Purpose
This policy is to meet and satisfy the provisions of the Children’s Internet Protection Act and Idaho Code 33-2741, as well as to provide guidelines for patrons and staff regarding Internet access and online computer use.
Introduction
It is the policy of the Library to:
- prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications;
- prevent unauthorized access and other unlawful online activity;
- prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors
Legal Requirements
This Internet Safety policy complies with Idaho Code 33-2741 and with the Children’s Internet Protection Act [Pub. L. No. 106-554 and 47 USC 254 (h) (1) (B)].
The Library has in place a policy of Internet safety for minors, including the operation of a technology protection measure, hereafter called “filtering software,” on any publicly accessible computer with Internet access that protects against access to visual depictions that are obscene, child pornography, or harmful to minors, as defined in Idaho Code 33-2741 and the Children’s Internet Protection Act. The filtering software will be enforced to provide Internet safety during any use of a computer by a minor. However, while the filtering software is in place and active, know that no filter is fool-proof. The Library assumes no liability for web sites or their content that may pass through the filter and still be deemed inappropriate.
The Library’s Public Internet & Computer Use Policy may also limit internet access or otherwise protect against materials other than the materials specified in Idaho statute.
Inappropriate Network Usage
To the extent practical, steps shall be taken to promote the safety and security of users of the Library online computer network when using any electronic communications. Specifically, as required by the Children’s Internet Protection Act, prevention of inappropriate network usage includes: (a) unauthorized access, including so-called ‘hacking,’ and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors.
Supervision and Monitoring
Subject to staff supervision, technology protection measures may be disabled or, in the case of minors, minimized only for bona fide research or other lawful purposes. Such requests must be made in writing by a legal adult to a member of the Library staff. Said requests must indicate why the request is being made and be signed and dated by the legal adult making the request. If there is doubt of legal adult status, proof of age may be required. If the request is on behalf of a minor the request must be made by the minor’s parent or legal guardian. During the time that the filtering software is disabled, a parent or guardian must be present with the minor while accessing the unfiltered Internet.
Members of the Library staff can supervise and monitor usage of the online computer network and access to the Internet in accordance with this policy, the Public Internet & Computer Use Policy, and the Children’s Internet Protection Act.
Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Library Director or designated representatives.
In the Event of Policy Violation
If a staff member or a library patron observes someone violating this policy, the staff member or patron shall promptly report it to security or a senior staff member, who shall advise the violator to conform their conduct to the policy and will suspend the violator’s privilege to use the Library and/or Internet, and/or report the matter to law enforcement.
Security or senior staff will determine the appropriateness of the enforcement measures on a case-by-case basis, taking into consideration the severity of the violation, the disruption caused to other patrons, the violator’s willingness to conform to the requirement of this policy, and the violator’s history of similar violations.