Laserfiche WebLink
The Library has a responsibility to protect the security of its network for the benefit of all its users. <br />Unacceptable use of the Library's computer resources includes, but is not limited to, the following: <br />Disruptive behavior in the vicinity of workstations <br />Destruction of, or damage to, equipment, software, or data belonging to the Library or other <br />users <br />Interference with or disruption of network users, services, or equipment <br />Unauthorized monitoring of electronic communications <br />Violation of computer system security or integrity <br />Using the network to make unauthorized entry to any other machine accessible via the <br />Library's networks <br />Propagation of computer worms or viruses <br />Unauthorized use of computer accounts, access codes, or network identification numbers <br />assigned to others <br />Violation of software license agreements <br />Violation of copyright laws <br />Violation of network usage policies and regulations <br />Falsification of one's age to gain access to Internet sites <br />Distribution of unsolicited advertising <br />Violation of another user's privacy <br />Viewing obscene material <br />Violation of federal, state, or local laws <br />Violators of the Library's Acceptable Use Policy for Computer Resources may lose their library privileges. <br />They may also be subject to criminal prosecution or other legal action. <br />Acceptable Use Policy for Computer Resources Page 2 of 2 <br />