Library Policies

Polices for Hesperia Community Library including Freedom of information act policies, Internet access, computer usage, and copyright information.

Freedom of Information Act Policies

FOIA Policy Procedures and Guidelines

Written Public Summary of FOIA Procedure

FOIA Attachments A - F

Computer Use Policy

  • Cardholders may use the public computers for accessing the online catalog, Internet access, and software applications that reside on the computer.
  • Individuals will be charged for any changes in the configurations and may result in suspension of use of the computers.
  • Computers may be reserved by making arrangements with the Library staff.
  • Printing will be charged at the current copy per page.
  • Personal software may not be used.
  • The Library staff does not provide instruction and may provide assistance only as time and other duties permit.

Internet Access Policy

General Statements Regarding Internet

The Hesperia Community Library provides access to the Internet for the express purpose of obtaining information.

Library patrons use the Internet at their own risk. Information on the Internet may be reliable and current or may be inaccurate and out-of-date. The Internet also contains information that is controversial, sexually explicit or offensive. Parents or guardians of minor children are responsible for their child's use of the Internet through the Library's connection as stated more fully below.

The Library assumes no responsibility for damages, direct or indirect, arising from connections to the Internet, including connections to/from devices. Patrons will use Library computer hardware and software at their own risk. The Library is not responsible for equipment malfunction, loss of data, any damages to the user’s discs, data or electronic transactions of any type.  The Library is not responsible for the damage or loss of any portable media.

Library users of all ages, backgrounds and sensibilities are using computers and other devices, Library patrons are asked to be sensitive to other’s values and beliefs when accessing potentially controversial information and images.

Internet security is not guaranteed by the library. All transactions, files and communications are vulnerable to unauthorized access and use.

People may access the Internet with their own properly equipped mobile device via the public wireless access network. The Library does not provide any technical assistance.  Access may be limited if bandwidth is used to the extent that Library operations are adversely effected.  The Library is not responsible for any loss or damage of a patron’s material or data during the use of this equipment.

The Library considers Internet use to be private and confidential within the limits of the public environment, the technology of the equipment, and the requirements of the law.

Patrons are responsible to ensure that their personal data is not compromised. The user is solely responsible for the risk involved in sending information including credit card numbers, etc. via the internet.

Closing

All computers and printers are shut down ten (10) minutes before the Library closes.

Reimbursement for printing

The User shall reimburse the Library fifteen ($.15) cents a page for black and white printing, one ($1.00) dollar for color printing, and twenty five ($.25) cents for double sided copies. The User shall be responsible for all printing costs, so users are encouraged to use “print preview” so that they are aware of the number of copies.

Acceptable Use   

All users of the Library's Internet connection and workstations are expected to use this resource in a responsible and courteous manner, and to follow all rules and procedures as established in this policy. 

Lawful Use. The Library Internet connection and workstations will be used in a lawful manner.  Workstations cannot be used for any fraudulent or unlawful purpose prohibited under any applicable federal, Michigan or local law, including but not limited to accessing material that can be classified as obscene or child pornography.   This also includes but is not limited to unauthorized access or "hacking."

 Intellectual Property. Users must respect intellectual property rights and obey the copyright laws of the United States and all other intellectual property rights.  Responsibility for any consequences of copyright infringement lies with the user.  The Library expressly disclaims any liability or responsibility resulting from such use.

 Use Must Not Be Harmful to Minors. Michigan law prohibits users from allowing minors access to sexually explicit materials harmful to minors. Internet Users may not permit any minor to view sexually explicit material or any other material deemed harmful to minors.

 Compliance with Public Behavior Policy. The same rules apply to the use of the Internet as with the use of any other Library materials.  The Library has adopted a Public Behavior Policy.  All Internet Users must comply with the Library's Public Behavior Policy.

 Privacy. Users must not misrepresent themselves.  Users may not attempt to modify or gain access to files, passwords or data belonging to others.  They may not seek disallowed access to any computer system via the Internet.

 Time Limit. The Library has a limited number of terminals.  Internet Users do not have unlimited access to the Library's computers or electronic devices. The Library may impose time limits and schedule appointments for individual use of the Internet access equipment in order to prevent individuals from monopolizing use. The Users will relinquish the computer or device immediately upon the expiration of the User's time limit.

 The User is responsible for paying all printing charges.  The User will reimburse the Library at the established cost per page for printing.

 Personal Software Prohibited. Users are not allowed to use personal software, or add equipment to the Library's computers or networks or modify any operating system or network configuration. 

 External Devices. The User may download material onto an external device.

 System Modifications. Users are not permitted to change the security setup, operating systems, the network configuration or any other configuration of any Hesperia Community Library computer workstation or device without authorization.  Users may not damage or gain unauthorized access to the computer or network or repeatedly or intentionally visit websites that introduce spyware, malware, virus or other damaging programs.

