Home > Departments > Library

 

Public PC and Internet Use Policy

As part of its mission “to welcome and support all people in their enjoyment of reading and pursuit of learning and information,” the Fort Worth Public Library provides computers which allow the public to access a variety of electronic resources to create personal documents and files.

Regulations

1.1 Any Library customer may use the Library’s public PCs.

1.2 All public PCs have the same suite of software applications, online catalog, and full Internet access.

1.3 The Library does not provide e-mail accounts. However, customers may access web-based e-mail accounts through the Library’s Internet connection.

1.4 Customers may download media files onto their supported personal storage devices and use streaming audio and video.

1.5 Customers may not publicly play, perform or listen to music or CDs or view any video device, including VHS tapes, DVDs or other similar device on the Library premises.

1.6 PCs are available on a first-come, first-served basis. The Library employs an automated PC reservation system to manage public computer usage. A valid Fort Worth Public Library borrower’s card or guest card is required to reserve public PCs.

1.7 Customers may have a maximum of 2 one-hour sessions each day. As long as no one is waiting, customers may have additional time on each session in 10 minute increments.

1.8 Libraries may designate certain computers as express stations and/or library catalog stations, depending on available resources and demand. Any other programs or functions on those PCs will not be removed or disabled.

1.9 A branch or Central Library unit may reserve a specific computer to access CD-ROMs or online databases that are exclusive to that unit.

1.10 PCs at the Central Library Media Center may be reserved for a two-hour time period up to one week in advance.

1.11 The Library designates some computers for use by special populations of users, such as children or people with disabilities. Computers in children’s areas have software programs especially suited to children. Only children ages 14 and under, or adults who are working with a child or staff of the Fort Worth Public Library, may use the computers in the Central Youth Center and the computers in children’s areas of branch libraries. In these areas, children have priority over all other users. Computers in Our Place, Central’s Teen area, are for teen’s use.

1.12 Libraries may limit the number of people who share the use of a Library computer at the same time.

1.13 Users may print Internet pages and documents created on Library computers. Users agree to pay .15 cents per page for black and white pages, and .50 per page for color pages printed.

1.14 Users may not copy, download, or save personal files or software to the Library’s computers’ hard drives.

1.15 Customers may use their own floppy discs, USB memory sticks, and writable CDs in Library PCs. The Library employs virus scanning software and updates it regularly. This software will prevent the Library’s PCs from opening files that contain viruses.

1.16 The Library is not liable for damages to personal data, diskettes, or equipment resulting from information copied from the Library’s computers or the Internet.

1.17 The Library respects the confidentially of those using its services and collection, and endeavors to protect the privacy of customers using Library computers and networks:

1.17a Users are not required to provide identification to use the Library’s PCs.

1.17b To maintain customer confidentiality, reservation and print queue records are purged every night.

1.17c All public PCs are configured to clean caches, cookies, temporary Internet files, Internet history files (URLs visited), and .DAT files upon start-up. The Library encourages customers to activate this function at the end of their session by rebooting the computer.

1.17d The Library releases records related to an individual’s PC use only as required by law. See the Library’s Customer Privacy and Confidentiality Policy for complete details.

1.17e Users are cautioned about the risks of displaying personal information on library PCs, and of the risks of providing personal information over the Internet. Parents should caution their children about sharing personal facts on the Internet.

1.18 Customers may not attempt to alter, damage, or monopolize Library computer/network hardware or software. Customers may not:

1.18a Attempt to modify, reconfigure, remove, or damage computer equipment, peripherals, software configurations, software programs, or files belonging to Fort Worth Public Library, other users, or external networks.

1.18b Attempt to add hardware, software (including Internet downloads), plug-ins, or applications to any FWPL computer or network, except that customers may connect their personal laptops or other wireless-enabled devices to the Library’s public wireless network.

1.18c Attempt to introduce viruses, worms, or other malicious programs into Library computers or over the Library’s networks.

