INF-1 Priorities for Reference Service
Reference services are an essential part of public library services. It is important that each individual who asks for assistance in finding information be treated with respect, that each question be taken seriously, and that these transactions be handled confidentially. Inquiries from patrons are prioritized to those present in the library, telephone inquiries, and then email or other electronic communications in order to provide the best customer service.
INF-2 Interlibrary Loan
Patron requests for items not in the collection will normally be reviewed for purchase. When such items do not meet the library’s selection criteria or are not in print, the library will attempt to borrow the items from another library through interlibrary loan. A patron must request the item in consultation with a staff member. Requests can be placed in person, through the library’s website, or email. The patron will need to provide as much information as possible about the item and a staff member will verify that information in a centralized database that will also list which libraries have that item in their collection. The patron must provide a valid phone number and/or email address in order to be notified of the availability of the item.
The library is generally unable to borrow:
1. Items published in the current year.
2. Audiovisual materials.
3. Copies of bound periodicals (though photocopies may be requested.)
4. Items requiring insurance or fees from loaning library.
The library will attempt to borrow from libraries that do not charge.
The library will not process interlibrary loans for patrons with fees greater than $5.00 on their cards until the charges are cleared. Patrons are allowed to request five (5) interlibrary loan items per month. When an interlibrary loan item is processed at the library, the patron will be notified by telephone or email that it is ready to be picked up. The loan periods for interlibrary loan items are set by the loaning library and may vary depending on the loaning library. Interlibrary loans are not renewable.
If a patron loses or damages an interlibrary loan item, they will be assessed the value of the item as set by the loaning library and an $8.00 processing fee.
INF-3 Use of Library Computers & Network ResourcesPatrons Access to Services. Current cardholders may use their card, and only their own card, to access the library’s computers for two (2) hours per day.
Express Computer. The library offers an express computer station as a courtesy to visitors who need quick access to the Internet. Sessions are limited to 15 minutes.
DATA Computers. The DATA computers (2DATA 1 through 4) are to be utilized for accessing the catalog, databases, office suite, and white list websites. No library card is required to access the DATA computers. Each DATA computer has a two (2) hour time limit with an option to extend the session in the event the user is utilizing the computer for job searching, business, or academic purposes. The DATA computers are not to be used for movie watching or playing video games.
Intent of Policies. The intent of these policies is to assist patrons in the identification of acceptable and unacceptable uses of library computer resources, although patrons should not consider the policies contained herein as exhaustive.
Compliance with Policies Required. Patrons are required to comply with these policies. Violations will be reviewed on a case-by-case basis. Violations may result in restriction or revocation of a patron’s computer and/or other library-use privileges.
Compliance with Applicable Laws Required. Use of computers, network resources, and Internet access in violation of international, federal, state, or local laws or regulations, copyright law, and licensing agreements, including but not limited to the illegal copying of software, is prohibited. Using library computers to copy and distribute copyright protected material may be an infringement on copyright law (Title 17 U.S. Code and amended Digital Millennium Copyright Act). The library reserves the right to deny internet workstation access to library patrons who do not comply with laws and regulations. Patrons are encouraged to immediately report suspected or actual violations to library administration.
Compliance with Other Policies. Patrons must abide by the acceptable use policies of other networks.
Inappropriate Use. Use of library computers and networks in a manner that precludes or significantly hampers its use by others is not allowed.
Equipment Failure. Data circuits and equipment are subject to failure which can cause services to become unavailable. Therefore, no guarantees for constant service are expressed or implied.
Patron Data. Ultimate responsibility for resolution of problems related to the invasion of the patron’s privacy or loss of data rests with the patron. The library assumes no liability for loss or damage to the patron’s data or for any damage or injury arising from invasion of the patron’s privacy.
Downloading Software. Patrons shall not download or copy files to workstation hard drives. Library computers are equipped with software that deletes saved files and programs at the end of every computer session. Downloading to storage media such as USB drives is permitted.
Use of Library Workstations and Networks. Patrons must use workstations as they are provided and may not use personal software or modify the operating system or network configuration.
Patrons Not to Introduce or Attempt to Eradicate Computer Viruses. Patrons may not introduce malicious programs such as viruses, worms, or Trojan horses to Internet stations. If a patron suspects the presence of a virus, they should immediately contact library staff for assistance.
Library Computer Security. Patrons shall not attempt to circumvent library computer security. This includes, but is not limited to, accessing data not intended for the user, logging into a computer account the user is not expressly authorized to access, or attempting to gain access to the library’s servers.
Responsibilities of Users: The user is responsible for correct use of the tools available for maintaining the security of information on each computer system. The following precautions are recommended:
1. Usernames, passwords, and other types of authorization that are assigned to individual patrons should not be shared with others.
2. Files saved on library computing resources may not be totally secure.
3. The patron should be aware of computer viruses and other destructive computer programs and take steps to avoid being a victim or unwitting distributor of these processes.
Misuse: Any misuse which compromises system security is prohibited.
NOTICE OF MONITORING OF INFORMATION AND DATA.
The Billings Public Library reserves the right to examine and delete any data stored on its hard drives.
INF-3.1 Limitations On internet AccessAssistance by Library Staff. Library staff may be available to offer assistance with searching, but cannot monitor or control the materials which may be accessible from the Internet. Those who search are responsible for their own searches, the information found in them, and the use of that information.
Wireless Access. The library may provide free wireless Internet access for users with portable computers or devices capable of receiving wireless signals during the library’s normal hours of operation.
Library staff will provide general information on the settings necessary to access the Internet via these connections, but are not responsible for any changes made to the user’s device settings.
The library’s wireless connection is not secure. Any information sent or received could potentially be intercepted by another wireless user. Cautious wireless users may choose not to transmit their credit card information, passwords, or any other sensitive personal information. Users are encouraged to take appropriate precautions when using this service.
The library will not be responsible for information which is compromised, or for damage caused to hardware, software, or data files due to electric surges, security issues, or consequences caused by viruses or hacking. All wireless access users are encouraged to have up-to-date virus protection on their wireless device.
Use of the library’s wireless internet access is governed by all provisions of the library’s Use of Internet Services policy. Use of the service is understood to mean agreement to comply with all such provisions. All users are expected to use the library’s wireless access in a legal and responsible manner consistent with the purposes for which it is provided.
Headphones are required for listening to any resource with an audio component. Users may purchase headphones from the library or use their own.
A patron must comply with the following guidelines when using the library’s Internet Stations:
Threatening, Harassing or Obscene Data Prohibited. It is not acceptable to use Internet access to transmit or receive threatening, obscene/pornographic, or harassing materials, or to interfere with or disrupt network users, services or equipment. Disruptions include, but are not limited to, propagation of computer worms and viruses, and using the network to make unauthorized entry to any other network resource.
Private Information/Resources. It is not acceptable for an individual to use the Internet to access information or resources unless permission to do so has been granted by the owners or holders of rights to those resources or information.
Inappropriate Use. Use of Internet access and any attached network in a manner that precludes or significantly hampers its use by others is not allowed.
INTERNET FILTERING FOR MINORS
To minimize the risk of minors being exposed to illegal and/or inappropriate images, texts, or other resources on library Internet workstations, children age 17 and under will be restricted to filtered access.