 Prohibited Uses. The Library's Internet resources should be used for educational, informational and recreational purposes only. 

 Protection of Minors. No patron will permit the unauthorized disclosure, use or dissemination of personal information regarding minors. Users will not participate in any online activity or site (including but not limited to e-mail, chat rooms, social networking sites, or instant messaging) that uses information that is obscene, child pornography or considered harmful to minors under PA 212 or CIPA.  Further, no user will compromise or threaten the safety and security of minors when using email, chat rooms, and other forms of direct electronic communications.

 Violations of Internet Use Policy.

The Library Director or the Director's designee may restrict access to Library facilities by (1) terminating or limiting access to computers, Internet access or Library equipment and facilities; (2) immediately dismissing the patron from the premises; (3) suspending the patron’s access to Library facilities for a set period of time; or (4) by denying access to specific services and/or programs pursuant to this Policy.  If necessary, police may be called to intervene.

Incident Reports. Library Staff will record in writing in the form of an Incident Report any violation of this Policy that resulted in a verbal warning or a suspension of Library privileges.  By the end of the day on which the incident occurred, an Incident Report will be written and forwarded to the Library Director for logging and review. The report should include physical descriptions in addition to the name of the patron. 

Violation of the Policy – Suspension of Privileges. Unless otherwise provided in this Policy, (See Section C below), the Library will handle violations as follows:

1. Initial Violation: Library patrons observed violating this policy will be asked to cease the action with a verbal request.  If the patron does not comply with the request, he or she will be asked to leave the building for the day.  If he or she refuses, police may be called.

2. Subsequent Violations: The Director or the Director's authorized designee may further limit or revoke the patron's Library privileges if infractions continue.  Such limitation or revocation will be in writing specifying the nature of the violation.  Subsequent violations of the same rule will result in additional suspensions.

 Violations that Affect Safety and Security. Actions involving violations of law (including child pornography and allowing minors to view sexually explicit or other material deemed harmful to minors), violence, threatening behaviors, sexual harassment, vandalism, theft or attempted theft, sexual misconduct or any behavior that threatens the safety and security of staff and/or patrons will be handled as follows:

1. Initial Violation: The police will be called immediately. If the conduct constitutes a violation of local, state, or federal law, arrest or criminal prosecution may ensue.  Violations of this nature will result in an immediate minimum two-week suspension of Library privileges.  The Incident Report will specify the nature of the violation.

2. Subsequent Violations: The police will be called immediately.  If the conduct constitutes a violation of local, state, or federal law, arrest or criminal prosecution may ensue.  The Director or the Director's authorized designee, may further limit or revoke the patron's Library privileges, which will be documented in writing.  Subsequent violations of the same rule will result in additional suspensions.

 

Reinstatement.  The patron whose privileges have been limited or revoked will meet with the Director or the Director's designee to review the Library Patron Behavior Policy before the reinstatement of their privileges will be considered.  

 Civil or Criminal Prosecution. Illegal acts involving the Library's Internet access service may be subject to civil or criminal prosecution.

 Right of Appeal.

Patrons may appeal a decision to limit or revoke privileges by sending a written appeal to the Library Board within 10 working days of the date the privileges were revoked or limited.  The appeal should be sent to the President of the Library Board.  The decision of the Library Board is final.

Internet Filtering

In order to comply with the requirements of the Children's Internet Protection Act ("CIPA") and Michigan's Public Act 212 of 2000 ("PA 212"), all computer terminals are filtered. Further, the Library's wireless access is also filtered.  Filtered computer access means the computer or wireless system has a program installed that is designed to restrict minors from receiving Internet content that is harmful to minors as defined by PA 212 and visual depictions that are obscene, child pornography or harmful to minors as defined by CIPA.  Library staff will make a good faith effort to monitor the use of Library computers by minors.  However, the Library holds parents and/or legal guardians responsible for their minor children’s use of the Internet.

Safety of Minors Regarding E-Mail – The Library does not filter e-mail or other direct electronic communications. It is the responsibility of the parent or guardian to educate the minor on safety and security and monitor the use of these communications.  The Library urges minors to follow the following safety guidelines:

  • Never give out identifying information such as home address, school or telephone number.
  • Let parents or guardians decide whether personal information like age, telephone number or financial information should be provided online.
  • Never arrange a face-to-face meeting with someone through a computer without parent or guardian approval.
  • Never respond to messages that have a suggestive, obscene or threatening tone.
  • Keep in mind that people online may not be who they say they are.

Parents or legal guardians are responsible for deciding which Library resources are appropriate for their children. The Library urges parents and guardians to discuss Internet use with their children and to monitor their use.

Parents or guardians should be aware that social networking sites (Facebook, Instagram, Twitter, etc.) are available through the filtered access.

Patrons 18 years of age or older may request to have the filters disabled for bona fide research or other lawful purposes.

