A great library contains the diary of the human race.
Welcome to the Pulaski County Public Library!
Library HomeView our calendar of upcoming eventsLibrary locationsChildren's DepartmentTeen DepartmentVisit the Pulaski County Historical Society's Web siteReferenceLibrary PoliciesContact Us

Search our Catalog:   
Advanced | Help | My Account | Email the Librarian
Interlibrary Loan |  Request a Book | Online Card application




Pulaski County Public Library Internet Access Policy

Mission Statement
The Pulaski County Public Library provides basic free access to current, high-demand, high-interest materials in various formats for people of all ages.We create a welcoming environment with a friendly, competent staff and strive to introduce children and adults to the joys and rewards of reading and using the public library.Special emphasis is placed on supporting students of all learning levels and ages with their formal and informal course of study and self-improvement.

Internet Access
The Internet, a worldwide network of computer networks, is an essential medium for obtaining and transmitting information of all types.Therefore, public access to the Internet is germane to the Library’s mission.

However, the Internet is an unregulated medium. It also provides access to information that is inaccurate, illegal or that some may find offensive or disturbing. The Library, therefore, has implemented hardware and software mechanisms designed to limit or restrict access to sources of pornographic information, images, or sites that may be harmful to minors. (Minors are defined in this policy as children and young people under the age of 17.) If an adult patron feels that access has been restricted to a legitimate source of information, they may request that the filter be temporarily be turned off.It is their responsibility to inform Library Staff when they have finished their session, so that the filter may be reinstated.

Responsibilities of Library Staff and Users

Library staff will not monitor a user’s Internet usage, except for length of the session in order to ensure equal opportunity of access for everyone. No filtering hardware or software is 100% accurate; therefore, the Library affirms the right and responsibility of parents/guardians, NOT Library staff to determine and monitor their children’s use of the Internet.Parents who believe that their children cannot responsibly use the Library’s Internet access are requested to monitor their children’s Internet use.

The Library reserves the right to terminate an Internet session that disrupts library services or that involves user behavior that violates the Library’s policies.

Disclaimers

While the Library endeavors to provide access to information of the highest quality, the Library specifically disclaims any warrant as to the information’s accuracy, timeliness, authoritativeness, usefulness, or fitness for a particular purpose.

The Library will have no liability for direct, indirect, or consequential damages related to the use of information accessed through the Library’s Internet service.

Since software and information downloaded from any sources, including the Internet, may contain computer viruses, users are advised to utilize virus-checking software on their home computers. The Library is not responsible for damage to user’s disks or computers or for any loss of data, damage, or liability that may occur from use of the Library’s computers.


Unacceptable Uses of Computers

Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:

  1. Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; the viewing, transmitting or downloading pornographic materials or materials that encourage others to violated the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.

  2. Uses that cause harm to others or damage to their property. Engaging in defamation (harming another’s reputation by lies); uploading a worm, virus, “trojan horse”, “time bomb”, or other harmful forms of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems.

  3. Uses that jeopardize the security access of the computer network or other networks on the Internet. Disclosing or sharing the user’s password with others; impersonating another user; using one’s own software programs on the Library’s computers; altering the Library’s computer settings; damaging or modifying computer equipment or software.

  4. Uses that compromise the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communications: Minors under age 17. Giving others private information about one’s self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has “met” on the computer network or Internet without a parent’s permission.

  5. Uses that Violate Confidentiality of Information; as affirmed in several Kentucky Attorney General opinions, Kentucky laws recognizes the confidentiality of library records.Personally identifiable information about users, including minors, will not be disclosed or used in any way, except to law enforcement authorities as provided in the law. Users should be aware, however, that due to technical difficulties involved in providing absolute security, transactions and files could become public.

Procedures

The Library staff will develop such rules and procedures as are necessary to ensure the fair and reasonable use of Internet access.

Response to Violations

The user’s access to the Library’s computer network and Internet is a privilege, not a right. A user violates this policy by his or her own action, or by failing to report any violations by other users that come to the attention of the user.Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user’s right to access these computers.