Computer Use and Internet Access

Greenwood County Library System Computer Use and Internet Access Policy

The Greenwood County Library System provides resources in a wide variety of formats to meet the cultural, informational, recreational, and educational needs of the diverse community it serves. The Internet is an integral part of the resources available to assist library users in finding the information they need.

The Internet is a global electronic network. The Library does not monitor Internet use, has no control over the information accessed through the Inrternet, and cannot be held responsible for its content. The Internet may contain information of a controversial nature. The Greenwood County Library System complies with the federal Children's Internet Protection Act (CIPA) which requires the use of filtering software for adults, teens, and children, and with South Carolina Law (Code 16-15-305) which requires the use of filtering software designed to elminate the sending, receiving, and/or displaying of inappropriate materials, defined as text or graphics, which may be construed as obscene. Terminals may be monitored by Library personnel to ensure that Internet use is in accord with general community standards and the Library System's policy.

The Greenwood County Library System makes Internet resources accessible to all users. Library staff help users navigate, identify, and access resources on the Internet. The Reference Staff conducts free classes for adults to instruct in safe and effective use of the Internet.

No filtering software is completely accurate, and may not block all material users might find offensive. Parents, guardians, or legal caregivers are required to remain with children in grades 5 and under while children are using the Library's computers. Library staff cannot act in place of parents, guardians, or legal caregivers in deciding whether the information found through Internet resources is suitable and/or appropriate.

Use of the Library System's computers is a privilege, not a right. The Library System has established procedures for the use of computers, software, access to databases, and the Internet. Violations of these rules may result in the cancellation of computer use privileges.

Approved April 11, 2017

Rules Governing In-House Use
  1. Users demonstrating and/or instructing others in methods of bypassing the Library's web-filtered technology will have computer use privileges revoked.
  2. A valid library card in good standing (fines less than $5) is required to access a workstation.
  3. Non-residents may use the Library's computers by showing a picture ID.
  4. The Library's computers and network may not be used to send, receive, or display inappropriate materials, defined as text or graphics, which may be construed as obscene. (SC Code 16-15-305)
  5. Users may not attempt to reconfigure systems or software, or in any way interfere with or disrupt the Library's current system or network set-up and services.
  6. Users may not unplug, remove, or modify Library equipment.
  7. All users are to be respectful of the rights of others in using the Internet. Each user has the right to a quiet and organized work space. No more than 2 people may use a workstation at the same time.
  8. All users are expected to meet the standards of the Library System's Code of Conduct.
  9. If any user abuses or engages in unauthorized use of computers, his or her computer privileges will be denied. If a customer refuses a staff request to end problem behavior, that customer will be asked to leave the Library. Staff may call upon security guards or the police for assistance.
  10. Library staff will assist customers as time permits with basic Internet navigation, basic computer and printer functions.
  11. Users may download information to removable/portable storage media.
  12. Users may not install or use personal software on Library computers.
  13. Users giving a false name or signature will have Library privileges (including computer use) revoked.
  14. Users are required to use headphones when using applications with sound effects.
  15. Internet transacations involving the use of credit cards are conducted strictly at the risk of the user.