Computer Use and Safety Policy
The Walker Memorial Library’s Board of Regents, Trustees and library staff recognize the multiple roles technology plays in contemporary life. It is with this understanding that the Walker Memorial Library, through funding provided by the City of Westbrook, includes access to reliable and up-to-date computers as one of its core services to the public.
The computers in the Adult Services area are intended for library members and guests ages 14 and up. The computers in the Children’s Room are for use by children 12 and under and one caregiver. Tween Services Area computers are intended for users ages 12 to 14 or their accompanying parents or caregivers. While all library computers are filtered, parents or caregivers should monitor their child’s/children’s Internet use. The City, the Library and their officers and staff members assume no responsibility whatsoever for computer access or related connections.
One public access computer is available in the Local History Room. Use of this computer is intended for those conducting genealogical research and is only available at times when the room is open to the public.
Privacy and Safety
The Internet is currently an unregulated medium. As such, while it offers access to a wealth of material that is personally, professionally, and culturally enriching to individuals of all ages, it also enables access to some material that may be offensive, disturbing, and/or illegal, inaccurate, or incomplete. Users are encouraged to be good information consumers by evaluating the validity of information accessed via the Internet.
Further, when using the internet in the Children’s Room, please limit your viewing to child-friendly, nonthreatening
While the Walker Memorial Library strives to protect user privacy, public access computers are often
located in high-traffic areas of the library. Complete privacy cannot be guaranteed. Furthermore, to
maintain personal safety, users should be cautious when submitting any type of personal or private
information over the Internet. No information sent or received over any computer in the Walker
Memorial Library should be considered secure or private.
- All areas require a library card to sign in for use of the public access computers. Users will login
with their cards. Users not residing in Westbrook or otherwise ineligible for a card may request a
guest card at one of the service desks.
- Users must sign out after completing a computer session.
- Sessions are limited to 45 minutes when all computers in an area are in use. Additional time will
be granted if there are no reservations for other users. Maximum of two sessions per day for up to
four hours is granted per library or guest card.
- The library reserves the right to shorten or extend sessions as deemed necessary.
- Computers are programmed to shut down 10 minutes prior to library closing time.
- Printing is available for $0.15 per page. All print jobs are sent to a printer in the reference area.
Print jobs are paid for and released at the print release station via a coin-operated vending device. Users will be asked to pay for all pages that are printed. (The use of “Print Preview” is
- Neither personal information nor created work may be saved to library computers.
Library computers are filtered, so access to some websites may be restricted. Due to the filtering software some beneficial sites may be restricted. Designated library staff will be able to enable access to some filtered sites so long as site content does not violate rules established in this policy. Practical, steps shall be taken to promote the safety and security of users of the Walker Memorial Library online computer network when using electronic mail, chat rooms, instant messaging, and other forms of direct electronic communications.i
While Using Library Computers
- Users will not damage or alter computer hardware or software and shall be financially responsible
for intentional damage to the library’s property and/or equipment.
- Computer and Internet settings may not be changed.
- Work may only be saved to appropriate storage devices; work can not be saved to computer hard
- Downloading or installation of any type of software or program on the library computers is
- Users must abide by all U.S. copyright laws.
- Users may not use the library’s computers for illegal or criminal purposes.
- Users may not solicit minors.
- Users may not engage in hacking or spamming.
- Users may not harass other library patrons, computer users or staff.
- Users may not make libelous statements against or slander other users.
- Users may not attempt to violate computer system security or software license agreements.
- Users must accept that the library will not be responsible for the loss of work for any reason.
- Users must agree not to view sexually graphic or explicit materials at public workstations because they are located in public areas of the library visited by patrons of all ages.
- Users may not eat, drink or use tobacco products at computer workstations.
In order to use the Walker Memorial Library wireless network, users must follow the guidelines
established in this policy. Wireless access is provided as a service to users for personal notebooks,
laptops and other mobile devices.
- Access points are unsecured.
- Library staff cannot troubleshoot or handle user’s personal equipment. The library cannot guarantee the devices will be compatible with our network.
- The library is not responsible for the consequences of wireless network use in any way.
Skype is an internet-based telephone and live video service. Skype is used to talk with friends or family members around the world with both video and audio. Skype can also be used to hold teleconference meetings with business associates.
To use Skype @ Walker Memorial Library:
- You must have a library card in good standing or ID with your current address
- Individuals must set up their own user id. Staff is available to help with this. If you do not have a Skype user id please arrange to meet with a librarian 15 minutes before your scheduled call.
- Individuals may sign up for one 30-minute session at a time. If no one is waiting and the room is
available the session can be extended.
- Sessions may be scheduled during library business hours only and when a study room is
available. Rooms are available first come, first serve
- Walker Library cannot guarantee that the hardware and software needed to run Skype will
function smoothly but will make every effort to keep the system up and running.
- Skype is free to use, unless you wish to call directly to a telephone. In that case, you will have to
have a valid credit card to complete the phone call.
Walker Library’s mobile lab is used for training and special programming purposes. We have available 6 laptops. Members must seek out a staff person in order to be granted the use of the laptops or to set up a training session. Attendance at one of our scheduled training held throughout the year and on various, timely topics is encouraged.
Loss of Computer Use Privileges
Any violation of the rules established herein may result in the loss of computer use privileges.
Assistance by Library Staff
Library staff is always pleased to assist with those search engines, websites, and software for which they have been trained. The library staff shall not participate in any computer work that violates these policies and rules.
The library does not monitor and has no control over the information available through the Internet and specifically disclaims any warranty as to the information’s accuracy, authoritativeness, timeliness, usefulness or fitness for a particular purpose.
The library assumes no liability for any direct, indirect or consequential damages arising from the use of its technology equipment, electronic resources, or connections to other internet resources.
The above policy is approved by the Library Board of Regents and the Trustees.
September 18, 2014.
iSpecifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) display of materials deemed obscene, pornographic, or otherwise harmful to minors; (b) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (c) unauthorized disclosure, use, and dissemination of personal identification information regarding minors.