About Us

Contact
Email - spl@wsd3.org
- Main Number 719-391-3191
- Circulation Desk 719-391-3196
- Reference Desk 719-391-3195
- Children's Desk 719-391-3197
- Director's Office 719-391-3354
The mission of the Security Public Library is to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library resources and services.
In fulfilling this mission, the library strives to acquire materials, plan programs, and provide services that reflect an understanding and consideration of the community served, with concern given for all ages, backgrounds, interests, abilities, and levels of education.
The Security Public Library is
- an educational support center for all ages,
- a recreational reading center for popular materials,
- and a learning center for adult independent learners.
Hours
- Monday - Thursday 9 a.m. to 7 p.m.
- Friday & Saturday 9 a.m. to 5 p.m.
- Sunday Closed
*Please note, the computers and Children's Room are not accessible 15 minutes prior to closing.
Map
SPL Information
Board of Trustees
Board Meetings
Board meetings are held the 2nd Thursday of every month, except December, at 6:30 pm. In the meeting room at 715 Aspen Drive, Colorado Springs, Co 80911. Please check our website before attending in case of cancellation. Agendas are posted on our homepage.
Board of Trustees
Kelcie O'Donnell, Chair
Shelly Laborde, Vice-Chair
Shannon Carino, Treasurer
Misha Gifford, Secretary
Merrie Ellen O'Donnell
Vincent Ybarra
Donna Walsh, School District Representative
Comments and Suggestions
Friends of the Library
The Friends of the Security Public Library is a nonprofit voluntary group which recognizes that excellence in library service enhances the quality of life in our community. Since 1988, the Friends of the Library have made significant contributions to the steady growth of the library and its services to the community. Friends' activities include two used book sales each year and special library events.
The Friends also sponsored the following library programs:
- Banned Book Week
- NLW Bookmark Contest
- Poetry Contest
- Adult Winter Reading Program
- Summer Reading Programs
- Scary Story Contest
- Book Lovers Month
- Library Card Sign-Up Month
FOL October 2025 Meeting Agenda
Friends of the Security Public Library Board of Directors
FOL Officers:
- Betty Heinsman, President
- Sue Stinson, Vice President
- Theresa Gonzalez,Treasurer
- Jolene Murphy, Secretary
FOL Directors:
- Corrine Haggart
- Ellen Mayo
- Norma Robinson
Library Director
- Susan Garrett
The Friends of the Security Public Library would like to extend you an invitation to support your local library. Besides knowing that they are doing a service for their local library, the Friends receive the monthly calendar, get first choice at the book sales, and can order books through the library at a discounted price. Membership in the Friends is open to everyone.
- Individual $5.00
- Family $15.00
- Lifetime $25.00
- Corporate $50.00
Services Available
- Printing, Copying, Scanning, and Faxing Services (pay as you go)
- Wireless Internet
- Meeting Spaces
- Spring & Fall Used Book Sales
- Library Tours
- Reading Areas
- Computers and laptops for in-library use
- Notary Public (call 719-391-3196 for more information)
- Makerspace
- Bookmobile
Staff
Susan Schmitz-Garrett
Library Director - garretts@wsd3.org
Sarah Anspach
Head of Public Services - anspachs@wsd3.org
Molly Uffelman
Children's Manager - uffelmanm@wsd3.org
Samantha Lacy
Reference Librarian - lacysamantha@wsd3.org
Shannon Garrett
Teen Librarian - garrettshannon@wsd3.org
Grace Miller
Marketing and Outreach Coordinator - millergrace@wsd3.org
Rebecca Sherrow
Notary Public - sherrowrebecca@wsd3.org
Jolene Murphy
Technical Services Manager - murphyj@wsd3.org
Library Policies
- Animals in the Library
- Borrower Registration
- Chromebook Agreement
- Circulation
- Closure and Delay
- Code of Conduct with Children
- Collection Development
- Customer Access to the Children's Room
- Displays and Exhibits
- Donation Guidelines
- Fax
- Mobile Hotspot Lending
- Interlibrary Loan
- Internet Access and Use
- Makerspace
- Meeting Room Application
- Meeting Spaces
- Non-discrimination
- Open Records Requests
- Patron Privacy and Confidentiality
- Patron Responsibilities
- Programming
- Public Bulletin Board and Literature
- Social Media
- Volunteers
- Wireless Policy
- Word Processing and Computer Policy
Animals in the Library
ANIMALS IN LIBRARY
The Security Public Library prohibits bringing a pet (a domestic animal kept for pleasure or companionship) or animal to work or having a pet or animal in the Security Public Library building, with the exception of animals providing medically necessary support for the benefit of individuals with disabilities (service animals) or service animals in training as part of a service animal training program.
Exotic or wild animals are restricted from entering the library although exceptions for special events or programs may be granted.
Animals may never be left unattended on library premises.
This policy applies to all patrons, employees, temporary employees and volunteers of the Security Public Library.
Service Animals
In compliance with the Americans with Disabilities Act (ADA), service animals are welcome in all areas of the library where members of the public are normally allowed to go. This policy also applies to service animal in training.
According to the U.S. Department of Justice, Civil Rights Division, Disability Rights Section, a service animal is an animal that is trained to do work or perform tasks for the purpose of assisting or accommodating a disabled person’s sensory, mental, or physical disability. The task(s) performed by the service animal must be directly related to the person’s disability. Examples of work or tasks provided by a service animal include, but are not limited to, guiding individuals with impaired vision, alerting individuals to an impending seizure or protecting individuals during one, alerting individuals who are hearing impaired to the presence of people or sounds, pulling a wheelchair and fetching dropped items, reminding a person with mental illness to take prescribed medications or calming a person with Post Traumatic Stress Disorder (PTSD) during an anxiety attack.
The provision of emotional support, well-being, or companionship do not constitute work or meet the definition of a service animal under the ADA.
Employees may ask two questions:
1. Is the dog a service animal required because of a disability?
2. What work or task has the dog been trained to perform?
The owner is solely responsible for the supervision and care of the service animal and must maintain full control of the animal at all times. Owners must keep the service animal with them at all times.
Service animals must be harnessed, leashed, or tethered, unless these devices interfere with the service animal’s work or the individual’s disability prevents using these devices. In that case, the individual must maintain control through voice, signal, or other effective controls.
Reasonable behavior is expected from the service animals while at the library. Owners of disruptive or aggressive service animals or service animals that are not housebroken may be asked to leave the library. If this occurs, library staff will give the person with the disability an opportunity to obtain library services without having the service animal on the premises.
Service animals are not permitted on library chairs or other furniture. Owners are responsible for damage caused by their service animals.
Library patrons and staff should not pet, talk to, or otherwise distract service animals while they are working.
Patrons of the library with allergies to or fear of a service animal may request assistance from Library staff to identify a different location to do their work. Allergies and fear of animals are not valid reasons for denying access or refusing service to people with service animals.
ADOPTED: 7/22
Borrower Registration
BORROWER REGISTRATION
The Security Public Library offers free library cards to applicants who complete a library card application and provide photo ID.
Guidelines:
- The library holds borrowers responsible for items checked out on their card. If a borrower’s card or key fob is lost or stolen, and the library is notified, patrons will not be held responsible for items borrowed on his/her card after the notification date.
- A borrower must have a library card, picture i.d., or be able to verify their information to staff’s satisfaction in order to check out materials.
A library card is not required to use the Internet, equipment, and/or materials within the library building.
- A borrower who allows the use of his card by another does so with full knowledge that the responsibility for materials lies with the cardholder. A borrower who is using another patron’s card must have that card in hand, with the patron present (i.e. parent with children), or have been given previous permission by the cardholder to use the card (noted on the patron’s account).
- The borrowing privileges and Internet usage of delinquent patrons are suspended until all overdue materials have been returned. Any patron with a fees over $5.00 will only be allowed to check out physical materials at staff’s discretion. Online lending (i.e. Libby, Hoopla) may be restricted until fees are paid. Borrowers are expected to notify the library of any changes in name or address. Failure to return materials and/or pay fees in excess of $25 will result in the patron's account being sent to a collection agency. An additional $10 will be added to the patron’s account for fees the library has paid to the collection agency. This fee cannot be waived.
- Extended check-out periods are granted to: library staff, WSD#3 faculty, and board of trustees.
Library Cards
- When you fill out your library card registration, you assume responsibility for all materials checked out with your card. The initial card is free. Replacement cards are also free of charge and will be issued with presentation of a valid ID.
- Applicants must present a picture identification and proof of residence, such as a piece of mail that’s been delivered to the address, a printed receipt with their name and address on it, or blank checks with their address printed on them. Proof of residency may also be presented in a digital format, at the discretion of library staff, such as an online bank account or statement with name and address. If patron does not have proof of address, and is a Colorado resident, a card will be issued and mailed to patron as proof of address*.
- The Security Public Library participates in the Colorado Library Card program which allows any Colorado resident borrowing privileges at libraries outside of their home library service area provided they physically visit that library and obtain a library card.
*Limited Use Cards
- Persons with identification and no proof of address may be issued a library card with a “temporary” status. Check-outs will be limited to 2 items at a time, and a time limit restriction may be imposed upon the card. Once proof of address, or the physical library card has been presented, the temporary card will then be converted to a card with full privileges. Access to all e-materials, databases, and in-library computers (excluding laptops) are included with temporary membership.
- If a non-resident (in this case defined as a person with residency outside of the state of Colorado) wishes to obtain a library card, they must present ID and proof of address from their home state. In addition, when applicable, a temporary, in-state address should be given. They will then be issued a library card with “temporary” status. Check-outs will be limited to 2 items at a time, and a time limit restriction may be imposed upon the card. Access to all e-materials, databases, and in-library computers (excluding laptops) are included with temporary membership. No physical library card will be issued to non-residents. They will be given a number to access online accounts and will need to present a photo ID or verify their information in order to check out physical items.
