- Adult Use of Internet Computers in Children's Room
- Animals in the Library Policy
- Borrower Registration Policy
- Cell Phone Policy
- Circulation Policy
- Closing and Delay Policy
- Donation Policy
- Fax Policy
- Interlibrary Loan Policy
- Internet Access and Use Policy
- Laptop Loan Policy
- Materials Selection Policy
- Meeting Room Policy and Application
- Patron Access to the Children's Room Policy
- Patron Confidentiality Policy
- Patron Responsibilities and Conduct Policy
- Social Media Policy
- Volunteer Policy and Application
- Wireless Policy
Policy: Adult Use of Internet Computers in Children’s Room
USE OF INTERNET COMPUTERS IN CHILDREN’S ROOM
The Security Public Library restricts the use of Internet computers in the children’s room. These computers may only be used by children, age 12 and under, or adults assisting children on the computers.
Restrictions will be posted clearly on these computers and will be in effect during all hours of library operation. The Security Public Library reserves the right to ask any person who is not complying with posted restrictions to stop using the computer and if that person does not comply, to leave the library.
The reasons for these restrictions are as follows:
- The safety of youth.
- Many young people are hesitant to approach terminals being used by adults, or feel uncomfortable sitting next to an adult who is a stranger, even though the terminals are specifically provided for the use of youth.
- Adults searching the Internet are often seeking a quieter environment than is sometimes afforded in youth service areas or may be looking for information that is not appropriate where children are present.
· Other Internet computers are made available for adult use in other areas of the library.
Policy: Animals in Library Policy
The Security Public Library prohibits bringing a pet (a domestic animal kept for pleasure or companionship) or animal to work or having a pet or animal in the Security Public Library building, with the exception of animals providing medically necessary support for the benefit of individuals with disabilities (service animals) or service animals in training as part of a service animal training program. Exotic or wild animals are restricted from entering the library although exceptions for special events or programs may be granted. Animals may never be left unattended on library premises. This policy applies to all patrons, employees, temporary employees and volunteers of the Security Public Library. Service Animals In compliance with the Americans with Disabilities Act (ADA), service animals are welcome in all areas of the library where members of the public are normally allowed to go. This policy also applies to service animal in training. According to the U.S. Department of Justice, Civil Rights Division, Disability Rights Section, a service animal is an animal that is trained to do work or perform tasks for the purpose of assisting or accommodating a disabled person’s sensory, mental, or physical disability. The task(s) performed by the service animal must be directly related to the person’s disability. Examples of work or tasks provided by a service animal include, but are not limited to, guiding individuals with impaired vision, alerting individuals to an impending seizure or protecting individuals during one, alerting individuals who are hearing impaired to the presence of people or sounds, pulling a wheelchair and fetching dropped items, reminding a person with mental illness to take prescribed medications or calming a person with Post Traumatic Stress Disorder (PTSD) during an anxiety attack. The provision of emotional support, well-being, or companionship do not constitute work or meet the definition of a service animal under the ADA. Employees may ask two questions: 1. Is the dog a service animal required because of a disability? 2. What work or task has the dog been trained to perform? The owner is solely responsible for the supervision and care of the service animal and must maintain full control of the animal at all times. Owners must keep the service animal with them at all times. Service animals must be harnessed, leashed, or tethered, unless these devices interfere with the service animal’s work or the individual’s disability prevents using these devices. In that case, the individual must maintain control through voice, signal, or other effective controls. Reasonable behavior is expected from the service animals while at the library. Owners of disruptive or aggressive service animals or service animals that are not housebroken may be asked to leave the library. If this occurs, library staff will give the person with the disability an opportunity to obtain library services without having the service animal on the premises. Service animals are not permitted on library chairs or other furniture. Owners are responsible for damage caused by their service animals. Library patrons and staff should not pet, talk to, or otherwise distract service animals while they are working. Patrons of the library with allergies to or fear of a service animal may request assistance from Library staff to identify a different location to do their work. Allergies and fear of animals are not valid reasons for denying access or refusing service to people with service animals. ADOPTED: 7/22
POLICY: Borrower Registration
The Security Public Library offers free library cards to applicants who complete a library card application and provide photo ID.
