Computers and Printing Services/Internet Use and Safety Policy

The library’s computers allow users to use a variety of electronic resources. All library computers must be used in accordance with the library conduct policy.

The library is committed to providing access to information, educational, recreational and cultural resources for library users of all ages and backgrounds. The library strives to balance the rights of users to access electronic resources with the rights of users to work in a public environment free from sounds and images intended to harass library patrons or staff.

Library staff is available to help library patrons use the computers to find the information they need. Library staff or volunteers can help patrons learn how to use search tools on the computers, but cannot provide extensive one-on-one instruction.


The library takes a variety of measures to protect your privacy when you use the library computers. The library’s computers are in a public area. Others may be involuntarily exposed to what you are viewing. The library asks that you remain sensitive to the fact that you are working in a public environment shared by people of all ages.


Illegal activities or activities that interfere with or disrupt the network, users, services or equipment are prohibited and not protected by the library’s privacy policy. The library does not routinely monitor public computers, but reserves the right to do so when a violation of this policy or illegal activity is suspected. Staff is authorized to take immediate action to protect the security of computers and the network and to enforce the following rules. This includes confiscating any removable media, requiring a user to leave a computer or the premises, and contacting law enforcement authorities.

The Internet is a global resource. The Internet may contain material of a controversial nature. Users should note that not all Internet sources provide accurate, complete or current information.

All Library computers with Internet access use a technology protection measure to block, filter or otherwise protect against access to visual depictions that are obscene, child pornography or harmful to minors and to any other materials considered inappropriate for or harmful to minors.

Patrons who are 18 years of age and over may, at their request, have the technology protection measure disabled during their use to enable access for bona fide research or other lawful purposes. Procedures for disabling or otherwise modifying any technology protection measures (for use by adults) shall be the responsibility of the Library Director or designated representatives.

Public wireless Internet access is also filtered, and all Library policies concerning legal, acceptable and safe use of computers and the Internet apply.

You are responsible for complying with copyright law, licensing agreements and the policies of individual websites that you view.

Software and other files downloaded from the Internet may contain viruses or spyware that may infect other computers.

Supervising Computer Use by Children

Access for all patrons under age 18 will be filtered. Filtering software may not block all material users find offensive. Librarians cannot act in the place of parents in providing constant care and supervision of children as they explore the Internet. Parents and legal guardians are responsible for monitoring any and all Internet use by minors. Consent given on the part of parents or legal guardians for a Library card constitutes acknowledgment by the parents or guardians that they have a responsibility for monitoring their child’s use of all Library resources, including the public computers.

The following are recommended guidelines for parents and guardians to ensure that children have positive online experiences, whether at home or at the Library.

  • Explore the wide range of available information and tell your children about sites you consider inappropriate for them.
  • Provide guidelines for your children on the amount of time they spend online, just as for television viewing.
  • Teach children to never give out personal identification information (name, address, password, telephone number, social security number, credit card number) about themselves or others without first asking a parent for permission.
  • Teach children to be good online consumers. As with print information, consider the source, date, and accuracy of online information.
  • Teach minors to exercise discretion and caution when communicating using the Internet, electronic mail, chat rooms, and other forms of direct electronic communications in order to remain safe and secure (e.g. avoidance of predators, cyber-bullying, and scams).

Rules governing use of library computers

Use of library technology by each and every staff member, volunteer, or patron shall constitute that person’s acknowledgment of and agreement to abide by this Internet Use and Safety Policy, including guidelines for use of the Internet by minors.

Failure to comply with the following rules may result in loss of computer privileges, loss of library privileges and prosecution.

  • Patrons must use a valid library card or guest pass to log into the computers
  • Patrons must promptly give up the computer when requested by staff
  • Patrons may download files using supported media. The library is not responsible for damage to your media or for corruption of your data, including damage caused by mechanical malfunction or corruption caused by virus or spyware infection while using library computers.
  • There is a charge for printing from public computers. Please pay at the front desk.
  • Respect others’ privacy by not attempting to observe or comment on what others are viewing.
  • Remain sensitive to the fact that you are working in a public environment shared by people of all ages.
  • Use headphones when listening to audio content, and keep volume low so you do not disturb others.
  • As a courtesy to others, log off completely when you are finished with your session. This also protects the privacy of your search history.
  • Do not misuse computer equipment or software.

Misuse includes but is not limited to:

  • Viewing material that violates federal, state or local laws or regulations, including those regarding accessing, viewing, printing and distributing obscenity or child pornography.
  • Hacking into the library computer system or any other computer system
  • Mishandling, damaging or attempting to damage computer equipment or software; tampering with computer settings.
  • Interfering with system operations, integrity or security
  • Uploading, downloading, or creating computer viruses or other forms of malicious programming
  • Engaging in any activity that is deliberately offensive or creates an intimidating or hostile environment.
  • Violating copyright laws and software licensing agreements or the policies of the individual websites that you view.
  • Disclosing, using, or disseminating personal identification information regarding minors without proper authorization
  • Failing to pay for printing
  • Refusing or ignoring a staff person’s request to give up a computer
  • Failing to comply with time limits
  • Any other violation of acceptable use of the public computers.

Staff members are to use the Internet for library related purposes only. Unacceptable use of the Internet is prohibited and is grounds for disciplinary action up to and including dismissal from the library.


Printing is $.10 for black/white and $1.00 for color. Prints are paid for and picked up at the check out desk. Patrons should not remove their own printouts from the printer. They should wait for a staff member to retrieve them for them. Printing must be picked up the same day it is queued into the printer.

Wireless Internet

Library patrons may use library wireless if they have a valid and current Red Oak Library Card. The password for the wireless is available at the front desk with presentation of a valid Red Oak Library card. The wireless is available during hours the library is open to the public.

Time and other limits

To access the computers, a library patron must use his or her own library card number. A visitor who does not have a library card may use a one time guest pass.

Users will be limited to a time limit of one (1) hour if others are waiting to access the computers. Users must relinquish a workstation at the end of their assigned session. Users may wait to get on the next free workstation after their session ends. If no one is waiting, each user will have the option to extend their session every 15 minutes.

The library’s computers are set up for use by a single individual. A maximum of two persons may sit/work together at any one computer, except in special cases such as when a parent/guardian is with children.

Policy Adoption

 Original version approved by the Red Oak Library Advisory Board at a public meeting after normal public notice on Tuesday, July 17th, 2012.
 Revisions approved by City Manager Todd Fuller on the 13th of August, 2012.