Internet Only Cards
- If patron has no photo ID and no proof of address, or emails the library and requests a library card, they can be issued an Internet Only Card. They will need to provide their name, address, phone number, and an email address. They will have access to library computers and databases only. Once ID and address are provided, the library card can be converted to a card with full privileges.
Minor library cards
Anyone under the age of 18 can receive a library card after completing an application and securing the signature of their parent, legal guardian, or other responsible party.
- The adult applying for a card on behalf of a minor assumes responsibility for all lost and damaged items incurred on the card.
- If the adult is not the parent or legal guardian, they must have a permanent library card issued in their name before applying for a card for a minor child.
- The child may not have more than one card issued in their name. Parental/guardian control of the card takes precedence over non-parental/guardian control.
- If the parent, legal guardian, or other responsible party is not present when the signed application is presented by the minor child, the card will be mailed to the parent, guardian, or other responsible party. Borrowing privileges will be limited to two items (with presentation of ID) until the physical card is presented at the library. Once the library card has been presented, full borrowing privileges will be allowed in the absence of the library card (with ID or verification of information).
ADOPTED: 6/15/91 REVISED: 05/25
Chromebook Agreement
I understand that by borrowing a Chromebook from the Security Public Library (SPL), I am in agreement with the following terms:
Agreement:
I acknowledge that I am responsible for the computer and all accessories. I will reimburse SPL for any damages if the Chromebook, accessories, or any software installed thereon is damaged, lost, or stolen while checked out to me. I must have had my SPL library card for at least 60 days and my account must be in good standing.
Eligibility of the Borrower:
- Borrower must be 18 years of age or older and have a SPL patron card in good standing (no fines/fees on account) and have had a SPL library card for at least 60 days. Borrower must present a photo ID at the circulation desk or library staff to check out a Chromebook.
Borrower must have sufficient knowledge to operate the computer including knowledge of:
- How to start and shut down the computer.
- How to access the Internet and other programs.
Obligations of Borrower:
- I agree that I will not alter any settings or configurations on the Chromebook.
- I understand that the library reserves the right to restrict or terminate my computer use privileges if I misuse or abuse library equipment or do not act in accordance to library policy.
- I will not leave the Chromebook unattended and will keep it safe while it is in my care.
- I understand that SPL will not assume responsibility for lost files due to viruses, hardware failure, and network interruptions.
- I understand that I must save to a removable storage device since any work will not be saved to the Chromebook. I will remove any files I have saved to the Chromebook before returning to the library.
- I understand that not all wireless connections are secure, and I will take appropriate caution with personal information while using the Chromebook.
Liability of Borrower:
- Borrower accepts full responsibility for the Chromebook and accessories.
- Borrower will reimburse SPL for the cost of repairing or replacing this laptop and/or its accessories if they are damaged, lost, or stolen while checked out.
- I understand that when the loan period has elapsed, I must return the Chromebook directly to a staff person. It cannot be left in any exterior book returns.
- I understand that until the Chromebook has been turned in and assessed for operability and inclusion of accessories, the Chromebook will remain my responsibility.
I understand that failure to return the Chromebook will result in a charge of $500.00 plus any additional, associated fees.
Rights of SPL
SPL may refuse to lend a computer for any reasons it deems appropriate, including but not limited to lack of satisfactory ID, prior violations of this contract or of other library policies by borrower.
Circulation
To enrich the informational, educational, and recreational quality of life for Security/Widefield citizens, the Library will provide its users a broad and diverse collection of resources and materials to support its mission. In addition, the Library will allow the use of certain electronic resources, and circulate designated parts of its collections to its users for the continued use of these materials outside of the library.
Use of the library and borrowing of library materials is a confidential matter, and identification of the materials currently showing on a patron’s record will not be shared with others, except as required by law, or parental signature.
SPL offers the use and borrowing of its materials and resources to all holders regardless of age. The library defers supervision and responsibility for a child’s use of the library and selection of library materials to the parent or guardian. In addition, the library will not censor, restrict or cast judgment on the materials borrowed or used.
The Library holds the authority to set loan periods for the use and circulation of library materials and in setting charges for damaged or lost items. Failure to return library materials could result in the suspension of your borrowing privileges. Please report a lost card immediately since you are responsible for all materials charged out on your card until the loss is reported. Patrons who wish to check out items, but do not have library card with them, will be required to show a picture i.d. or verify information to the satisfaction of library staff.
Loan Periods
Special requests for other checkout arrangements must be made with the director's approval.
Patrons may check-out a maximum of 100 items. Borrowing privileges may be reduced or restricted at staff’s discretion.
Books, Books on CDs, and Playaways are available for a three-week checkout period. The cataloging system will automatically renew these items for up to two additional three-week periods unless someone else has reserved them.
DVDs are available for a three-week checkout period. These items may not be renewed. The Security Public Library will not be responsible for any damage or loss suffered by library patrons due to their use of audio or dvd material, including but not limited to, damage to patrons’ machines.
Periodicals are available for a three-week checkout period. The cataloging system will automatically renew these items for up to two additional three-week periods unless someone else has reserved them.
Interlibrary Loan Service may be used to obtain materials that are not available from the Security Public Library/AspenCat Library System. There are no limits as to the number of ILL requests a patron can make, while remaining within the normal hold limits (i.e. 25 DVD holds at one time, 100 book holds at one time, etc.). Interlibrary Loan books are checked out for 4 weeks and will be automatically renewed once. DVDs have a one-week checkout period and no renewals.
Reference books and newspapers are available for use within the library only.
Chromebook laptops are available for three-week checkout. Chromebook laptops may be reserved and will automatically renew for up to two additional three-week periods unless someone else has reserved them. Patrons must be a legal adult, have library card for at least 60 days prior to checkout, and picture id.
Wireless Hotspots may be checked out by patrons 18 years of age with a valid, full-use library card. The initial checkout period is 3 weeks and the cataloging system will automatically renew these items for up to two additional three-week periods unless someone else has reserved them.
Reserved items are held for seven days. A patron will be notified by phone, mail, or email when reserved material becomes available.
Library of Things items can be checked out for 4 weeks at a time, with 2 renewals unless someone else has reserved them. Some items may require the patron checking them out to be 18 years of age.
Electronic Resources are available at the discretion of library and the platform on which they are hosted. Library cards must be in good standing for items to be borrowed or resources utilized. Any patron that has lost, overdue, or damaged items; or that has an expired library card, will not be able to use electronic resources until the issue has been resolved.
Charges for Materials and Services:
Patrons may be required to pay list price for damaged or lost materials. No refunds will be given for payments on lost materials withdrawn from the library’s collection. Replacement copies may be accepted (at the discretion of library staff) as long as the item is an exact replacement of the lost/damaged item. Some examples: hardback books must be replaced by hardback books, non-fiction books must be the same edition or newer, etc. Replacement items must be new and in their original packaging. Used or pre-owned items will not be accepted. No refunds will be given for payments on lost materials withdrawn from the library’s collection.
Collections The services of a collection agency are utilized to assist the library in recovering long overdue materials in order to maintain the integrity of the library's collection and ensure availability of materials to library users.
Definitions:
A collection agency is a company that sends letters, makes phone calls, to library patrons informing them of the consequences of not returning library materials and, if necessary, reports unpaid accounts to the credit bureau.
Accounts that have unpaid bills totaling $25 for a period of 45 days will be referred to a collection agency.
- When the patron's record is tagged for reporting to the collection agency, an additional $10.00 charge will be added to the patron's record.
- The collection agency follows these steps:
- The day the delinquent account is received from the library, the collection agency will mail a letter to the patron.
- Twenty-two days later, a second letter will be mailed.
- Between days 36 and 49, a phone call will be made.
- On day 64, a third letter will be mailed.
- Between days 78-91, a second phone call will be made.
- If the patron has made no effort to settle their account after four months, the delinquent account will be reported to the credit bureaus.
- Once a patron has been referred to the collection agency, all fees must be paid in full before borrowing privileges can be restored. Patron accounts will remain blocked until all money owed has been paid.
- At the discretion of the Head of Public Services, a payment plan may be implemented to pay off a patron's debt. However, the patron must pay at least $10.00 a month toward the resolution of the debt. During the time the patron is regularly making payments the library will arrange for the collection agency to suspend collection activity. A missed payment will result in the account again becoming active with the collection agency.
- If a patron pays their fees after that account has been reported to the collection bureaus, the credit bureau will be updated to show a "paid” status.
ADOPTED: 7/24/91 Revised: 8/25
Closure and Delay
CLOSURES AND DELAYS POLICY
Although Security Public Library (SPL) will make every effort to remain open for business as scheduled, there may be instances where conditions make it difficult to do so. These unexpected closures and delays include, but are not limited to, severe weather, declared state of emergency, utility outages and other facilities issues, disasters, and community emergencies. The ultimate decision to close, or delay, will be made by the Director, or Director’s appointee, in Director’s absence. This does not include expected closures and delays for holidays, trainings, staff meetings, and renovations.
Decision Making for Closures and Delays
- In general, we will close the library when the local school district closes or moves to e-learning day for inclement weather.
- In general, we will open by 10:00 a.m. if local school district has called a two hour delay. Staff are expected to report by 9:45 a.m. in order to prepare library for opening. If employee chooses to not report to work, or report to work after 9:45 a.m., they may use leave time or use leave without pay.
- Director, or Director’s appointee, will make the decision to close or delay opening on Saturday’s and school district holidays due to inclement weather.
- If library opens and weather conditions worsen during the day, the Director, or Director’s appointee, may close the library early.
- In event of non-weather related emergencies, Director or appointee, will make decision to close library, close library early, or delay opening.
Notification
- Director, or appointee, will notify library board of closure or delay.
- Director, or appointee, will notify staff of closure or delay.
