Iowa Admin. Code r. 286-7.1 - Rights and responsibilities
(1) The state library expects the use of all
its electronic sources such as the Internet to be responsible, ethical, and
legal, and consistent with the purpose for which those resources are provided.
The state library complies with the Children's Internet Protection Act (Pub. L.
No. 106-554 and 47 USC
254(h)) . To this end:
a. The state library affirms the right of
every individual to have access to constitutionally protected material as
stated in the library's collection development policy.
b. Parents or guardians, not the library or
its staff, are responsible for the Internet use by their children.
c. Internet access is provided in a public
area shared by users of all ages, backgrounds, and sensibilities. Users should
consider this when accessing potentially controversial information and
images.
d. The state library
reserves the right to ask users to discontinue the display of information and
images which cause a disruption.
e.
Users should respect the privacy of other Internet users by not observing what
sites others are accessing.
f.
Users will not misrepresent themselves as any other user; will not attempt to
modify or gain access to files, passwords, or data belonging to others; will
not seek unauthorized access to any computer system; and will not damage or
alter software components of any network or database.
g. Illegal activities subject to prosecution
include:
(1) Destruction of or damage to
equipment, software, or data belonging to the library;
(2) Violation of computer system security or
system configuration;
(3) Violation
of the copyright laws of the United States;
(4) Downloading or provision of child
pornography or display of pornography where it may be seen by
children.
h. To the
extent practical, steps shall be taken to promote the safety and security of
users of the Internet when they are using electronic mail, chat rooms, instant
messaging and other forms of direct electronic communications.
i. Safety and security of minors.
(1) Prevention of inappropriate network
usage.
1. Technology measures shall be used
to prevent unauthorized access and other unlawful activities.
2. Technology measures shall be used to
prevent unauthorized disclosure, use, and dissemination of personal
identification information.
(2) Prevention of access to inappropriate
material.
1. Technology protection measures,
i.e., Internet filters, shall be used to block or filter access to
inappropriate material on the Internet.
2. Blocking shall be applied to visual
depictions of material deemed obscene, to child pornography, or to any material
deemed harmful to minors.
3.
Technology protection measures may be disabled by library staff for adults or,
in the case of minors, minimized for bona fide research or other lawful
purposes.
(2)
Violation of this computer use policy shall result in the loss of
computer privileges and may lead to financial responsibility. Illegal
activities will be prosecuted.
Notes
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.