Internet & Computer Use Guidelines

*YOU ARE RESPONSBILE FOR READING THESE GUIDELINES
You should be aware that private information shared on our Public Computer may not be secure.

By using the Internet workstations at the Reedsburg Public Library you agree to the following guidelines:

  1. The user must be a registered cardholder in good standing.
  2. Out of System users or users without a library card must present ID and are eligible to use the computers on a temporary basis.
  3. Only the registered individual may use the computers; loaning or borrowing cards to access computers is not permitted.
  4. Individuals may use library computers for a maximum of 3 hours per day.
  5. Only one user per station                                      
  6. Users must be at least 10 years old to use computers independently.  A responsible adult must directly supervise children under the age of 10.
  7. The computers have a central printer. Pages must be picked up at the desk at 10 cents per page.
  8. Programs, plug-ins and other downloads may not be installed by users.
  9. No food or beverages of any kind are allowed at computer workstations.
  10. Please be advised that the System Administrator reserves the right to monitor the sites you have visited during this session.
  11. Use of the Internet is a privilege, not a right.  Inappropriate use will result in a cancellation of this privilege.
  12. Illegal use of computers may be subject to prosecution by local, state, or federal authorities.
  13. Private information shared on public computers may not be secure.
  14. Computer user is responsible for evaluating information and sources accessed on the computers.

Inappropriate use includes but is not limited to the following:

  • Unauthorized tampering with computer hardware or software.
  • Storage of data to anything other than a personal memory device.
  • Displaying, printing or sending any material that is obscene, libelous, threatening or harassing.
  • Downloading or installing spyware, viruses, Trojans, malware, or any other harmful program.
  • Violation of software license agreements and copyright laws. 

Yes, I understand and accept these policies and guidelines
(click to accept)

Update: February 16, 2010