- Director, or appointee, will
- Post closure on website
- FlashAlert (for t.v. crawler)
- Put notice on doors if possible.
Compensation
Employees will be paid for their regularly scheduled hours if SPL has delay or closure.
Adopted 4/21
Code of Conduct with Children
CODE OF CONDUCT WITH CHILDREN
The Security Public Library has established this policy in order to protect its patrons from verbal, physical, and sexual abuse; and to protect staff and volunteers who work with them from false accusations.
Do not allow children in staff areas.
Staff shall never leave a child attending a Library program unsupervised during the scheduled time of program. No staff member will be alone with a child.
Staff and volunteers who work with children are required to have background checks.
Staff shall not abuse children or allow children to abuse each other including
- Physical abuse: To strike, spank, shake or slap
- Verbal abuse: To humiliate, degrade, threaten or haze
- Sexual abuse: An inappropriate touch or verbal exchange
- Mental abuse: To shame, withhold love, haze or treat cruelly
Staff must use positive techniques of guidance including redirection, positive reinforcement, and encouragement.
Staff will respond to children with respect and consideration. All children are to be treated equally, regardless of sex, sexual orientation, race, religion, and culture.
Staff will respect children’s rights not to be touched in ways that make them feel uncomfortable and their right to say no. Fist bumps, elbow bumps, and high fives are encouraged as appropriate contact.
Staff will include another member of staff on all electronic (text, email, etc.) communication regarding programming or volunteering.
Profanity, inappropriate jokes, sharing intimate details of one’s personal life, and any kind of harassment is prohibited. It is prohibited to ask youth intimate details about their personal life.
When Staff determine that a child is at risk, vulnerable, or disruptive they will attempt to contact the parent or guardian. In the event that the parent or guardian cannot be reached, the child will be placed in the care of the local police department.
Staff is not to transport children in their own vehicles.
All decisions concerning an unattended child’s safety or behavior are based on Unattended Child Policy.
Adopted 10/22
Collection Development
COLLECTION DEVELOPMENT
Mission Statement
The mission of the Security Public Library is to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library resources and services.
Purpose of the Collection within the Context of the Mission
A library is identified and defined principally by its holdings of materials and information resources. The library acts to fulfill its mission by selecting, acquiring, organizing, preserving, maintaining, deselecting and providing access to a collection of materials and electronic resources that address the interests and needs of the diverse members of its community. The Security Public Library strives to provide a collection that balances viewpoints across a broad spectrum of opinion and subject matter in formats suitable to a variety of learning and recreational interests and skills. The Library Board of Trustees affirms the American Library Association’s Library Bill of Rights, Freedom to View Statement, and Freedom to Read Statement, in support of acquiring and managing collections.
The Security Public Library selects, makes available, and promotes the use of library materials, whatever the format, which:
- Meet the information needs of the community.
- Meet the recreational needs of the community.
- Supplement formal and informal study.
- Reflect a variety of opinions on a subject.
- Support business, cultural, recreational and civic activities in the community.
- Stimulate self-understanding and growth.
- Enhance job-related knowledge and skills.
- Increase knowledge of and participation in the affairs of the community, the country and the world.
Authority and Responsibility for Materials Selection
The authority and responsibility for the selection of library materials is delegated to the library director and, under his or her direction, to the library staff who are qualified for this activity by reason of education, training and experience. The advice of specialists in the community is requested in fields in which staff members do not have sufficient expertise. Suggestions from library users are welcome and are given serious consideration within the general criteria. Final decision for purchase rests with the library.
Gifts and Donations
Accepting gifts and donations is an important way for the public library to benefit from the generosity of the community it serves. Gifts and donations of materials are reviewed using the same criteria as purchases. The library reserves the right to dispose of any gifts that are given to the library. The library will determine how to best incorporate such materials into the existing collections. Materials not added to library collections may be used for programs or given to other local organizations such as schools, senior centers, or Friends of the Library group for their disposition at a future sale. The proceeds from this sale shall accrue directly to the benefit of the library, in a fashion consistent with accepted library policies and services as determined by the Board of Trustees. Any items unsold by the Friends of the Library may then be donated to another organization or discarded.
Memorial gifts of books or money are also accepted with suitable bookplates placed in the book. When the Library receives a cash gift for the purchase of materials, whether as a memorial or for any other purpose, the general nature of subject area of the materials to be purchased will be based upon the wishes of the donor. Selection of specific titles, however, will be made by the library staff in accordance with the needs and selection policy of the Library.
By law, the library is not allowed to appraise the value of donated materials, though it can provide an acknowledgement of receipt of the items if requested by the donor.
Collection Maintenance and Withdrawal
The library continually withdraws items from the collection, basing its decisions on a number of factors, including publishing date, frequency of circulation, community interest, and availability of newer or more valid materials. Items dealing with local history are an exception, as are certain classics and award-winning children's books. Fiction that was once popular but no longer in demand and non-fiction books that are no longer useful are withdrawn from the collection.
Withdrawn books are donated to the Friends of the Library for book sales. The proceeds from such sales are used for the benefit of the library. Books that are not sold will be disposed of at the discretion of the Friends of the Library.
Criteria for Selection
The primary goal of material selection is to provide the best possible collection with the financial resources available. The evaluation of materials is characterized by flexibility, open-mindedness and responsiveness to the changing needs of the residents that Security Public Library serves. Materials are evaluated as a whole and not on the basis of a particular passage or passages.
Collection decisions are made in conjunction with the strategic initiatives, especially the following
- Positioning the library as the preferred partner for lifelong learning
- Embracing diversity
- Developing library services that incorporate both physical and virtual collections
- Committing to an “excellence in service” model to improve effectiveness and remove barriers
Staff contributes to the development of patron-oriented collections by:
- Engaging in open, continuous two-way communication with library patrons and recognizing that individuals have different ways of expressing their needs based on age, language, economic status, culture, or other characteristics
- Interacting with patrons with understanding, respect, and responsiveness
- Handling all requests equitably
- Working in partnership with one another to understand and respond to community needs
- Understanding and responding to rapidly changing demographics, as well as societal and technological changes
- Recognizing that materials of varying complexities and formats are necessary to satisfy diverse needs of library users
- Balancing individual needs and broader community needs in determining the best allocation of collection budget for acquiring or providing access to materials and information
- Seeking continuous improvement through ongoing measurement
- Reviewing the collection on a regular basis to identify areas of community interest that may need to be strengthened
Public libraries are diverse and represent a broad demographic. With a patron base that includes all age groups, from infants to the elderly, selection criteria should take into account the various interests and needs of the patrons the library serves. Criteria for selection of materials should also depend on the goals and mission of that particular library/system. In general, public libraries provide collections containing a wide variety of material formats, including print, audio-visual, and electronic. In selecting materials and developing collections for adults, as well as for children and teens, library staff includes materials that represent the broad range of human experience, reflecting the ethnic, religious, racial, and socio-economic diversity not only of the region it serves but also the larger global perspective. Library collections will provide a broad range of opinions on current issues.
Collections contain popular works, classic works that have withstood the test of time, and other materials of general interest. Works are not excluded or included in the collection based solely on subject matter or on political, religious, or ideological grounds. In building collections, library staff is guided by the principle of selection, rather than censorship. Furthermore, the selection of a given item for a library’s collections should not be interpreted as an endorsement of a particular viewpoint.
To build a collection of merit, materials are evaluated according to one or more of the following standards. An item need not meet all of these criteria in order to be acceptable.
All acquisitions, whether purchased or donated, are considered in terms of the following standards. Clearly, however, an item need not meet all of the criteria to be acceptable. In some instances, materials may be judged primarily on artistic merit, or because of scholarship, or as valuable human documents, or as critical to the information needs of the community. The following general criteria are used:
- Present and potential historical relevance to community needs.
- Suitability of subject, style, and reading level for the intended audience.
- Insight into human and social conditions.
- Importance as a document of the times.
- Appropriateness and effectiveness of medium to content.
- Reputation and/or significance of the author, publisher, or producer.
- Demand for the material.
- Positive critic, reviewer, public, and staff member reviews.
- Relationship to existing materials in the collection on the same subject.
- Within limits of current collection, budget and shelf space.
- Author or illustrator is local.
- Date of publication.
- Availability from preferred vendors.
- Suitability and quality of physical format for library shelving and circulation, including binding, paper quality, readability of type, packaging, specialized equipment needs, and technical quality for electronic media.
Items generally excluded from selection:
- Items having movable or removable media, such as lifts, flaps, patterns, or stickers.
- Textbooks and curriculum-related works unless they are considered useful to the general reader.
- Scholarly and technical materials.
- Puzzle or workbooks that encourage writing in materials.
- Materials that are publicized solely through infomercials or personal websites.
- Material is only available in used format.
Reconsideration Procedures
The library fully endorses the principles documented in the Library Bill of Rights, Freedom to View Statement, and the Freedom to Read Statement of the American Library Association. Materials available in the library present a diversity of viewpoints, enabling citizens to make the informed choices necessary in a democracy. The library also selects a wide variety of library materials that satisfy the diverse interests of our community. The library upholds the right of the individual to secure these resources, even though the content may be controversial, unorthodox, or unacceptable to some. The library’s varied collection is available to all; however, it is not expected that all of the collection will appeal to everyone.
The choice of library materials by users is an individual matter. Responsibility for the reading or viewing of materials by children and adolescents rests with their parents or legal guardians. The library does not stand in loco parentis. While a person may reject materials for himself or herself and for his or her children, he or she cannot exercise censorship to restrict access to the materials by others.
Residents of Security Public Library’s service area (Widefield School District #3 boundaries) who wish to request the withdrawal or reclassification of materials currently owned by the library are encouraged to discuss their concerns with a library supervisor or its director. If the patron is not satisfied with the response to their request, the manager will provide the patron with information and a form to request formal reconsideration of the library resource.