1.18d Attempt to crash the system or cause degradation of system performance.

1.18e Impede other customers’ work through the monopolization or unreasonable consumption of system resources.

1.19 The Library’s computers and networks may not be used for any purpose that violates U.S., state, or local laws. Customers may not use Library computers/networks to:

1.19a “Hack” or otherwise attempt the unauthorized entry to Fort Worth Public Library’s, the City of Fort Worth’s, or other external networks.

1.19b Attempt to interfere with or disrupt network users, services, or equipment.

1.19c Attempt to evade security measures on any system.

1.19d Invade the privacy of others.

1.19e Access or use passwords, files, financial records or accounts, or other personal data belonging to others without their authorization.

1.19f Develop or intentionally disseminate computer viruses or other harmful programs.

1.19g Violate copyright laws (Title 17, U. S. Code) by copying, downloading, or distributing copyright-protected files, except as permitted by the principles of “fair use,” without the explicit permission of the copyright holder.

1.19h Violate software license agreements.

1.19i Send harassing, threatening, or libelous messages or material.

1.19j Access, view, display, print, transmit, or distribute sites or material in violation of Texas laws regarding obscenity, child pornography, and materials harmful to minors as specified in Texas Penal Code §§ 43.22, 43.23, §43.24, or §42.26. Only a court of law can determine the legal status of a specific website. Access to websites that have not been found by a court to be obscene, child pornography, or harmful to minors is legally protected under the First Amendment. Texas Penal Code §§ 43.22, 43.23, 43.24, and 43.026 provide in pertinent part:

Texas Penal Code §43.22: A person commits an offense if he intentionally or knowingly displays or distributes an obscene photograph, drawing, or similar visual representation or other obscene material and is reckless about whether a person is present who will be offended or alarmed by the display or distribution.

Texas Penal Code §43.23: A person commits an offense if, knowing its content and character, he wholesale promotes or possesses with intent to wholesale promote any obscene material or obscene device.

Texas Penal Code §43.24: A person commits an offense if, knowing that the material is harmful [to minors] he displays harmful material and is reckless about whether a minor is present who will be offended or alarmed by the display.

Texas Penal Code §43.26: A person commits an offense if the person knowingly or intentionally possesses visual material that visually depicts a child younger than 18 years of age at the time the image of the child was made who is engaging in sexual conduct.

1.20 Customers are expected to use Library computers and networks in a responsible and courteous manner. Computer users should refrain from:

1.20a Using profanity or other language that may be offensive to another user.

1.20b Harassing other Library customers or staff.

1.20c Invading other users’ privacy or commenting upon what others are viewing.

1.20d Intentionally displaying or drawing customers’ attention to images, sounds, or messages in a way that would create a disturbing, intimidating, or hostile environment for Library customers and staff who might find them objectionable or offensive.

While all Library customers have a right to view any legally-protected website, they also are expected to behave in a manner that is appropriate for a public space used by people of all ages, backgrounds, and sensibilities. As a limited public forum, the Fort Worth Public Library tries to balance the First Amendment rights afforded to individual users with the need to provide a safe, welcoming, and harassment-free environment for Library customers and staff.

1.20eDistributing unsolicited advertising (“spamming”).

1.21 The Library can monitor public computers and networks electronically and reserves the right to do so when a violation of its policies or regulations is suspected.

1.22 Library staff are authorized to take immediate action to protect the security of the Library’s computers and network.

1.23 Violation of the Library’s computer use policies and regulations may result in confiscation of disks, loss of computer privileges, and/or loss of Library privileges. Illegal activities are subject to prosecution by the appropriate authorities.

1.24 For security reasons, the Library does not share information about its network design, components, or security measures with members of the public.

POLICY STATEMENT 2

In order to provide consistent service on all public PCs, to optimize system performance, and to promote the efficient use of resources, all public PCs have standardized hardware, peripheral, and software configurations.

