All Internet resources accessible through the Library are provided equally
to all users, with the understanding that it is the individual user's
responsibility to demonstrate judgment, respect for others, and
appropriate conduct while using Dillon Public Library (DPL) resources and facilities.|
However, the Internet is an unregulated medium. It also provides access to information that is inaccurate, illegal or that some my find offensive or disturbing. The Library cannot control a user's access to other Internet resources.
USERS: As with all DPL resources, the Library affirms the right and responsibility of parents/guardians, NOT library staff, to determine and monitor their minor children's use of the Internet. (Minors are defined in this policy as children and young people under the age of 17 years.) Parents are responsible for their minor children's use of the Library's resources and facilities. Children under the age of 10 must have an adult with them when using the Internet.
DISCLAIMERS: Dillon Public Library specifically disclaims any warrant as to the information's accuracy, timeliness, authoritativeness, usefulness or fitness for a particular purpose.
The Library will have no liability for direct, indirect, or consequential damages related the use of information accessed through the Library's Internet service.
CHILD INTERNET PROTECTION ACT (CIPA): The Dillon Public Library is currently investigating the type of filters needed to be installed by 6/30/04 to comply with CIPA.
UNACCEPTABLE USES: Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; viewing, transmitting or downloading pornographic materials or materials that violate the Dillon City Ordinance prohibiting indecency and offense to the senses; downloading or transmitting confidential, trade secret information, or copyrighted materials.
1. Uses that cause harm to others or damage to their property. Engaging in defamation or
harming other's reputation by lies; uploading a work, virus, "Trojan horse", "time bomb", or other
harmful forms of programming or vandalism; participating in "hacking" activities or any form of
unauthorized access to other computers, networks, or information systems.
2. Uses that jeopardize the security of access of the computer network or other networks on
the Internet. Impersonating another user; using one's own software programs on the library's
computers; altering the Library's computer settings; damaging or modifying computer equipment
3. Uses that compromise the safety and security of minors when using E-mail, chat rooms and
other forms of direct electronic communications: Minors giving others private information about
one's self or others, including credit card numbers and social security numbers; arranging a
face-to-face meeting with someone one has "met" on the computer network or Internet without
a parent's permission.
RESPONSE TO VIOLATIONS: The user's access to the Library's computer network and Internet is a
privilege, not a right. Failure to comply with this policy and its procedures will result in the forfeiture of the user's right to access these computers.