The following steps will be used when an individual feels that further action is necessary to address concerns about a library resource. For the duration of this process, the material in question will remain in circulation in the library collection.
- A concerned resident of Security/Widefield who is dissatisfied with earlier informal discussions will be offered a packet of materials that includes the library’s mission statement, selection policy, reconsideration form, and the Library Bill of Rights.
- Patrons are required to complete and submit a reconsideration form to the library director.
- The director, with appropriate professional staff, will review the reconsideration form and the material in question, to consider whether its selection follows the criteria stated in the collection policy.
- Within 15 business days, the director will make a decision and send a letter to the concerned person who requested the reconsideration, stating the reasons for the decision.
- If the individual is not satisfied with the decision, a written appeal may be submitted within 15 business days to the Board of Trustees.
- The Board of Trustees will discuss the appeal and will notify the individual in writing of their decision.
- The decision of the board is final.
The trustees of Security Public Library have established a Collection Development Policy and a procedure for gathering input about particular items. Completion of this form is the first step in that procedure. If you wish to request reconsideration of a resource, please return the completed form to the library director.
Security Public Library
715 Aspen Drive
Security, CO 80911
Request for Consideration of Library Materials Review
Title__________________________________Producer/Publisher__________________
Author_________________________________Copyright/Pub. date________________
Book (e-book) ___ Movie ___ Magazine ___ Audio Recording ___ Digital Resource ___ Newspaper ___
Other
1. Please state your objections to this material: ________________________________
2. Please quote the offensive passages and provide the page number or list objectionable sections of nonprint media:
3. Have you read or viewed this material in its entirety?
4. Does this material present the information accurately?
5. For what age group would you recommend this work?
6. Do you feel that this work has any value?
7. What would you like the library to do about this material?
a. Do not lend it to my child _____
b. Withdraw it from all readers _____
c. Re-evaluate its selection ______
8. In place of this work, what other work of equal literary quality would you recommend that would convey as valuable a picture and perspective of the subject treated?
The Security Public Library welcomes your interest and support in protecting the public's freedom to read. It is our endeavor to present to this community materials that enriches the quality and diversity of thought and expression.
Name_________________________________Signature__________________________
Date
Address
City State/Zip
Phone Email
Do you represent self?
Or an organization?
Name of Organization:
Revised 3/22
Customer Access to the Children's Room
CUSTOMER ACCESS TO THE CHILDREN’S ROOM
The Children’s area of the Library is specifically designed to serve the needs of our young customers. This space should be a safe space for children to browse the collection and utilize specific services and as such, adult access will be limited as outlined below:
Out of concern for the safety of young patrons, adults who are unaccompanied by a child or children in the children’s area of the library may be questioned by staff, and may be asked to move to another area of the library.
Exceptions are defined below: Teachers, students and adults accompanied by a child in the area and using the children’s materials are allowed to do so. Adults with mental, physical, or emotional problems who need supervision shall be accompanied by a caregiver at all times while using the children’s materials.
Staff will use judgment and utmost courtesy in interviewing adults as to their need to be in a children’s area. Staff may ask for proof of age if deemed necessary.
Adopted 12/09 Revised 7/25
Displays and Exhibits
DISPLAYS AND EXHIBITS
As an educational and cultural institution, the Security Public Library welcomes exhibits and displays of interest, information and enlightenment to the community. Displays of handiwork, historical material, nature study, or any other material deemed of general interest may be exhibited. The director shall accept or reject material offered for display based on its suitability and availability.
The Library assumes no responsibility for the preservation or protection, and no liability for possible damage or theft of any item displayed or exhibited. All items placed in the Library are there at the owner's risk.
Areas available to the public for displays and exhibits are the locked glass exhibit case and the general bulletin board. A release must be signed by the exhibitor before any artifact can be placed in the library. An example of the release follows:
Security Public Library Display and Exhibit Release
I, the undersigned, hereby lend the following works of art or other material to the Security Public Library for exhibit purposes only. In consideration of the privilege of exhibiting them in the Library, I hereby release said Library from responsibility for loss, damage, or destruction while they are in the possession of the Library.
Exhibition to be held in the __________________________________
During___________________________________________________
Description of materials loaned_______________________________
Signature__________________________________Date________________
Address__________________________________Telephone_____________
ADOPTED: 5/9/02 REVIEWED: 10/17
Donation Guidelines
DONATION
Security Public Library is pleased to accept donations of new and used books, music CDs, CD-ROMs, and audiovisual items. Please bring your donations in boxes or bags that can be easily carried. If you have a large amount of materials to donate, please contact library before dropping off. We have a limited amount of space for storage. These donations will be given to our Friends of the Library for ongoing and special book sales. The money the Friends of the Library earn through these sales is given to the Security Public Library to enhance programs and services.
We are not able to quote a value for the items you give us, but upon request the library staff at the Service Desk will give you a receipt for the number of items donated and the date of donation.
Please do not make donations of:
- Items in poor condition – yellow pages, highlighted text, mildew odor
- Encyclopedias older than 5 years
- Magazines
- Condensed books
- Computer books older than 5 years
- Videos, DVDs, or music CDs without cases
From experience we know that people won’t buy these items at the book sales. We understand that it is difficult to throw away items that you have found useful in the past, but they have served their purpose and it is really fine to discard books and other items that are no longer current or useful.
Monetary donations on behalf of the library should be made directly to the Friends of the Security Public Library.
Personal property, real estate, or stock will be accepted when considered to be a desirable addition to the library or profitable. Library retains control of all donated gifts.
Adopted 2/08 Revised 3/21
Fax
FAX
Fax Number is 719-392-7641
Sending:
Cost of sending fax is $.50 per page, up to a maximum of $5.00. No additional charge for long distance faxes. Faxes can only be sent during library open hours and will be done as soon as time allows. If recipient does not receive fax, library will resend fax at no additional cost.
Receiving:
The library will accept documents via fax machine. If the document has a cover sheet with name and phone number the library will try and contact the intended recipient. If no cover sheet is provided it will be kept at the library for three days. Cost of receiving a fax is $.50 per page, up to a maximum of $5.00. Faxes may be received anytime.
The library is NOT responsible for the quality of the fax received or sent including missing pages, bad transmissions, failure to transmit or incomplete information. Patrons are expected to confirm the receipt of the fax by the other party.
Adopted 4/05 Revised 11/25
Mobile Hotspot Lending
MOBILE HOTSPOT LENDING
The Security Public Library has established a Wi-Fi hotspot lending program to provide patrons in our community with high-speed internet access. With this program, students can use the Internet for help with homework and projects, employees can travel with reliable internet access to meetings and presentations, and patrons can have home access to the library’s digital resources such as our databases, eBooks, streaming music and movies. Patrons will be able to take advantage of our Wi-Fi hotspot lending program with a Security Public Library card in good standing.
- Hotspot devices are available to Security Public Library card holders, over 18 years of age, with a valid Driver’s License.
- Hotspot devices are loaned for 21 days with one renewal if there are no holds.
- Only one hotspot device per household.
- Hotspot devices MUST be returned to Security Public Library, in person at the Service Desk, NOT in the book drop.
- Overdue hotspot devices will be deactivated within twenty-four (24) hours of the due date.
- Users who repeatedly return hotspot devices late three (3) times or more will lose borrowing privileges for six months.
- Internet service relies on cell tower technology and coverage and user experience can vary based on location. Service is only available in United States.
- The Security Public Library is not responsible for personal information shared over the internet or for information and websites accessed.
- Library patrons will need to provide their own Wi-Fi enabled equipment. The library staff cannot troubleshoot problems related to the patron’s hardware, software or configurations. Library staff is not permitted to handle patrons’ laptops, tablets, smart phones or other personal devices. Please note that the Library cannot guarantee a particular device will work with the Library’s mobile hotspot.
- Parents/guardians are responsible for the use of hotspot devices by minors.
- Unlawful use of the Internet or use that violates the Security Public Library’s Internet Use Policy is prohibited and will result in the loss of privileges
- Hotspot devices should be kept in a temperature-controlled environment; DO NOT leave it in your car or in direct sunlight.
FINES AND FEES
- The user will be responsible for any lost or damaged hotspot devices and accessories.
- There are no overdue fines for late hotspot devices. Overdue hotspot devices will be deactivated within 24 hours of the due date and hotspot devices not returned within 28 days of the due date will be considered lost and the patron will be charged the full replacement cost of the hotspot and accessories.
- The replacement cost for a hotspot device is $300.00.
- The replacement cost for a lost charger is $25.00.
- The replacement cost for a lost case is $25.00.
Adopted 01/21
Interlibrary Loan
INTERLIBRARY LOAN - REQUEST
Interlibrary loan is a transaction by which a library can borrow library materials that it doesn't have in its own collection. This service allows Security Public Library to provide access to more materials and information than is available within in its own collection. Other libraries are also able to borrow materials from this library that are not part of their collection.
Books, magazine articles, materials and information unavailable at our library may be borrowed through Interlibrary Loan (ILL).
- Items that have holds on them, reference items, and entire issues of magazines are not available through ILL.
- In order to request a single magazine article, include the title of the article, the author, name of the publication, date, volume number, and page. The library patron is responsible for compliance with U.S. Copyright Law, Title 17, U.S. Code.
- Delivery of ILL items can take from one to six weeks depending on the location of the item, its availability at the lending library, and the lending library’s response time. We can guarantee neither the delivery date, nor the actual delivery of requests to patrons.
- There are no limits as to the number of ILL requests a patron can make, while remaining within the normal hold limits (i.e. 25 DVD holds at one time, 100 book holds at one time, etc.).
- ILL materials must be returned to the Security Public Library. Do not return them to the original lending library.
- ILL items are not automatically renewed, but patrons may request renewals on eligible items from library staff. If the item cannot be renewed, it may be requested again, after it has been returned to the Security Public Library.
