RULE 286-7.1 - Rights and responsibilities

RULE 286-7.1. Rights and responsibilities

(1) The state library expects the use of all its electronic sources such as the Internet to be responsible, ethical, and legal, and consistent with the purpose for which those resources are provided. The state library complies with the Children's Internet Protection Act (Pub. L. No. 106-554 and 47 USC 254(h)). To this end:

a. The state library affirms the right of every individual to have access to constitutionally protected material as stated in the library's collection development policy.

b. Parents or guardians, not the library or its staff, are responsible for the Internet use by their children.

c. Internet access is provided in a public area shared by users of all ages, backgrounds, and sensibilities. Users should consider this when accessing potentially controversial information and images.

d. The state library reserves the right to ask users to discontinue the display of information and images which cause a disruption.

e. Users should respect the privacy of other Internet users by not observing what sites others are accessing.

f. Users will not misrepresent themselves as any other user; will not attempt to modify or gain access to files, passwords, or data belonging to others; will not seek unauthorized access to any computer system; and will not damage or alter software components of any network or database.

g. Illegal activities subject to prosecution include:

(1) Destruction of or damage to equipment, software, or data belonging to the library;

(2) Violation of computer system security or system configuration;

(3) Violation of the copyright laws of the United States;

(4) Downloading or provision of child pornography or display of pornography where it may be seen by children.

h. To the extent practical, steps shall be taken to promote the safety and security of users of the Internet when they are using electronic mail, chat rooms, instant messaging and other forms of direct electronic communications.

i. Safety and security of minors.

(1) Prevention of inappropriate network usage.

1. Technology measures shall be used to prevent unauthorized access and other unlawful activities.

2. Technology measures shall be used to prevent unauthorized disclosure, use, and dissemination of personal identification information.

(2) Prevention of access to inappropriate material.

1. Technology protection measures, i.e., Internet filters, shall be used to block or filter access to inappropriate material on the Internet.

2. Blocking shall be applied to visual depictions of material deemed obscene, to child pornography, or to any material deemed harmful to minors.

3. Technology protection measures may be disabled by library staff for adults or, in the case of minors, minimized for bona fide research or other lawful purposes.

(2) Violation of this computer use policy shall result in the loss of computer privileges and may lead to financial responsibility. Illegal activities will be prosecuted.

(Amended by IAB July 20, 2016/Volume XXXIX, Number 02, effective 8/24/2016)

The following state regulations pages link to this page.