- The library holds borrowers responsible for items checked out on their card. If a borrower’s card or key fob is lost or stolen, and the library is notified, patrons will not be held responsible for items borrowed on his/her card after the notification date.
- A borrower must have library card or picture i.d. in order to check out materials.
- A library card is not required to use the Internet, equipment, and/or materials within the library building.
- A borrower who allows the use of his card by another does so with full knowledge that the responsibility for materials lies with the cardholder. A borrower who is using another patron’s card must have that card in hand or patron present, i.e. mother with children.
- The borrowing privileges and Internet usage of delinquent patrons are suspended until all overdue materials have been returned. Any patron with a fees over $5.00 will be allowed to check out one time. The fine must be paid by next checkout. Borrowers are expected to notify the library of any changes in name or address. Failure to return materials and/or pay fines in excess of $25 will result in patron’s account being sent to a collection agency. An additional $10 will be added to the patron’s account.
- Extended check-out periods are granted to: library staff, WSD#3 faculty, and board of trustees.
- When you fill out your library card registration, you assume responsibility for all materials checked out with your card. The initial card is free. Replacement cards are also free of charge and will be issued with presentation of a valid ID.
- Applicants must present a picture identification and proof of residence, such as a piece of mail that’s been delivered to the address, a printed receipt with their name and address on it, or blank checks with their address printed on them. Proof of residency may also be presented in a digital format, at the discretion of library staff, such as an online bank account or statement with name and address. If patron does not have proof of address, and is a Colorado resident, a card will be issued and mailed to patron as proof of address*.
- The Security Public Library participates in the Colorado Library Card program which allows any Colorado resident borrowing privileges at libraries outside of their home library service area provided they physically visit that library and obtain a library card.
*Limited Use Cards
- Persons with identification and no proof of address may be issued a library card with a “temporary” status. Check-outs will be limited to 2 items at a time, and a time limit restriction may be imposed upon the card. Once proof of address, or the physical library card has been presented, the temporary card will then be converted to a card with full privileges. Access to all e-materials, databases, and in-library computers (excluding laptops) are included with temporary membership.
- If a non-resident (in this case defined as a person with residency outside of the state of Colorado) wishes to obtain a library card, they must present ID and proof of address from their home state. In addition, when applicable, a temporary, in-state address should be given. They will then be issued a library card with “temporary” status. Check-outs will be limited to 2 items at a time, and a time limit restriction may be imposed upon the card. Access to all e-materials, databases, and in-library computers (excluding laptops) are included with temporary membership.
Computer/Database Use Cards
- If patron has no photo ID and no proof of address they can be issued a Computer/Database Use Card. They will have access to library computers and databases only. Once ID and address are provided, the library card can converted to a card with full privileges.
Minor library cards
- Anyone under the age of 18 can receive a library card after completing an application and securing the signature of their parent, legal guardian, or other responsible party.
- If the adult applying for a card on behalf of a minor child is not the parent or legal guardian, they assume responsibility for all lost and damaged items incurred on the card.
- If the adult is not the parent or legal guardian, they must have a permanent library card issued in their name before applying for a card for a minor child.
- The child may not have more than one card issued in their name. Parental/guardian control of the card takes precedence over non-parental/guardian control.
- If the parent, legal guardian, or other responsible party is not present when the signed application is presented by the minor child, the card will be mailed to the parent, guardian, or other responsible party. Borrowing privileges will be limited to two items (with presentation of ID) until the physical card is presented at the library. Once the library card has been presented, full borrowing privileges will be allowed in the absence of the library card (with ID).
Policy: Cell Phone
The Security Public Library is committed to providing an environment that is conducive to study as well as welcoming to all users. All library users are expected to be courteous and respectful of others by adhering to the following policies:
- When you enter the library, turn off the ringer.
- Be considerate of those around you.
- Keep your conversations short, and your voice lowered when using cell phones.
- If you need to have an extended conversation, go to the lobby to do so.
- If you leave the library to take or make a call, please be sure to take your valuable belongings with you.
- Security Public Library reserves the right to ask anyone to leave the library if they are disturbing other patrons or library staff. If you wish to report inappropriate cell phone use, contact a library staff member.