- Patrons will be notified by phone call, postcard, email, or text when their materials are received. The items must be picked up within seven days or they will be returned to the lending library.
- Items borrowed through SWIFT/Prospector will be checked out to patrons for three weeks. Media materials (CDs and DVDs) will be checked out to patrons for one week, with no option to renew.
- Digital ILL materials will be emailed to patrons with the included files or access information received from Prospector libraries.
- Patrons will be notified by postcard, email, phone call, or in person if their ILL cannot be filled.
- Patrons will be required to pay list price for damaged or lost materials, or provide a new replacement copy of equal value. SPL will purchase a replacement item, or send the one provided, to lending libraries, as no money is exchanged between Prospector libraries.
- We encourage residents from area library districts to contact their home libraries for their Interlibrary Loan needs.
INTERLIBRARY LOAN - LENDING
Interlibrary Loan of Security Public Library (SPL) materials to other libraries.
- SPL will lend books, DVDs, and audio materials for four weeks.
- SPL will accept ILL requests by fax, phone, email, or through SWIFT/Prospector.
- There are no limits as to the number of requests a borrowing library can make.
- Fines will not be charged to other libraries.
- No money is exchanged between libraries for lost or damaged items, but SPL will accept replacement copies from Prospector libraries.
- Materials can be renewed if borrowing library contacts SPL and arrangements are made.
- Reference materials will not be lent.
Adopted 3/93 Revised 9/24
Internet Access and Use
INTERNET ACCESS AND USE
I. Mission Statement for Internet Access
Internet access at Security Public Library is an extension of the library’s commitment to meeting the community’s information needs. In addition to using the Internet as an information resource, the library also seeks to provide the opportunity for Internet use, with limitations, to members of the public. The Security Public Library endeavors to develop collections, resources, and services that meet the cultural, informational, recreational, and educational needs of our diverse community. It is within this context that SPL offers access to the Internet.
II. Acceptable Use
The Security Public Library does not monitor, nor has control over, information accessed through the Internet and cannot be held responsible for its content. The Internet is a worldwide community with a highly diverse user population and it is your responsibility to use this resource wisely.
As with all library materials, the Library affirms the right and responsibility of parents/guardians, not library staff, to determine and monitor their children's (under 17 years old) use of the Internet. Library staff is willing to work in partnership with parents/guardians to help guide children in the safe use of the Internet. Because we cannot control all aspects of this vast resource, we urge parents to continually participate in their children's learning process by helping them make good choices in selecting appropriate materials and websites.
Parents/guardians are ultimately responsible for instructing their children about safe Internet use, including, but not limited to, not giving out personal information online, what to do if they encounter an inappropriate site, or information and how to locate and use safe sites. Security Public Library staff are available to direct parents/guardians and their children to resources and information about safe Internet use.
The Internet workstation must be used in a responsible manner, respecting the rights of others, and taking care with use of the equipment. Computer and Internet settings may not be changed.
The workstations cannot be used for any fraudulent or unlawful purpose, including any activities prohibited under any applicable federal, Colorado, or local laws.
Please be aware that much of the material on the Internet and the World Wide Web is copyrighted. It is your responsibility to be aware of the display of any notices concerning the copyright of information on the Web and to respect the copyright laws of the United States.
Internet access is filtered on all Security Public Library public computers to block access to obscene and sexually explicit materials by comparing access requests to a list of specifically
prohibited sites. The Library does not assume any responsibility for the accuracy of its Internet filters.
III. Unacceptable Uses of Computers
Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:
1. Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use, any substance where the possession or use of is prohibited by law; viewing, transmitting or downloading pornographic materials, accessing or downloading information deemed inappropriate for public viewing, or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.
2. Uses that cause harm to others or damage to their property. Engaging in defamation (harming another's reputation by lies); uploading a worm, virus, "trojan horse," "time bomb", or other harmful forms of programming or vandalism; participating in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems.
3. Uses that jeopardize the security of access of the computer network or other networks on the Internet. Disclosing or sharing the user's password with others; impersonating another user; using one's own software programs on the library's computers; altering the library's computer settings; damaging or modifying computer equipment or software.
4. Uses that compromise the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communication. Giving others private information about one's self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has "met" on the computer network or Internet without a parent's permission.
5. Uses that Violate Confidentiality of Information: Personally identifiable information about users, including minors, will not be disclosed or used in any way, except to law enforcement authorities as provided in the law. Users should be aware, however, that due to the technical difficulties involved in providing absolute security, transactions and files could become public.
Response to Violations
The user's access to the library’s computer network and Internet is a privilege, not a right. A user violates this policy by his or her own action or by failing to report any violations by other users that come to the attention of the user. Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user's right to access these computers.
Guidelines for Public Internet Use
- Internet computers are available on a first-come, first-served, basis.
- Patrons may log on to an adult Internet computer with their own library card number. Patrons are given one hour sessions. An extension may be granted if there are no patrons waiting to use the computers.
- Guest passes are available for patrons without a library card. The session length for guest passes is one hour. An extension or additional guest passes may be granted if there are no other patrons waiting to use the computers, and at staff’s discretion.
- Patrons who owe more than $5.00 in fees will be blocked from using the computer. One guest pass may be issued if the amount is under $20.00 or if the patron is making payments and/or returning items.
- Users may not install software on any Security Public Library computer.
- USB drives may be purchased at the service desk for $2.00 or borrowed from Library staff and returned before leaving.
- There is a fee of ten cents ($.10) per page for black and white printing (the first 10 pages every day are free of charge); twenty-five cents ($.25) per page for color printing (no free pages).
- Computer workstations are designed for use by one patron at a time, maximum of two patrons with staff approval.
- Basic assistance for the Internet may be available, as time permits. A variety of books on the Internet are available for check out. The library also offers programs to provide assistance on computer/technology use.
- Users are responsible for logging-out of all accounts; deleting their own search history, downloads, saved files, etc.; and removing any other personal information from the Internet and library computers.
- The Library is not responsible for breaches in personal security due to use of our computers and/or the Internet.
- Internet access may occasionally be unavailable due to technical problems.
- All Internet workstations will be turned off 15 minutes before closing.
- Library staff is authorized to take prompt and appropriate action to prohibit use by those who fail to comply with the Library’s Internet Access and Use policy.
IV. Wireless Network
Patrons may use their own computers to access the Internet through the library’s wireless network or through an Ethernet port provided by the library. Users are subject to the same rules as users of the library computers. We ask that users turn off the sound, or use headphones, while using their personal computers in the library. Patrons who use their own computers are solely responsible for the consequences of their use.
The library merely provides access to the Internet and is not responsible for any loss or
damage that may result to a user’s computer or files as a result of that use. The library’s wireless network is not secure unless you are connected to a secure, encrypted website. Guard your personal information.
V. Internet and children
Parents and guardians are responsible for monitoring Internet access for their children who are minors. Any additional restrictions placed on a child's access to the Internet on the library's network is the responsibility of the parent or legal guardian.
VI. Internet Filters
The library Internet is filtered. As such, some sites, even though benign, may be blocked due to these filters. We can submit a request to have sites unblocked, but we may not be able to gain access to these sites.
Adopted: 6/15/91 Revised 3/25
Makerspace
MAKERSPACE POLICY
The mission of the Security Public Library is to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library resources and services. The Makerspace extends those commitments into “the world of making” by providing access to a wide variety of equipment and tools during open lab hours, and by offering classes and programs for guided exploration.
BASICS
Use of the equipment and tools in the Makerspace is available at no charge to community members with a valid library card, generally on a first come, first served basis. Specific tools or equipment may be reserved for projects at the discretion of staff.
- During classes or programs, individuals may not use other tools and equipment without prior authorization by staff.
- The Makerspace may be used only for lawful purposes. The public is prohibited from using tools or equipment to create material that is:
- Prohibited by local, state, or federal law.
- Unsafe, harmful, dangerous, or poses an immediate threat to the well-being of others.
- Obscene or otherwise inappropriate for the Library environment.
- In violation of another’s intellectual property rights.
- The Library reserves the right to halt, delete, or disallow the creation of items that violate Library policies, copyright (Title 17, United States Code) and patent law (Title 35, United States Code).
- The Library is not responsible for any manufacturing defects or the quality of workmanship of any of the tools, materials or equipment supplied by the Library, nor is it responsible for loss or damage to personal property or files.
- The Library reserves the right to disallow project elements and patron-supplied materials or tools from the Makerspace.
- The Library reserves the right to change fees and the cost of materials at any time.
USERS
All Makerspace users must sign a waiver and terms of use agreement document before any Makerspace equipment or resources may be used.
- For Makerspace patrons aged 17 and under, parents must sign a youth waiver.
- Patrons aged 15 and under may use the Makerspace if supervised by an adult certified in the use of any equipment used.
- Children under the age of 2 are not permitted in the Makerspace without supervision.
- The Library reserves the right to deny Makerspace access if a patron violates any part of the Makerspace policy, or for any other misuse of the space, as determined by Library staff.
CERTIFICATION
Patrons must participate in mandatory safety and use trainings in order to use specific tools and machinery. Patrons may not use these tools until certified, as confirmed by Library staff. The user’s library card will reflect the type of certification training received.
- When using equipment or a tool that does not require training, the patron agrees that they are capable of using that item in a safe and appropriate manner.
FEES
- Users (or if minors, their parents/guardians) are responsible for loss or damage to Library property, not associated with normal wear and tear, that is the result of inappropriate or unauthorized use of tools, equipment, or consumable materials, or for clean-up of the tools, equipment, or the space. Costs may be charged to a patron’s library account. The patron will be unable to use the Makerspace (and possibly their library card) until all fees are paid.
The Library reserves the right to schedule the Makerspace for other uses including community and library meetings when Makerspace activities are not scheduled.
