Computer and Internet Use Policy

Pompton Lakes Public Library Response to Violations

The user’s access to the Pompton Lakes Library’s computer network and Internet is a privilege, not a right.

A user violates this policy by his or her own action or by failing to report any violations by other users that come to the attention of the user. Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user’s right to access these computers.

Unacceptable Uses of Computers Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:

1. Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use any substance the possession or use of which is prohibited by law; viewing, transmitting or downloading pornographic materials or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.

2. Uses that cause harm to others or damage to their property. Engaging in defamation (harming another’s reputation by lies); uploading a worm, virus, “Trojan horse,” “time bomb” or other harmful form of programming or vandalism; participating in “hacking” activities or any form of unauthorized access to other computers, networks, or information systems.

3. Uses that jeopardize the security of access of the computer network or other networks on the Internet. Disclosing or sharing the user’s password with others; impersonating another user; using one’s own software programs on the library’s computers; altering the Library’s computer settings; damaging or modifying computer equipment or software.

4. Uses that compromise the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communications: Minors under age 17: Giving others private information about one’s self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has “met” on the computer network or Internet without a parent’s permission.

5. Uses that Violate Confidentiality of Information: The New Jersey Confidentiality of Library Records Law (NJSA 18A:73-43.2) prohibits unauthorized disclosure, use, or dissemination of personal information regarding Library users, including minors. Personally identifiable information about users may not be disclosed or used in any way, except to law enforcement authorities as provided in the law. Users should be aware, however, that due to the technical difficulties involved in providing absolute security, transactions and files may become public.

Technology Protection Measures The Library has installed filtering software on all library computers with Internet access, and will enforce the operation of same during any use of those computers, to prevent minors from accessing visual depictions that are (1) obscene, (2) child pornography, or (3) harmful to minors.

Filtering software is not foolproof.

It diminishes the likelihood that searchers will inadvertently retrieve text or images that they may find offensive, but does not eliminate that possibility. Filters often block access to sites that users would consider both inoffensive and useful. If you do not find what you need, please do not hesitate to ask a librarian for help.