in the loss of library computer use privileges.

  4. Software downloaded from the Internet may contain computer viruses. Every user is responsible for maintaining virus-checking software on his/her home computer. The Clyde Public Library is not responsible for damage to any user’s disk or computer, or any loss of data, damage, or liability that may occur from patron use of the library’s computers. Users are not to use their own disks for downloading information. Copies are $.15 per page, inquire at the Reference desk and the Children’s Room desk.

  5. If patrons experience any problems with the computer or programs, the library staff should be notified immediately.

  6. Patrons may send and receive e-mail (electronic mail) and initiate purchases using the library’s Internet access computers.

  7. Library staff will help in logging on and off of the Internet only. It is the patron’s responsibility to educate him/herself about computer functions, the Internet, and specific program usage.

  8. The library’s computers are to be used for educational, informational, and recreational purposes only; not for unauthorized, illegal or unethical purposes. Library personnel have the authority to request a patron to exit from an Internet site if it is deemed in violation of this policy. Violators will lose computer use privileges and possibly library privileges as well.

  9. Patrons are prohibited from using the library’s Internet access computers to access "chat rooms" for inappropriate purposes.



    You may not send, receive or display text or graphics that may be construed as obscene or are sexually explicit or sexually suggestive. Other examples which violate this standard for ethical and legal use of the library’s computers include but are not limited to the following:

  • Violation of computer system security
  • Violations of guidelines of the networks traversed
  • Use of computer communications facilities in a way that unnecessarily impedes the computing activities of others
  • Violation of software license agreements
  • Violations of network policies and regulations
  • Violation of another user’s privacy
  • Engaging in illegal communication activities
  • Misrepresenting yourself as another user
  • Using your own diskette in the library computer
  • Unauthorized copying of copyright-protected material
  • Harassment, libeling, or slandering other users

Users who damage or destroy the library’s equipment, software, or data will be held liable by the library for the costs incurred in replacing the equipment, software and data and restoring the system to its former configuration.