WiFi & Laptops
Wireless internet access (Wi-Fi) is available at all Library locations.
The Library’s wireless network is an open network, and therefore not a secure network. Information sent to or from a wireless device can be intercepted by anyone else with a wireless device and appropriate software, within the range of the Library’s wireless access point. The Library also cannot guarantee the safety of computer communication across its wireless network. The Nelson County Public Library assumes no responsibility for the configurations, security or files on a patron’s laptop or wireless device resulting from connecting to the library’s network.
Laptop Check out Policy
The Library owns four laptops which are available for check out in two-hour increments. These laptops are Windows 7 Ultimate machines, with Office 2010 Professional, a resume builder, and GIMP installed. The primary purpose of library laptop access is for computer projects that may take longer than the usual one- hour limit. This includes research, typing papers, resumes, etc. Laptops may be used for short-term use if all of the desktop computers are occupied with a waiting time more than 30 minutes. Library customers must be 18 or older AND have a library account in good standing (no fines or overdue materials) in order to check out a laptop.
Patrons must present their library card AND a valid photo ID in order to check out laptops. Patrons must leave their valid photo ID with the front desk staff, who will return the ID when the laptop is returned. The equipment may NOT be removed from the building.
Customers using their personal computer equipment with Library wireless service are required to observe the computer use policies. (See below)
Computer Use Policy
- A Nelson County Public Library Internet and Computer Use Agreement form must be read and signed in order to use the Library's computers. Ask for a copy at the circulation desk.
- Patrons under the age of 18 must have a Nelson County Public Library Internet and Computer Use Agreement form signed by a parent/guardian or grandparent prior to using library computers or observing someone else using a library computer.
- Computer users need their library card to get a reservation at the circulation desk.
- Patrons may use public access computers for a maximum of 2 hours per day.
- Sessions are scheduled in one-hour increments. If you will be needing more time, please let the staff know ahead of time and we will attempt to accommodate you.
- Computers are not to be turned off at any time except by library staff.
- CD-R discs may be purchased for 50 cents at the circulation desk.
The Library’s public computers and internet access may not be used to:
- Violate the law
- Send, receive, or display text or graphics that may reasonably be construed as inappropriate or obscene
- Harm or compromise the safety, security, privacy, or property of others
- Seek unauthorized access to any computer system
- Alter or damage software components of any network, host server, or database
As part of the computer usage agreement customers must abide by these policies and are advised that failure to do so will result in the loss of computer and internet privileges at the library. This includes use of another customer’s library card number to log on to a computer.
Patrons cannot use the computers if there is more than $20.00 on their account.
If there is less than $20.00 on a patron's account, they may use the computers with a minimum payment of $.50 on their fine.
Computer Usage Violations
- When someone is observed, by other patrons or staff, displaying an offensive site, they are given a verbal warning and told that if they are seen viewing an offensive site again, they will be unable to use the computers for 3 months.
- If the person is observed displaying an offensive site again, they will be unable to use the computer for 3 months. The patron is also warned that if it happens again, their computer privileges will be taken away indefinitely.
- Once they are observed displaying an offensive site the 3rd time, a patron's computer privileges are permanently taken away.
The purpose of these procedures is not to control the sites patrons select but to protect the rights of other patrons and staff utilizing this public facility.