Adopted 6/24
Meeting Room Application
Security Public Library
Meeting Room Application
Meeting room is available:
Monday-Thursday, 9:30 am to 6:45 pm
Friday and Saturday, 9:30 am to 4:45 pm
Date of Reservation:
Time: Begin End
Name of Registrant:
Address:
Phone Number: Library Card Number:
Name of Organization:
Address of Organization:
Expected Number of Attendees:
Purpose and brief outline of meeting:
I have read the Security Public Library Meeting Room Policy and I agree to abide by its rules and regulations and to be responsible for damages to the Library equipment, furniture and/or facilities during my scheduled use of the room.
Registrant’s signature:
Date:
Received and scheduled by library staff member:
Meeting Spaces
MEETING SPACES
In keeping with the Library's mission and strategic initiatives to create welcoming spaces that serve as public commons, and to encourage civic engagement by offering people opportunities to connect and interact, the Security Public Library meeting spaces are available for use by nonprofits and community groups for informational, educational, or cultural meetings and programs when not needed for Library purposes. The meeting spaces are available at no cost. Use of the Library’s meeting spaces does not imply endorsement by the Library staff or Trustees of the viewpoints presented.
First priority in scheduling the use of the meeting spaces are reserved for Library programs and services.
REGISTERING
One member of each group must be a registered Security Public Library user and present their library card at the Circulation Desk. This person is the “responsible user”. Use of the meeting room is scheduled through the Library’s online meeting space reservation system (LibCal).
MEETING SPACE GUIDELINES
The Security Public Library reserves the right to deny the use of the meeting space if, at any time, the conduct of the group or any member of the group is disruptive or destructive, or if information is falsified on the meeting space reservation form.
The meeting spaces are available on a first-come, first-served basis. Spaces cannot be booked more than two months in advance unless pre-approved by staff.
The meeting spaces may be scheduled for up to three hours per group, with a maximum of two bookings total per month. Additional time and bookings may be added at the discretion of the Library. Occupancy limits are as follows:
- Meeting Room – Up to 20 people
- Program Room – Up to 50 people
- Testing Center/Quiet Study Space – Up to 10 people
When not in use as a Testing Center, the space may be used as a quiet meeting space, or for informal, quiet study at the discretion of Library staff.
The meeting spaces are available during the Library’s normal hours of operation for no charge. Users must vacate the meeting room 15 minutes prior to closing and must vacate the room completely by the end of their allotted session.
Due to demand for the spaces, any registered user who fails to show for two scheduled bookings without advising Library staff in advance will no longer be able to book any of the meeting spaces.
The room will be booked only to adults unless otherwise approved by Library staff. Parents and/or legal guardians will be notified before use of the space is granted, and they will have to confirm either verbally or in writing that they take responsibility for any misuse of the space.
Wireless internet access, Smart T.V., projectors, and a Smart Board, are available upon request. Groups will need to bring their own laptops or check one out on their personal library card.
Materials are not to be attached to walls, windows, doors, or furnishings except at the direction of authorized staff.
The room must be left in a clean and neat condition. The responsible user will be held financially responsible for any damage to the meeting room, equipment, or furniture. Failure to leave the room in proper condition will result in the registered user no longer being able to book any of the meeting spaces in the future.
The Security Public Library is not responsible for materials or equipment left in the meeting room by users.
Light refreshments are permitted, provided that food and drink remain in the meeting space. In select spaces, a Keurig coffee machine may be available. It is understood that the use of this machine is not complimentary and each cup will cost 50¢; payable in the box by the Keurig machine or at the front desk of the Library.
Meeting space assignment is at the discretion of the Library staff. Library programming has priority use of meeting spaces.
Commercial enterprises may use the spaces to present informational programs, but may not sell products or services in the Library.
All meetings must be free.
Meeting spaces may not be used for activities that are likely to disturb regular Library functions. The Library expects organizations to be considerate of Library users and activities. The Library reserves the right to deny space to meetings that are likely to become disruptive to normal Library operations. Some examples of prohibited uses are:
- Any activity which contravenes Federal, State, or local law, or relevant regulations, including health, safety and fire regulations.
- Any activity which may disrupt the neighborhood.
- Political activity that does not stay within the confines of the space that has been reserved; including the advocacy of political positions and campaigning for a political candidate.
- Religious observances.
The Library does not endorse the goals, beliefs or policies of groups or individuals using the meeting spaces.
The responsible user must tell the Circulation Desk staff when they are leaving.
Adopted: 2/11/10 Revised 04/24
Non-discrimination
NON-DISCRIMINATION POLICY
Security Public Library (SPL) complies fully with the Colorado Civil Rights Act (Colorado Revised Statutes §§ 24-34-301 et seq.), the Colorado Library Law (C.R.S. §§ 24-90-101 et seq.), and applicable federal laws prohibiting discrimination in employment and places of public accommodation, including but not limited to the Americans with Disabilities Act, the Age Discrimination in Employment Act, and Title VII of the United States Civil Rights Act of 1964.
SPL provides for and ensures that all individuals and groups have full and equal access to library information, programs, services, facilities, privileges, advantages, and accommodations. SPL does not discriminate, directly or indirectly, on the basis of age 40 and over, race (including traits historically associated with race, such as hair texture and length, protective hairstyles), sex, sexual orientation, gender identity, gender expression, color, religion, national origin, disability, military status, genetic information, or any other status protected by applicable state or local law.
A qualified individual with a disability has the right to be accompanied by a service animal individually trained for that individual when visiting SPL, as provided in C.R.S. § 24-34-803.
SPL is dedicated to the principles of equal employment opportunity. We prohibit unlawful discrimination against applicants or employees on the basis of age 40 and over, race (including traits historically associated with race, such as hair texture and length, protective hairstyles), sex, sexual orientation, gender identity, gender expression, color, religion, national origin, disability, military status, genetic information, or any other status protected by applicable state or local law.
It is SPL’s intention that all qualified applicants are given equal opportunity and that selection decisions are based on job-related factors. SPL will abide by the provisions of C.R.S. § 24-34-803 with respect to any employee accompanied by a service animal.
SPL will not discriminate against any individual or group because the individual or group has opposed any practice which is made a discriminatory practice by Colorado or federal anti-discrimination laws or filed a complaint or charge of discrimination, or testifies, assists, or participates in any manner in any investigation, proceeding, or hearing relating to an alleged act of discrimination.
Adopted 10/24
Open Records Requests
Patron Privacy and Confidentiality
PATRON PRIVACY AND CONFIDENTIALITY
The Security Public Library (SPL) maintains that patron records and other information that identifies a person as having used the library are confidential under provisions of the Colorado Library Law (Colorado Revised Statutes 24-90-119). Security Public Library staff shall consider use of the library, questions asked, materials borrowed, use of databases and Internet, attendance at programs, and presence of the patron in the library, as being protected by this law. The privacy protections afforded to this information extend to all patrons, regardless of age, gender, race, religion, sexual orientation, gender identity, national origin, immigration status, residential situation, or fugitive status as long as they are not in violation of SPL’s Patron Responsibilities and Conduct Policy. In accordance with library law, privacy of library records is protected as follows:
- Except as set forth in subsection (2) of this section, a publicly-supported library or library system shall not disclose any record or other information which identifies a person as having requested or obtained specific materials or service or as otherwise having used the library.
- Records may be disclosed in the following instances:
- When necessary for the reasonable operation of the library;
- Upon written consent of the user;
- Pursuant to subpoena, upon court order, or where otherwise required by law;
- To a custodial parent or legal guardian who has access to a minor’s library card or its authorization number for the purpose of accessing by electronic means library records of the minor.
- Any library official, employee, or volunteer who discloses information in violation of this section commits a class 2 petty offense and, upon conviction thereof, shall be punished by a fine of not more than three hundred dollars.
- A written request for reconsideration of a library resource made at a public library pursuant to section 24-90-122 (3) is not a library user record as described in subsection (1) of this section.
The Security Public Library does not create unnecessary records and only retains information needed. Although the Library must keep information on such items as overdue and lost materials, outstanding fees, and payments of patron accounts, these records are kept secure and are purged from the Library’s computer system when no longer needed for library business purposes. Paper records containing personal information such as names, addresses, and phone numbers, are shredded once added to the computer system. Only library staff shall have access to personal data stored by the Library.
Security Public Library enters into agreements with third-parties to provide online services. SPL makes reasonable efforts to ensure that SPL’s agreements with third-parties reflect the policies and legal obligations concerning patron privacy and confidentiality.
SPL encourages patrons to review the privacy policies of all third-party providers. This policy does not apply to external applications or websites that may be accessed from SPL’s computers, devices, or wireless network. Patrons are cautioned that any electronic communication utilizing Internet or a wireless network may be intercepted.
Patrons may conduct only legal activity while using SPL resources and services. Nothing in this policy protects SPL from exercising its right to enforce its Patron Responsibility and Conduct Policy; protect its patrons, staff, facilities, network, and equipment from harm; or prevent use of SPL facilities and equipment for illegal purposes. SPL reserves the right to access the computer activity of patrons when a violation of law or SPL policy is suspected. Staff is authorized to take immediate action to protect the security of patrons, staff, facilities, computers, and network. This includes contacting law enforcement authorities and providing information that may identify the individual(s) suspected of a violation.
Guidelines for access to patron information:
- Staff members cannot reveal patron information to anyone other than the registered patron unless the registered patron has given prior permission to release it to certain individuals. This includes, but is not limited to, information on what titles have been checked out or what fees are owed.
- Staff do not page patrons. Staff may take a message if somebody wants to contact them and, if they see the patron, they will give them the message.
- Patron records, including items checked out, on hold, overdue and fees owed, are available online through My Account in the library catalog at www.securitypubliclibrary.org. The library card number and PIN (last four digits of phone number) are required to access this information.
