My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Library Board of Trustees Agenda and Packet 2011 09 28
PORTAL
>
BOARDS COMMISSIONS COMMITTEES RECORDS (20.000)
>
LIBRARY BOARD OF TRUSTEES
>
2006-2019 Library Board of Trustees Agendas and Packets
>
2011 Library Board of Trustees Agendas and Packets
>
Library Board of Trustees Agenda and Packet 2011 09 28
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/10/2021 3:23:34 PM
Creation date
9/29/2011 10:20:13 AM
Metadata
Fields
Template:
City Council Records
Doc Type
Boards Commissions Committees Records
Supplemental fields
Test
LBTPKT 2011 09 28
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
18
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Show annotations
View images
View plain text
Louisville Public Library <br />Computer Use Policy <br />Revised and re- adopted by the Louisville Public Library Board of Trustees <br />Foundations of the Computer Use Policy <br />The Library is committed to the principles of intellectual freedom and the freedom to access information <br />from a variety of sources. <br />The Internet is an information resource that allows public library users access to a wide variety of <br />information. Library staff cannot control the content of the constantly changing Internet. Some <br />information may be outdated, incorrect, or biased. Users may find some content is personally offensive. <br />Use of the Internet by children and teens <br />Parents and designated caregivers are responsible for their minor children's use of computers at the <br />Library. <br />All Children's and Teen computers are filtered. Filtering software is not perfect, however, and it may not <br />block everything that might be considered objectionable. <br />Unacceptable use of the Library's computers <br />Disruptive behavior in the vicinity of workstations <br />Destruction of, or damage to, equipment, software, or data belonging to the Library or other <br />users <br />Interference with or disruption of network users, services, or equipment <br />Unauthorized monitoring of electronic communications <br />Violation of computer system security or integrity <br />Using the networks to make unauthorized entry to any other machine accessible via the <br />Library's networks <br />Propagation of computer worms or viruses <br />Unauthorized use of computer accounts, access codes, or network identification numbers <br />assigned to others <br />Violation of software license agreements <br />Violation of copyright laws <br />Violation of network usage policies and regulations <br />Falsification of one's age to gain access to Internet sites <br />Distribution of unsolicited advertising <br />Violation of another user's privacy <br />Viewing sexually explicit material <br />Violation of federal, state, or local laws <br />Consequences of violating the Computer Use Policy <br />Library staff visually monitors use of computers for violations of this policy. Violators may lose their <br />library privileges. They may also be subject to criminal prosecution or other legal action. <br />
The URL can be used to link to this page
Your browser does not support the video tag.