Individuals 18 years of age or older who believe an internet site has been improperly blocked can request that the site be “unblocked” by completing the appropriate form. A decision on the site’s status will be made by the Director, who will prepare a written reply to the individual submitting the form.

Minors who are 17years old may have the filters disabled if they make a request in writing on a form provided by the Library for (1) bona fide research or other lawful purposes and (2) only if a parent or legal guardian has accompanied them to the Library and is sitting at the computer station or terminal at all times. Patrons under the age of 17 may not ask for the workstation to be unfiltered pursuant to the requirements of CIPA.

 Procedure for Use

Reservation/Time Limits

  1. If a Patron wishes to use the Internet station he or she must first sign the sheet at the Circulation Desk.
  2. Patrons should only use their first name and the time when signing in.
  3. If requested by the Library, a patron must show a library card in good standing, driver’s license, Michigan ID, school ID or workplace ID.
  4. The User may sign up to use the Internet station for periods of only 60 minutes at a time for one time per day. Use of the Internet stations is available on a first-come-first-served basis.  If no one is waiting, the User may use the terminal for additional 30 minute increments until another User signs up to use the terminal.
  5. A waiting list will be created at the Circulation Desk of all computers that are in use.

 Availability

The public computers are only available for use by Users if they are not being used for Library purposes, such as classes, staff training or special programs.  The Library reserves the right to have first priority of use of Library uses, sponsored events or co-sponsored events.

Wireless Network

  1. Access Limitations- Use of this wireless network is provided as a free service by the Hesperia Community Library. By using this wireless network you are agreeing and acknowledging you have read and accepted these terms and conditions of use.  You are agreeing access to this wireless network is completely at the sole discretion of the Hesperia Community Library and your access to this wireless network may be suspended or terminated at any time for any reason, including, but not limited to, violation of these terms and conditions, actions by you that may lead to liability for the Hesperia Community Library, disruption by you of another’s access to this wireless network, actions by you which violate the rights of the Hesperia Community Library or of any other third party, or actions by you which violate any federal, state or local law.
  2. User’s Obligations – You agree to provide virus and firewall protection for any device(s) which you will be using to access this wireless network and agree to abide by the Hesperia Community Library Internet Policy.
  3. User’s Assumption of All Risks of Use – You agree to and hereby assume all risks (including, but not limited to, the risks of damage caused by hackers, worms, Trojans, or viruses) arising from, connected to or resulting from your use of this wireless network. The Hesperia Community Library assumes no responsibility for the configurations, security or files on any device connecting to this network.  Hesperia Community Library is not responsible for any changes you make to your wireless device’s settings.
  4. User’s Acknowledgments –

You acknowledge:

  • The use of this wireless network may not be uninterrupted or error-free.
  • Use of this wireless network may expose you or your device(s) to risks such as hackers, worms, Trojans or viruses;
  • Hesperia Community Library does not guarantee the security of this wireless network;
  • The Hesperia Community Library’s ability to provide this wireless network without charge is based on the disclaimers and limitations of liability provided in the Disclaimers and Limitation of Liability paragraphs (below);
  • Provision of this wireless network may be terminated at any time and for any reason by the Hesperia Community Library.
  1. Disclaimers – This wireless network and any products or services provided on or in connection with this wireless network are provided on an as is and as available basis and without warranties of any kind. All conditions, representations, indemnities, guarantees and warranties (whether express, implied or arising by operation of law, custom or the prior statement(s) or any party), including but not limited to, any warranty of satisfactory quality, merchantability or fitness for a particular purpose, are hereby excluded and disclaimed.  The Hesperia Community Library is not able to provide technical assistance to you, and there is no guarantee that you will be able to make a wireless connection. 
  2. Limitation of Liability – Under no circumstances will the Hesperia Community Library or any of their officers, directors, employees, or agents be liable for any legal damages (whether based on tort, breach of contract or equitable theories) based on any claim of the user, or any of the user’s heirs, assignees, appointees or successors-in-interest, and arising out of or as a result of the user’s use of this wireless network.
  3. Indemnification – You agree to indemnify and hold harmless the Hesperia Community Library and each of their suppliers, licensors, officers, directors, employees, or agents from any claim, lawsuit, liability, loss, damage, cost, expense or attorney’s fees arising out of or relating to any actions initiated or caused by you while using this wireless network.
  4. Severability – If any provision of these terms and conditions is held to be unenforceable, such holding will not affect the validity of any other provisions of these terms and conditions.    

WARNING CONCERNING COPYRIGHT RESTRICTIONS

The Copyright Law of 1976 (United States Code, Title 17) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specific conditions is that the photocopy or reproduction is not to be "used for any purpose other than private study, scholarship, or research." If a user makes a request for, or later uses, a photocopy or reproduction [including that made by electronic transmission of reserve material] for purposes in excess of "fair use," that user may be liable for copyright infringement.