Wifi

Wireless Policy

The Library provides free unfiltered wireless access in the Library for the public to use with their personal notebooks, laptops, or other mobile devices. These access points are unsecured, unfiltered, and may be accessed only during Library hours.

Use of the network is entirely at the risk of the user. The Library disclaims any and all liability for loss of confidential information or damages resulting from that loss, or any and all damages resulting from use of the network. All users should have up-to-date virus protection on their devices.

Due to safety concerns, only outlets under the work tables may be used to plug in devices. Users must turn off sound while using their computers in the library. Library printers are not available via the wireless connection.

The Library is a public area which is shared by users of all ages, backgrounds, and sensibilities. Users are asked to respect others when accessing information and images. Users may not use the network to transmit or receive illegal (including harmful and obscene) or disruptive material.

Users are expected to know how to configure their own laptop for wireless use. Library Staff does not provide wireless access support or troubleshooting. The Reference Staff can provide a document with technical details, and examples of configuring Windows XP, and some other operating systems, for wireless access.

Most WiFi (802.11b and 802.11g) network cards will be compatible. However, the Library can make no guarantees as to compatibility of patron’s equipment with the Library’s network.

The Library’s network has been configured and sized for interactive searches and knowledge gathering on the World Wide Web. The network is not sized for large downloads from the web. Therefore, the downloading of large files, including software, large images, or music, from the web onto a user’s laptop is not permitted. Users will be asked to immediately terminate any activity that adversely impacts the library’s network performance.

Violation of this policy or abuse of networking equipment will result in the denial of access to the network.

Adopted 9/11/07

Comments are closed