845-294-6606 - FAX 845-294-7158 203 Main Street Goshen NY 10924

Computer Use Policy

  1. In keeping with its mission and with advances in information technology, the library provides patrons with computer access to the library catalog, E-Reference sources, word processing applications, and the Internet.
  2. Only software installed by the library may be used. Programs may not be downloaded from the Internet to be installed or run on our machines. Patrons found to have installed software on our machines, or to have been at our machines when unauthorized software was being used, will be temporarily or permanently (depending on the situation) banned from computer access (length of time may vary).
  3. Internet service is available for research and/or educational use. While the library is not responsible for the sites patrons choose to visit, we are aware that all websites are prone to infiltration with cookies, unwanted pop-ups, spyware, malware, adware and viruses; or require enormous amounts of bandwidth. Such sites have the potential to infect or hijack the computer, or slow down the entire network. The library reserves the right to block such sites. Visiting a site which may compromise the security of the network or cause network slowdown may result in the loss of computer privileges.
  4. The library will not be held liable for any misuse of its public access terminals or its wireless network. “Misuse” includes, but is not limited to:
  • Use of the network to make unauthorized entry into other computational, informational or communication services or resources.
  • Distribution of unsolicited advertising.
  • Invasion of the privacy of others.
  • Engagement in any activity that is harassing or defamatory.
  • Use of the Internet for any illegal activity, including violation of copyright or other rights of third parties, or in a manner inconsistent with the library’s tax-exempt status or its proper orientation.
  1. Violations will result in loss of access. Unlawful activities will be dealt with in an appropriate manner.
  2. Visiting Internet sites containing graphic adult content images or graphically violent images is inappropriate conduct, and may result in loss of computer privileges. If such sites are viewed within the proximity of minors, such viewing will be considered endangering the welfare of a child and will be treated as such. Visiting Internet sites depicting criminal sexual activity is illegal and will result in permanent loss of computer privileges.
  3. As with all formats of information, patrons must respect copyright laws and licensing agreements. Acts or behaviors which may be illegal jeopardize a source’s files, or the library’s account or access to resources, will result in permanent loss of computer privileges.
  4. A valid library card is needed to log on to the computer. A guest card may be issued for use at the reference librarian’s discretion for out of state visitors as a courtesy. All other users must use their own library card. If you don’t have one, please speak to one of our circulation staff members about assisting you in getting one. Time allocation and printing charges are attached to each library card.
  5. Use of another person’s library card to access computers is prohibited.
  6. Computers are available on a first come, first served basis. If all computers are in use, a reservation for the next available computer may be made at the circulation desk. Computer time may not otherwise be booked in advance.
  7. A time limit of 1 hour per session per patron, and a maximum daily use of 2 hours are enforced. Software prompts alert patrons that their session is about to end in intervals of 30, 15 and 5 minutes. Work not saved to an attachment or removable medium or printed by the end of the session will be lost. The library is not responsible for data loss. Computers are programmed to turn off within five minutes of closing, and will not allow sessions within 15 minutes of closing.
  8. A black & white/color laser printer is available for use. There is a printing charge of 10cents per page for black & white and color copies are .75cents per page generated via the public use computers. Full page photo copies are not permitted. Printing shall be done on plain paper. Excessive color saturation and photo printing shall not be permitted.
  9.  Software prompts provide the number of pages and the cost of each printing job and must be accepted before the job will print. A printing account is created for each library card upon its initial use on our computers. The patron must then pre-pay or use funds already on their account in order for the job to be released. Jobs exceeding the balance available on the account must be paid for and released at the circulation desk.
  10. USB flash drives are recommended for data storage and are available for sale at the circulation desk.
  11.  Headphones are permissible and can be purchased at the circulation desk. Volume levels for the headphones are accessible via a shortcut icon on the desktop.
  12. Patrons may bring their own laptops. We request that electrical cords are not a hazard to other library patrons.
  13. Library reference staff will provide introductory instruction and assistance. In-depth instruction in the use of library electronic resources may be scheduled at the reference desk.
  14. Children aged 9 or under must be accompanied by an adult when using electronic resources. Children aged 10-18 who have a signed parental consent form on file (see Appendix G) may use the Internet unattended. It is strongly recommended that parents supervise the use of the Internet by their minor children.
  15.  Any malfunction or problem should be reported immediately to the reference desk or network administrator, including any pertinent details such as an application crash. Customers must not try to correct the problem themselves.
  16. Patrons must abide by the library’s rules of conduct.
  17. Patrons abusing the equipment or the library policies are subject to immediate disciplinary action and may be permanently banned from further use.
  18. Patrons should be aware that the Internet is not a secure network and that third parties may be able to obtain information regarding users’ activities.

Approved: March 11, 2013