- A parent or guardian of a child may be provided information by library staff of checked out materials if the primary purpose is to pay fees or recover missing materials. The parent or guardian must present the child’s library card or name and birth date. The parent or guardian may be required to verify address and phone number and present current picture identification.
- If SPL staff (Supervisor if possible) ascertain that a patron is an imminent danger, to themselves or others, OR, if their behavior is disruptive to the library, they may contact the police or authorities. Staff may then disclose to the authorities information on the patrons presence and actions in the library. Staff are prohibited from disclosing information related to patron’s account or use of specific resources of the library.
- SPL staff will refer any public records requests and law enforcement inquiries to the Director or Supervisor. The Director or Supervisor may confer with legal counsel before determining the proper response to any requests of records.
Adopted 12/08/05 Revised 7/2025
Patron Responsibilities
PATRON RESPONSIBILITIES AND CONDUCT
The Security Public Library (SPL) strives to maintain a safe and comfortable environment for all our patrons. The Library supports free and equal access to Library services while reserving the right to enforce reasonable rules and guidelines. The Library reserves the right to remove any person whose behavior is disruptive, inappropriate for a library environment, or interferes with the use of the library by others. The library is authorized to call upon other agencies (police, fire department, etc.) in order to protect people and property.
Patron Responsibilities and Conduct
It is a patron's responsibility to maintain necessary and proper standards of behavior in order to protect their individual rights and the rights and privileges of other patrons. Patrons should be engaged in activities associated with the use of a public library while in the building. Patrons who fail to observe the Security Public Library Patron Responsibilities and Conduct Policy may be asked to leave the library building and grounds, be banned from the Library for a period of time, be subject to arrest, or be subject to other lawful action. Some protections granted under SPL’s Patron Privacy and Confidentiality Policy may be revoked if a person is found in violation of the Patron Responsibilities and Conduct Policy.
The Security Public Library prohibits any activity or condition that unreasonably interferes with Library user or staff comfort, safety, or use of the Library, including but not limited to:
- Any violation of federal, state or local laws within the Library.
- Guns or other weapons (except for law enforcement).
- Verbally, physically, or sexually harassing Library users or staff.
- Interfering with staff in performance of their duties.
- Making any loud or unreasonable noise or other disturbance such as running, throwing objects, fighting, abusive language, or talking loudly.
- Disruptive use of personal communications or entertainment devices, such as cell phones, head phones, radios, and computers.
- Offensive body odor due to poor personal hygiene, overpowering perfume, or cologne.
- Excessive public displays of affection; sexual misconduct.
- Using, possessing, or being under the influence of alcoholic beverages or illegal drugs.
- Animals, except for those identified as “Service Animals”.
- Smoking, use of tobacco products or use of electronic smoking devices.
- Loitering, soliciting.
- Sleeping, bathing.
- Damaging or improperly removing Library materials, equipment, or furniture.
- Blocking any library entrance, exit, aisle, or path.
- Eating and drinking, unless approved by library personnel.
- Bikes, skateboards, roller blades/skates and scooters.
- Appropriate clothes, including shirt and shoes, are required.
- Entering staff areas without permission.
- Use of the computers and Internet to engage in illegal activity. Viewing information or images that is offensive to library patrons and staff.
Young children:
The Security Public Library encourages visits by young children and it is our desire to make this important visit both memorable and enjoyable for children. Library staff is not expected to assume responsibility for the care of unsupervised children in the library.
The Board’s policy affirms that the library staff does not take the place of the parent, act as caregiver or baby-sitter, nor assume responsibility for children.
Therefore, it is library policy that all children under the age of eight must be accompanied by a parent or designated responsible person, while in the library. Also, if the young child is attending a library program, we require the parent/responsible person to remain with the child throughout the program.
Disruptive children:
Children of all ages are encouraged to use the library for homework, recreational reading, and program attendance. The library staff realizes that the library will be noisier at busy times and that children by nature can cause more commotion. However, children (whether with parents or not) who are being continually disruptive may be given a warning that they must settle down or will be asked to leave the library. If after a second warning the child continues to be disruptive, they will be asked to leave the library. Depending on the type of disruption, staff may forego the initial warning and ask the child to leave the library immediately. If the child needs to contact a parent, they may do so and then wait with a staff person until the parent arrives.
Our staff is comprised of good-natured library professionals who strive to provide excellent library service to every patron. We want the time you spend with us to be productive, pleasant, and worthwhile. In order to accomplish this, we need your cooperation. Those responsible for children should know:
- If a child is disruptive, ill, or injured, staff will ask the parent/guardian, if in the building, to properly supervise their child.
- Staff will try to phone the parent/guardian, if absent from the building, to have them remove their child from the library.
- If the parent/guardian is not located, a staff member may contact the El Paso County Sheriffs Department.
REVISED 12/20 and 7/25
Programming
PROGRAMMING
Mission Statement
The mission of the Security Public Library (SPL) is to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library resources and services.
The Security Public Library supports free and open access to information and ideas as stated in the Library Bill of Rights and the Freedom to View policies of the American Library Association. SPL’s philosophy of open access to information extends to library programming. This policy guides staff decisions regarding development and selection of library program to ensure programs are engaging, relevant, current, and integral to the diverse communities SPL serves. Programs will be considered by the criteria listed below and will not be excluded solely on the grounds that some may consider them to be controversial in nature and/or that they do not align with their particular beliefs or values. Library programs or presentations do not constitute an endorsement of the content of the program or the views expressed by participants.
SPL supports free and open access to information and ideas as stated in the Library Bill of Rights and the Freedom to View policies of the American Library Association.
Criteria for Program Continuation, Selection, and Design
The following criteria are used in making decisions about program topics:
- Consistent with SPL mission, goals, and objectives
- Interest and need of library patrons and community
- Availability of staff, space, budget, and other resources
- Relevance to the needs and interests of the community.
- Current demand based on program attendance.
- Presentation quality.
- Presenter background and qualifications in content area.
- Historical, cultural or educational significance.
- Availability elsewhere.
- Provides a forum for sharing of different perspectives.
- Safety and security of patrons and staff.
- Continuous evaluation to maintain programming vitality and usefulness to the community.
Ultimate responsibility for library programming rests with the Director, who administers under the authority of the Board of Trustees. The Director, in turn, delegates program management to library managers.
Programming Guidelines
SPL draws upon community resources in developing programs and actively works with other community agencies, organizations, educational and cultural institutions and individuals to develop and present programs. Additionally, SPL may hire local, regional or national professional talent to share their expertise.
Security Public Library does not offer programs of a commercial nature with the intention of soliciting future business. Presenters from businesses may be included in SPL programming if their information is of a general interest and they are not actively trying to sell their product or service before, during, or after the program. SPL may permit the sale of books written by presenters or performers in conjunction with SPL sponsored programs. Approval of any plans to sell such items must be granted in advance.
Security Public Library does not offer programs that support or oppose any political candidate, ballot measure, or specific religious belief. However, SPL may offer educational or entertaining programs that are general in nature and/or open to all official candidates.
SPL does not offer programs that support or oppose a specific religion. Programs may address religious themes to educate or inform, but will not promote or proselytize a particular religious conviction.
Medical, legal, financial, and tax-related programs hosted by SPL will be general in nature and SPL is not responsible for any loss or damage that is incurred as a result of the advice, service, or information given at these types of programs.
Programs may be canceled due to weather, low registration, or absence of the presenter.
Programs are generally free and open to the public, however select programs may require attendees to pay a fee to offset costs.
Programs may be limited to age-specific audience and the library may limit attendance based on program scope or space.
Responsibility for the exposure of minors to library programs rests with their parents or legal guardians.
Presenters
SPL will not exclude performers and presenters from consideration solely because of their origin, background, or views, or because of possible controversy.
Security Public Library may require a contract with program presenters. SPL reserves the right to cancel agreements at any time and for any reason.
It is the responsibility of the performer or presenter using music, movies or other copyrighted materials in library programs to obtain permission from the copyright holder prior to the presentation.
Security Public Library or presenters may require program attendees to sign a waiver form to participate in programs.
Non-Library Programs and Events
Library card holders in good standing can reserve meeting room for the purpose of presenting their own program. These types of programs are not sponsored or endorsed by SPL and therefore the library cannot be held liable for any part of the presentation, presenter or attendees. SPL will not advertise for events that are on sponsored/endorsed by the library.
Reconsideration of Library Programs
Security Public Library fully supports and believes in the freedom of information for all. However, community members have the right to challenge SPL to reconsider library programs. All requests to reconsider a program must be made in writing using SPL’s reconsideration form which is available at the library and online. The program in question will not be canceled during the reconsideration process.
ADOPTED 5/22 REVISED 11/24
Public Bulletin Board and Literature
PUBLIC BULLETIN BOARD AND LITERATURE RACK
Purpose
The Library provides space on its public bulletin board (lobby window) for announcements and notices of local community events, and in its literature display racks for distribution of free materials which may be of interest to library patrons. Both of these services are in keeping with the Library's overall philosophy of providing access to a wide range of information sources.
Policy
- All notices, posters, and free literature must be approved and placed on the bulletin board or in the display racks by library staff. Staff may discard items not approved for placement, materials with expired dates, and excess copies of any items received.
- Staff will follow publicly posted guidelines in making decisions about placement of materials. Items will be posted or made available on an equitable basis, subject to available space, regardless of the beliefs or affiliations of the individuals or groups represented.
- Religious and political materials are permissible for informational purposes or special events.
- In general, no items devoted solely to the sale, advertising, solicitation or promotion of commercial products or services for a single profit making business will be accepted. Staff may make exceptions for announcements of educational opportunities provided by profit making businesses, or items including a variety of beneficiaries.
- Posting of a notice or placement of materials in a display rack does not imply endorsement by library staff or Board of Trustees.
