Go To Search
Stay Connected
Information Services Section 3

INF-3 Use of Library Computers and Network Resources

Patrons’ Access to Services. Current cardholders may use their card, and only their own card, to access the Library’s computers for one hour per day, except that, if no one else is waiting to use their computer, the time of their session may be increased in 15-minute increments, up to one additional hour. Those patrons whose accounts show that they have lost items outstanding or accrued fines of $5.00 or greater will be denied access to these stations. Visitors may use stations for one hour per day upon presentation of photo identification at the Reference or Youth Services Desk. Visitor use is limited to 30 days from the first usage before requiring the user to obtain a library card. Cardholders may not obtain a visitor’s pass in order to use computers for additional time.

Intent of Policies. The intent of these policies is to assist patrons in the identification of acceptable and unacceptable uses of Billings Public Library’s computer resources, although patrons should not consider the policies contained herein as exhaustive.

Compliance with Policies Required. Patrons are required to comply with both the letter and spirit of these policies. Violations will be reviewed on a case-by-case basis. Violations may result in restriction or revocation of a Patron’s computer and/or other Library-use privileges.

Compliance with Applicable Laws Required. Use of computers, network resources and Internet access in violation of international, federal, state or local laws or regulations and licensing agreements, including but not limited to the illegal copying of software, is prohibited. Patrons are encouraged to immediately report suspected or actual violations to the Library Director.

Compliance with Other Policies. Patrons must abide by the acceptable use policies of other networks.

Inappropriate Use. Use of Library computers and networks in a manner that precludes or significantly hampers its use by others is not allowed.

Equipment Failure. Data circuits and equipment are subject to failure which can cause services to become unavailable. Therefore, no guarantees for constant service are expressed or implied.

Patron Data. Ultimate responsibility for resolution of problems related to the invasion of the patron’s privacy or loss of data rests with the patron. The Library assumes no liability for loss or damage to the patron’s data or for any damage or injury arising from invasion of the patron’s privacy.

Downloading Software. Patrons shall not download or copy files to workstation hard drives. Downloading to storage media such as USB drives is permitted.

Use of Library Workstations and Networks. Patrons must use workstations as they are provided and may not use personal software or modify the operating system or network configuration..

Patrons Not to Introduce or Attempt to Eradicate Computer Viruses. Patrons may not introduce malicious programs such as viruses, worms and trojan horses to Internet stations. If a patron suspects the presence of a virus, he/she should immediately contact the Library staff for assistance.

Library Computer Security. Patrons shall not attempt to circumvent Library computer security. This includes, but is not limited to, accessing data not intended for the user, logging into a computer account the user is not expressly authorized to access or attempting to gain access to the Library’s servers.

Responsibilities of Users: The user is responsible for correct use of the tools available for maintaining the security of information on each computer system. The following precautions are recommended:

  • Usernames, passwords and other types of authorization that are assigned to individual patrons should not be shared with others.
  • Files saved on Library computing resources may not be totally secure.
    The patron should be aware of computer viruses and other destructive computer programs, and take steps to avoid being a victim or unwitting distributor of these processes.

Misuse: Any misuse which compromises system security is prohibited.

Resources. Patrons are prohibited from excessive consumption of resources, including, but not limited to, CPU time and network bandwidth.

NOTICE OF MONITORING OF INFORMATION AND DATA.The Billings Public Library reserves the right to examine and delete any data stored on its hard drives.

INF-3.1 Limitations on internet access
Assistance by Library Staff. Library staff may be available to offer assistance with searching, but cannot monitor or control the materials which may be accessible from the Internet. Those who search are responsible for their own searches, the information found in them and the use of that information

The Library may provide free wireless internet access for users with portable computers or devices capable of receiving wireless signals during the Library’s normal hours of operation.

Library staff will provide general information on the settings necessary to access the Internet via these connections, but are not responsible for any changes made to the user’s computer settings.

If a user has problems accessing the Internet over these connections, staff will verify the library’s connections are up and running, but cannot assist in making changes to the user’s network settings or troubleshoot on a computer not owned by the Library. Users should refer to owner’s manuals or other support services offered by the device manufacturer..

The Library’s wireless connection is not secure. Any information sent or received could potentially be intercepted by another wireless user. Cautious wireless users may choose not to transmit their credit card information, passwords and any other sensitive personal information. Users are encouraged to take appropriate precautions when using this service.

The Library will not be responsible for information, e.g. credit card number, which is compromised, or for damage caused to hardware, software or data files due to electric surges, security issues or consequences caused by viruses or hacking. All wireless access users are encouraged to have up-to-date virus protection on their wireless device..

Use of the Library’s wireless internet access is governed by all provisions of the Library’s Use of Internet Services policy. Use of the service is understood to mean agreement to comply with all such provisions. All users are expected to use the Library’s wireless access in a legal and responsible manner consistent with the purposes for which it is provided.

UNACCEPTABLE USES. A patron must comply with the following guidelines when using the Library’s Internet Stations::

Threatening, Harassing or Obscene Data Prohibited. It is not acceptable to use Internet access to transmit threatening, obscene, or harassing materials, or to interfere with or disrupt network users, services or equipment. Disruptions include, but are not limited to propagation of computer worms and viruses, and using the network to make unauthorized entry to any other network resource.

Private Information/Resources. It is not acceptable for an individual to use the Internet to access information or resources unless permission to do so has been granted by the owners or holders of rights to those resources or information.

External Networks. Patrons who access networks or facilities not owned by the Library will adhere to the policies and procedures established by the administrators of these networks and facilities.

Inappropriate Use. Use of Internet access and any attached network in a manner that precludes or significantly hampers its use by others is not allowed.

LIMITATIONS ON INTERNET ACCESS. The Library provides a limited number of computers with unfiltered access. To safeguard minors in the Children’s Services and Teen areas from inadvertent or intentional exposure to illegal and/or inappropriate images, texts or other resources on Internet stations located in the area, the Library will research, evaluate, and implement such technological and/or procedural solutions as privacy screens, filtering software, and others. Upon noticing or being notified that a user in the Children’s Services or Teen areas is accessing graphic, sexually-oriented material, Library staff or security guards shall require the person using the workstation to discontinue viewing that material in those areas; the user may continue to use the station if they do not continue to view such material or they may move to a workstation outside these areas. Failure to comply will be considered a violation of the Patron Conduct policy.

CHILDREN’S INTERNET FILTERING. To minimize the risk of young children being exposed to illegal and/or inappropriate images, texts or other resources on Library Internet workstations, children age 12 and under will be restricted to filtered access, with the exception that the parent or guardian of a child in this age group may choose to opt out of this restriction, using the procedures described in the Parental Guidance policy. Guidelines for filter criteria will be established by the Library Board as a part of its review and adoption of the Library’s Collection Management Policy.