Regulations

2.1 Microsoft Office, Internet Explorer, Real Player, Shockwave, Media Player, Flash, QuickTime, Java, security and spyware detecting software, and Adobe Acrobat Reader are installed on all public PCs. All PCs have CD/DVD read/write drives, USB ports, and 3.5” floppy drives.

2.2 Requests for access to programs that load additional applets or plug-ins to the hard drive cannot be accommodated on demand. Staff members are not authorized to download or install software or install hardware for the public on demand. In order to assure standardization, new software and hardware will not normally be installed on just one or a few public PCs. Requests for additional plug-ins, applications, and hardware may be made by completing the Request for Additions or Changes to FWPL Public PC Configuration. Additional plug-ins, applications, and/or hardware will only be added to public PCs if:

  • It is appropriate to add them for system-wide use by the general public.
  • They are compatible with the Library's standard operating systems, hardware platforms, and network configuration.
  • They will not compromise system or PC performance.
  • They will not require undue amounts of Computer Services staff time for installation
  • They are not prohibitively expensive.
  • They are not subject to copyright or licensing restrictions that make them inappropriate for public library use.

2.3 The Library will make every attempt to update PC configurations to accommodate upgrades to popular e-mail services.

2.4 In order to ensure that the public has access to up-to-date equipment and software, the Library leases its public PCs and updates them on a regular schedule. The Library does not normally purchase PCs for public use. The Library does not accept gift PCs or peripherals for the public that do not conform to its standard hardware and software configurations. The Library does not accept used PCs or peripherals.

POLICY STATEMENT 3

Library staff will assist customers in using all resources provided by the Library, including software applications, licensed electronic databases, and the Internet.

Regulations

3.1 Staff will assist customers with:

  • The basic use of PCs, such as using a mouse, navigating the keyboard, opening and closing Windows, and saving documents.
  • Identifying appropriate electronic databases and/or suggesting search strategies.
  • Recommending appropriate Internet sites, suggesting search strategies, and evaluating a site’s reliability.
  • Setting up personal e-mail accounts through Hotmail, Yahoo, etc.
  • Downloading, e-mailing, copying and/or saving files and data from electronic databases and Internet sites.
  • The basic use of software programs provided by the Library, such as Word and Excel.

3.2 Generally, staff are not able to conduct in-depth research for customers, or provide extensive one-on-one instruction on the use of hardware or software applications. The Library offers free classes in the use of these programs. The Library also offers a wide selection of books and other materials to assist users with these resources. We encourage customers to take advantage of these classes and materials.

3.3 Staff may provide limited assistance to patrons in connecting to wireless networks within the Library depending on individual staff expertise and training. Such assistance may be limited to directing patrons to information on the Library’s web site or published handouts.

POLICY STATEMENT 4

The Fort Worth Public Library is not responsible for any damage, loss, or liability that may occur as a result of use of the Library’s public computers or networks, nor the disclosure of financial or other personal information over the Library’s public computer services.

Regulations

4.1 The Fort Worth Public Library is responsible only for data on those pages specifically about the Library found at www.fortworthlibrary.org. Fort Worth Public Library is not responsible for the content, accuracy or availability of any external sites linked to these pages.

4.2 The Library employs software that clears caches and history files at reboot. Users may clear such files by rebooting the PC at the end of their session.

4.3 Users should be aware that they are using public computers in a public environment, and that their activities and any information, including personal and private information, may be observed by others. Users are responsible for rebooting the PC when they have completed their sessions to ensure that personal and private information is removed from the PC’s screen, cache, and history files.

4.4 Users are responsible for verifying the security and privacy policies of sites with which they conduct business or to which they provide personal information.

4.5 The Library assumes no liability for damage to any user’s disk or computer or any loss of data that may occur from the use of Library computers or networks. Data downloaded from the Internet may contain viruses or other malicious programs. While the Library employs virus-checking software on all public PCs, users are still responsible for maintaining up-to-date virus-protection software on their personally-owned computers.

