Internet Acceptable Use Policy

The Ericson Public Library provides free, unsecured access to the Internet to connect the public to the world of ideas and information, and to provide equal access to that information for all individuals in the community. This policy applies to all use of the library’s Internet service, whether privately owned or library-provided devices are operated. Libraries are a traditional forum for the open exchange of information. Providing access to information available on the Internet does not constitute endorsement of the content by the library. Ericson Public Library expressly disclaims any liability or responsibility arising from use of the Internet or information obtained through the Internet.  

1. Internet computers will not be used for illegal activity or to access illegal or obscene materials. Display of sexually explicit graphics is inappropriate for a public and open environment and is prohibited. Library staff members may request that individuals cease to view or listen to works that threaten the safe and comfortable environment of the library or interfere with the conduct of library business.

2. Users will respect copyright laws and licensing agreements.

3. Users will not make any attempt to gain unauthorized access to restricted files or networks.

4. Users will respect the privacy of other users.

5. Library staff is authorized to terminate any user’s access session, or to prohibit a user from subsequent access given cause to believe that the user has failed to comply with the Internet Acceptable Use Policy and/or the library’s policies on patron behavior. 

1.  Ericson Public Library does not impose blocking or filtering software to limit access to Internet sites. As with other library materials, individuals must accept responsibility for evaluating the content of resources they view, read, or listen to. Monitoring and any restriction of a child’s access is the responsibility of the parent or legal guardian.

2.  A log-in, time-limiting system will be used to insure equitable access.

3.  Installation or modification of software or hardware is prohibited.

4.  Users may download files only onto discs or USB devices, not onto the hard drive.

5.  Prompt payment is required from users who incur charges for printing, etc.

6.  By mutual agreement, two persons may share one terminal as long as their behavior or conversation does not disturb other users or the library staff.  The shared session counts as each user’s access for the day.

7.  Users must end their session and leave the terminal when their time is up or when asked to do so by library staff.

8.  Patrons may not use the terminals if they owe any library fines.

9.  Users handling financial transactions or other activities that require confidentiality do so at their own risk. The Internet is not a private environment and security of electronic communication cannot be guaranteed. 


1.  Users are expected to know how to configure their own laptop for wireless use.

2.  The library is not able to provide technical assistance to wireless users, and there is no guarantee that a wireless connection can be established.

3.   The user’s laptop must be configured with virus protection using current virus definitions.

4.  The library’s wireless network is not secure.  The library assumes no responsibility for the safety of configurations, security or data files on a user’s laptop resulting from connection to the library’s network.

5.  The library assumes no responsibility for damage to or theft of a user’s equipment.