This policy applies to all library equipment as appropriate. Holmes County Public Library will not provide email accounts. PPLCS and the member libraries shall have no liability for direct, indirect, or consequential damages related to the use of information accessed through the internet service.


ACCEPTABLE INTERNET AND WIFI USE POLICY
The Holmes County Public Library (HCPL) will provide Internet access free of charge to the public HCPL may monitor the unauthorized activities of individual users but has not control over the information accessed through the internet and cannot be held responsible for content.
Individual users must accept responsibility for determining the suitability of content for themselves and their children.
All users of the internet must sign in and out on the computer log and use is limited to one hour if someone is waiting for a computer. Young adults (12-17) must have a signed permission slip for their parent/guardian. Children under the age of 12 must be accompanied by a parent or guardian.
                 Printouts are 20 cents per page. First 10 pages for any school projects are free.
               *Black and White copies only are $.20 per single sided page or $.40 per double-sided page. 
                 Our public printer is black and white only.

ALL USERS MUST SIGN THE ACCEPTABLE USE AGREEMENT

Internet computers may only be used for legal purposes. Users must respect the legal protections to data and software provided by copyright and license laws.

UNACCPTABLE USE INCLUDES BUT IS NOT LIMITED TO THE FOLLOWING:

  • Viewing materials that would be considered obscene by local community standards.
  • Violting copyright or software licenses.
  • Altering, damaging, deleting or modifying the installed hardward, software or programs.
  • Using the computers to attempt unauthorized entry into other computers or networks
  • Disterupting or interfering with other computers, networks, users, services, or equipment.
  • Committing any offense listed in Florida Statute 815ET SEQ.
  • Using the internet to transmit obscene, threatening or harassing materials, or spam.
  • Deliberate propagation of computer worms or viruses.
  • Use of personal software or downloading to the hard drive without prior approval.
  • Illegal or unethical activities.
  • Misrepresenting on self.