Return to Home Page





Patrons of the Chesaning Public Library originally gained public access to the Internet thanks to an LSCA (Library Services and Construction Act) grant through the White Pine Library Cooperative and the Library of Michigan.  This grant provided a 486 multi-media computer with a Hewlett Packard black and white printer and modem connection.  Also provided were a dedicated telephone line, free dial-in access for library patrons, and the Netscape software needed to access the Internet.  Note:  As of  Summer 1997, the library has a networked connection to the Internet plus an additional 486 personal computer for Internet public access.  Both personal computers are now equipped with Microsoft Internet Explorer instead of Netscape.  On August 24, 2000, the Chesaning Public Library received four public access Gateway computers from the Gates Foundation to be used for the Internet and miscellaneous software programs.


Usage Guidelines for All Users:


  1. Patrons using the public access Internet must have a valid Chesaning Public borrower's card.
  2. Patrons will be encouraged to sign up for computer use in advance of the time they need it.  Sign up will be done in half hour blocks of time.  If at the end of the allotted time there is no one signed up for the computer, the patron may continue to use the Internet.  Patrons are limited to one hour of Internet usage per day unless no one else wants to use it that day.  Reservations to use the Internet will only be held for 15 minutes.  If a patron is over 15 minutes late,

 he forfeits his turn to use the Internet if another patron is waiting.

  1. If more than one person uses an Internet station at the same time, the entire group is allowed a half hour sign up.  Each person is not allowed a half hour each.
  2. Any copies made on the printers cost 10 cents per page.
  3. Staff will assist the library user in getting started on the Internet.  However, the Library cannot guarantee that Internet-trained staff will be available to assist users at all times the Library is open.  Regrettably, staff is not able to offer extensive explanations about the Internet or the personal computer or provide in-depth training.  Time permitting, staff will try to answer specific questions about the Internet and offer suggestions for effective searching.  Staff can also provide information about Internet training opportunities and Internet books and manuals.
  4. The Library cannot guarantee reserved time on the Internet if equipment difficulties are being experienced.
  5. The Library is not able to offer E-mail accounts to library users.  Users will be encouraged to sign up with services as Hot Mail.



Usage Guidelines for Users 18 Years of Age and Over


Consistent with our mission and the professional principles of public librarianship this Internet Use Policy affirms the safeguarding of First Amendment rights, intellectual freedom, equity of access, confidentiality of information about users and their use of all library resources, including electronic, and individual responsibility.  The Library affirms the following principles and user rights as delineated in the American Library Association's Library Bill of Rights in Cyberspace.


Electronic information, services, and networks provided by libraries should be readily, equally, and equitably accessible to all library users.

Libraries and librarians should not deny or limit access to information available

via electronic resources because of controversial content or because of  

            personal beliefs or fear of confrontation.


Information retrieved or utilized electronically should be considered constitutionally protected unless determined otherwise by a court with appropriate jurisdiction.


The Library assumes no responsibility for any damages, direct or indirect, arising from its connections to the Internet.  The Library makes no guarantee, either expressed or implied, with respect to the quality or content of the information available on the Internet.  Not all the information available via the Internet is accurate, current, or complete.  Users are encouraged to be good information consumers by evaluating the validity of information accessed via the Internet.


Users are cautioned that ideas, points of view, and images can be found on the Internet which are controversial, divergent, and/or inflammatory.  The provision of access does not mean or imply that the Library endorses or sanctions the content or point of view of any of the information or commentary which may be found on the Internet.  Because the Internet is a vast and unregulated information network, it also enables access to ideas, information, images, and commentary beyond the confines of the Library's collection, mission, selection criteria, and collection development policies.  Because of this and the fact that access points on the Internet can and do change often, rapidly, and unpredictably, the Library cannot protect individuals from information and images which they might find offensive or disturbing.


Library staff cannot consistently and effectively monitor the public's use of the Internet; yet the Library reserves the right to ask individuals to discontinue the display of information and images which cause disruption.


Users are cautioned that because security in an electronic environment such as the Internet cannot be guaranteed, all transactions, files, and communication are vulnerable to unauthorized access and use and, therefore, should be considered public.


Usage Guidelines for Users Under 18 Years of Age

Effective October 1, 2000, Public Act (PA 212) Michigan requires mandatory filtering of all Internet public access computers used by children under 18 years of age. To comply with this law, the Library has installed the filtering software program, CyberPatrol, on all its public access computers accessible to the Internet. 

As of July 1, 2001, the implementation of the CyberPatrol Software also makes the Chesaning Public Library compliant with the federal legislation known as the Children's Internet Protection Act (CIPA) and the Neighborhood Children's Internet Protection Act (NCIPA).  (Adopted 5-1-2001)



Code of Behavior for All Users


All users of the Internet are expected to use this Library resource in a responsible and courteous manner, consistent with the purposes for which it is provided, and to follow all Internet-related rules, regulations, and procedures established for its use including, but not limited to, those of the Library.  Responsible, courteous use of the Internet includes:


Recognizing that the Internet, like all of the Library's information

resources, must be shared and used in a manner which  respects

the rights of others and refrains from activity that prevents others from 

using it.


Using the Library's Internet resources for educational, informational, 

 and recreational purposes only.


Refraining from using the Library's Internet resources to conduct a

business or commercial enterprise, or engage in commercial activity 

such as the distribution of advertising.


Refraining from illegal or unethical use of the Internet.


Respecting intellectual property rights by making only authorized 

  copies of copyrighted, licensed, or otherwise-controlled 

software or date residing on the Internet

Respecting the privacy of others by not misrepresenting oneself as 

another user; by not attempting to modify or gain access to files, 

passwords or data belonging to others; and by not seeking 

disallowed access to any computer systems via the Internet.


Refraining from damaging or altering the setup of equipment used to

access the Internet at the Library.

Refraining from the altering or damaging software or data residing on 

the Internet.


Refraining from the deliberate propagation of computer worms and



Refraining from the transmission of threatening, harassing, or abusive

language and images.


Violations of the policies and regulations that govern the use of the Library's Internet resources may result in suspension or loss of the privilege to use these resources.  Illegal activity involving the Library's Internet resources will be subject to prosecution by the appropriate authorities.



Adopted 8/5/96

Revised 9/5/2000

Revised 5/1/2001



 Return to Home Page