4.6 Library staff restart all public PCs each morning before opening to ensure that the latest updates are installed.

POLICY STATEMENT 5

Children’s Internet Safety Policy: In order to address the special concerns raised by children’s access to the Internet, the Library establishes this Children’s Internet Safety Policy for children’s use of Library PCs.

Regulations

5.1 The Library respects parents’ and guardians’ right and responsibility to guide their children’s development by monitoring their own children’s use of Library materials and resources, including the Internet, and determining what is appropriate for them.

5.2 The Fort Worth Public Library helps children have safe online experiences and avoids exposing them to harmful or inappropriate material by:

  • Encouraging parents to monitor and supervise their own children’s use of the Library’s PCs.
  • Providing specially-designed web pages for children and young adults, with links to age-appropriate Internet sites.
  • Promoting recommended child-friendly search engines on the Youth page.
  • Promoting Links to other filtered search engines.
  • Promoting links to sites that help children learn Internet safety:
  • Providing staff who are trained to help children and parents find appropriate sites.
  • Providing Internet safety classes for children and adults
  • Enforcing the Library’s Public PC and Internet Use Policy.
  • Posting the Texas Penal Code §§ 43.22, 43.23, 43.24, and 43.26 regarding distribution, promotion or display of materials harmful to minors prominently near all Internet PCs.

5.3 The Library promotes the safety and security of minors who use e-mail, chat rooms, and other forms of direct electronic communication by

5.3a Encouraging parents to monitor and supervise their own children’s use of the Library’s PCs.

5.3b Encouraging parents to discuss these Internet Safety Tips with their children:

  • Always ask your parents’ permission before using your full name, address, telephone number, or school name anywhere on the Internet.
  • Always tell your parents or other adults you trust if you see something online that is scary or that makes you feel uncomfortable.
  • Don’t respond to messages that make you feel uncomfortable or uneasy.
  • Never give out a credit card number or password online.
  • Never arrange to meet in person someone you’ve met online unless you discuss it with your parents and an adult goes with you.

5.4 The Library discourages minors’ unauthorized access and other unlawful online activities by:

5.4a Encouraging parents to monitor and supervise their own children’s use of the Library’s PCs.

5.4b Enforcing Regulation 1.19 of its Public PC and Internet Use Policy, which prohibits anyone using Library PCs, including minors, from engaging in unlawful activities such as hacking, damaging equipment, disrupting systems or networks, accessing or using others’ personal information, harassing, and viewing or transmitting obscenity or child pornography.

5.5 The Library helps prevent unauthorized disclosure, use, and dissemination of minors’ personal identification information by:

5.5a Encouraging parents to monitor and supervise their own children’s use of Library PCs.

5.5b Enforcing its Privacy and Confidentiality Policy, which details the types of personal identification information the Library collects, and the conditions under which it releases that information.

5.5c Promoting the Library’s Internet Safety Tips, which caution minors against disclosing any personal identification information such as full name, address, school, or parents’ names.

Request for Additions or Changes to FWPL Public PC Configuration

The Library will add software applications and/or hardware to its public PC configuration if:

  • It is appropriate to add them for system-wide use by the general public. Special software or hardware is normally not added to just one or a few public PCs.
  • They are compatible with the Library’s standard operating systems, hardware platforms, and network configuration.
  • They will not compromise system or PC performance.
  • They will not require undue amounts of Computer Services staff time for installation and maintenance.
  • They are not prohibitively expensive.
  • They are not subject to copyright or licensing restrictions that make them inappropriate for public library use.

Please send us your recommendations for additions or changes to the Library’s computers:

  • Recommended software application or plug-in (please provide name, manufacturer, and/or web address)
  • Recommended hardware (please provide manufacturer)
  • Recommended change to PC configuration

Please include your name and phone or e-mail address if we may contact you for additional information if necessary.

Policy approved by Library Advisory Board October 6, 2005

Last updated: Jan. 29, 2014