ADOPTED: 5/9/02 REVISED: 3/21
Social Media
SOCIAL MEDIA
The library’s social media sites are intended to be a limited public forum for discussing Library programs, events, resources, and materials, and to open a dialogue between library staff and patrons to exchange information and share news. The library does not make its digital and social media accounts available for general public discourse, but rather reserves and limits the topics that may be discussed. Social media accounts must maintain the same level of customer service provided in the physical library.
Public Use of Social Media. SPL is not liable for content posted by the public on any digital or social media site. The library reserves the right to review all content posted on the library’s sites and remove any comments, photographs, or posts that it deems abusive, defamatory, in violation of copyright, trademark right or other intellectual property right, or otherwise inappropriate. This includes, but is not limited to:
- personal attacks, insults, profanity and threatening language;
- defamatory, fraudulent, or libelous comments;
- posts which discriminate on the basis of race, color, religion, national origin, gender, handicap, age, sexual orientation, creed or ancestry;
- pornography;
- copyrighted or plagiarized material;
- comments, photos, or links not related to discussion;
- anything that violates laws or library policies’;
- private, personal information published without consent; and
- spam, commercial promotions, or non-library organized political activity or lobbying.
The library reserves the right to ban or block users who violate this policy. If a patron has a complaint or concern regarding content on a SPL site, or has questions regarding this policy, the patron needs to contact the Head of Public Services or Director.
Staff Use of Library Social Media: Information posted on SPL social media sites may be viewed by users as official library sponsored information. Therefore, staff must follow the guidelines set forth below when representing Security Public Library via social media:
- conduct themselves at all times as representatives of SPL
- comment and post relevant information that directly pertains to library programs, events, resources and libraries in general in accordance with the library mission
- not make statements about specific patrons, or post, transmit, or otherwise disseminate confidential patron information
- not conduct political activities or personal business unless advocating on behalf of the library
- observe and abide by all copyright and trademark restrictions in posting materials to electronic media.
- If staff publish or post regarding library matters on personal sites, they must include a disclaimer such as, “The postings on this site are my own and do not necessarily represent SPL positions, strategies, or opinions.”
Library Trustee and Staff Use of Personal Social Media: Library trustees and employees have the same right to self-expression enjoyed by members of the community as a whole when discussing matters of public concern. When posting content about library-related subjects on personal social media accounts, library trustees and employees should keep in mind the following best practices:
- Make it clear that the views expressed are yours alone and do not represent the views of SPL or other trustees.
- Respect SPL’s confidential and proprietary information. Do not post information that is still in draft form or is confidential.
- No comments with any kind of negative, mocking, condescending, etc. slant should be made about library patrons or staff in general, about specific questions from patrons, about interactions with staff of the library, or about patron behavior on the library’s social media sites.
- If staff publish or post regarding library matters on personal sites, they must include a disclaimer such as, “The postings on this site are my own and do not necessarily represent SPL positions, strategies, or opinions.”
Adopted 8/22
VOLUNTEER POLICY
The purpose of this policy is to provide overall guidance to the staff and volunteers of Security Public Library concerning volunteer efforts. The volunteer program at the Security Public Library provides an opportunity for community residents to assist their library by donating their time and support.
A library volunteer is a person who, without wages, performs tasks on behalf of the library. Volunteers are not considered employees of the library and do not replace staff. Prospective volunteers must complete an application form and be interviewed by the Head of Technical Services and/or the Director. Library volunteers must be over 18 years old unless otherwise approved by the library management. Volunteers will not be eligible for health insurance benefits or worker’s compensation.
Volunteers agree that library staff can make changes to volunteer’s assignments at any time. Volunteers may be dismissed at any time. In addition, volunteers may stop being a library volunteer at any time. Work schedules will be arranged between supervisor and volunteer.
Tasks that may be performed by volunteers:
- Administrative functions
- Assisting Technical Services Librarian
- Shelf reading/shelving
- Maintenance of library
- Program assistants
- Other duties as assigned
Volunteer Responsibilities:
- Expected to notify supervisor if unable to work.
- Required to sign in and out each day they volunteer.
- Expected to complete duties assigned to the best of their abilities.
- Should present a good image and dress appropriately for their duties.
- Direct any questions to library managers.
Library Responsibilities:
- Train and supervise volunteers.
- Notify volunteers if there are changes in the library’s schedule.
- Provide safe workplace.
- Library will sponsor a volunteer recognition program.
Volunteer Application
Security Public Library
Name ________________________________________________________
Street Address ________________________________________________
City __________________________ State _____________ Zip Code ________
Phone (Daytime) __________________ Phone (Evening) ______________
Emergency contact information ___________________________________
Age Group (circle one) 18-54 55 +
What skills do you bring to the Security Public Library?
Briefly list volunteer experience.
Briefly list work experience.
Are you available for: (check all that apply)
Short-term projects (summer only)
One-time projects (book sales, fundraisers, summer reading party)
Long-term projects (working once a week)
List times you are available (for example 10-2 on Thursdays)
Monday: Tuesday: Wednesday:
Thursday: Friday: Saturday:
What is the highest level of education reached? GED High School
Technical School College Degree Masters Degree Vocational Training
Have you ever been convicted for a violation other than a minor traffic offense?
Yes No
I authorize Security Public Library to make inquiries as to my experience and character, and to certify that all statements made on this application are true.
Signature __________________________________ Date _______________________
ADOPTED: 12/03 REVISED: 10/20
Volunteers
VOLUNTEER POLICY
The purpose of this policy is to provide overall guidance to the staff and volunteers of Security Public Library concerning volunteer efforts. The volunteer program at the Security Public Library provides an opportunity for community residents to assist their library by donating their time and support.
A library volunteer is a person who, without wages, performs tasks on behalf of the library. Volunteers are not considered employees of the library and do not replace staff. Prospective volunteers must complete an application form and be interviewed by the Head of Technical Services and/or the Director. Library volunteers must be over 18 years old unless otherwise approved by the library management. Volunteers will not be eligible for health insurance benefits or worker’s compensation.
Volunteers agree that library staff can make changes to volunteer’s assignments at any time. Volunteers may be dismissed at any time. In addition, volunteers may stop being a library volunteer at any time. Work schedules will be arranged between supervisor and volunteer.
Tasks that may be performed by volunteers:
- Administrative functions
- Assisting Technical Services Librarian
- Shelf reading/shelving
- Maintenance of library
- Program assistants
- Other duties as assigned
Volunteer Responsibilities:
- Expected to notify supervisor if unable to work.
- Required to sign in and out each day they volunteer.
- Expected to complete duties assigned to the best of their abilities.
- Should present a good image and dress appropriately for their duties.
- Direct any questions to library managers.
Library Responsibilities:
- Train and supervise volunteers.
- Notify volunteers if there are changes in the library’s schedule.
- Provide safe workplace.
- Library will sponsor a volunteer recognition program.
Volunteer Application
Security Public Library
Name ________________________________________________________
Street Address ________________________________________________
City State _____________ Zip Code ________
Phone (Daytime) __________________ Phone (Evening) ______________
Emergency contact information ___________________________________
Age Group (circle one) 18-54 55 +
What skills do you bring to the Security Public Library?
Briefly list volunteer experience.
Briefly list work experience.
Are you available for: (check all that apply)
Short-term projects (summer only)
One-time projects (book sales, fundraisers, summer reading party)
Long-term projects (working once a week)
List times you are available (for example 10-2 on Thursdays)
Monday: Tuesday: Wednesday:
Thursday: Friday: Saturday:
What is the highest level of education reached? GED High School
Technical School College Degree Masters Degree Vocational Training
Have you ever been convicted for a violation other than a minor traffic offense?
Yes No
I authorize Security Public Library to make inquiries as to my experience and character, and to certify that all statements made on this application are true.
Signature __________________________________ Date _______________________
ADOPTED: 12/03 REVISED: 10/20
Wireless Policy
WIRELESS
Security Public Library (“The Library”) provides wireless Internet access for patrons using personal laptop computers equipped with a wireless network connection. Wireless password can be obtained at the Service Desk. Library’s wireless service can be used for an unlimited amount of time.
The Library's wireless network is not secure. Information sent from your laptop can be captured by anyone with a wireless device and appropriate software within or near the Library. Library staff cannot provide technical assistance. The Library assumes no responsibility for the safety of your equipment or for any alterations or loss of configurations, security, or data files resulting from connection to the Library's wireless network. Printing capability is not available.
Important Notice: By choosing to use this free wireless service you agree to abide by Security Public Library's Computer Use Policy.
The Library reserves the right to require individuals to discontinue the display of information or images which could cause a disturbance in this, a public building. The Library reserves the right to deny wireless access to anyone at any time and can make no guarantees about the availability or proper function of this service.
ADOPTED: 12/14/06 Reviewed 9/21
Word Processing and Computer Policy
WORD PROCESSING COMPUTER AND SOFTWARE USE
Internet Access and Use Policy applies to all library workstations.
Patron workstations with word processing software are available using valid library card. There is no charge for use of computers. Patrons may use the computer for up to 2 hours per day.
Patrons are responsible for printing at 10 cents per page for black and white, and 25 cents per page for color copies. Copies must be paid for at conclusion of session.
It is the responsibility of the patron to save their own work. Saving documents to email or external memory drive is recommended. Do not save documents on library computers.
If requested, library staff members familiar with the computers and software will attempt to help users in the general operation of the library’s computers. However, staff is not expected to train patrons in the use of application programs. Tutorial manuals and online help screens are available.
Software is protected by the copyright laws of the United States and may not be installed or downloaded on the library's public computers.
The library is not responsible for damage to user’s software, data, or hardware due to use of library equipment.
Patrons who misuse the library’s equipment will be charged for damaged computer parts or repairs.
All workstations are turned off fifteen minutes before closing.
ADOPTED: 6/15/91 REVIEWED: 5/21