- Security Public Library staff will set their cell phones to vibrate, initiate and receive personal calls and text messages in their offices or in other areas away from library users, and keep their voices low during short personal phone conversations.
To enrich the informational, educational, and recreational quality of life for Security/Widefield citizens, the Library will provide its users a broad and diverse collection of resources and materials to support its mission. In addition, the Library will allow the use of certain electronic resources, and circulate designated parts of its collections to its users for the continued use of these materials outside of the library.
Use of the library and borrowing of library materials is a confidential matter, and identification of the materials currently showing on a patron’s record will not be shared with others, except as required by law, or parental signature.
SPL offers the use and borrowing of its materials and resources to all holders regardless of age. The library defers supervision and responsibility for a child’s use of the library and selection of library materials to the parent or guardian. In addition, the library will not censor, restrict or cast judgment on the materials borrowed or used.
The Library holds the authority to set loan periods for the use and circulation of library materials and in setting charges for damaged or lost items. Failure to return library materials could result in the suspension of your borrowing privileges. Please report a lost card immediately since you are responsible for all materials charged out on your card until the loss is reported. Patrons who wish to check out items, but do not have library card with them, will be required to show a picture i.d.
Special requests for other checkout arrangements must be made with the director's approval.
Patrons may check-out a maximum of 100 items. Borrowing privileges may be reduced or restricted at staff’s discretion.
Books on CDs, Music CDs, Nooks, and Playaways are available for a three-week checkout period. These items may be renewed in person, online or by telephone, unless someone else has reserved them.
DVDs are available for a three-week checkout period. These items may not be renewed. The Security Public Library will not be responsible for any damage or loss suffered by library patrons due to their use of audio or dvd material, including but not limited to, damage to patrons’ machines.
Periodicals are available for a three-week checkout period. Checked out periodicals may be renewed in person, online or by telephone.
Interlibrary Loan Service may be used to obtain materials that are not available from the Security Public Library. Interlibrary Loan books may not be renewed. The library limits each card to ten interlibrary loan items charged to each account at any one time. Interlibrary Loan books are checked out for four weeks.
Reference books and newspapers are available for use within the library only.
Laptops are available for in library, two hour checkout. Chromebook laptops are available for three week check out. Chromebook laptops may be reserved and renewed. Patrons must have library card and picture id. Patrons must read agreement form.
Reserved items are held for seven days. A patron will be notified by mail or email when reserved material becomes available.
Charges for Materials and Services:
Patrons will be required to pay list price for damaged or lost materials. No refunds will be given for payments on lost materials withdrawn from the library’s collection. Replacement copies may be accepted (at the discretion of library staff) as long as the item is an exact replacement of the lost/damaged item. Some examples: hardback books must be replaced by hardback books, non-fiction books must be the same edition or newer, etc. Replacement items must be new and in their original packaging. Used or pre-owned items will not be accepted. No refunds will be given for payments on lost materials withdrawn from the library’s collection.
Collections The services of a collection agency are utilized to assist the library in recovering long overdue materials in order to maintain the integrity of the library's collection and ensure availability of materials to library users.
A collection agency is a company that sends letters, makes phone calls, to library patrons informing them of the consequences of not returning library materials and, if necessary, reports unpaid accounts to the credit bureau.
Accounts that have unpaid bills totaling $25 for a period of 45 days will be referred to a collection agency.
- When the patron's record is tagged for reporting to the collection agency, an additional $10.00 charge will be added to the patron's record.
- The collection agency follows these steps:
- The day the delinquent account is received from the library, the collection agency will mail a letter to the patron.
- Twenty-two days later, a second letter will be mailed.
- Between days 36 and 49, a phone call will be made.
- On day 64, a third letter will be mailed.
- Between days 78-91, a second phone call will be made.
- If the patron has made no effort to settle their account after four months, the delinquent account will be reported to the credit bureaus.
- Once a patron has been referred to the collection agency, all fees must be paid in full before borrowing privileges can be restored. Patron accounts will remain blocked until all money owed has been paid.
- At the discretion of the Head of Public Services, a payment plan may be implemented to pay off a patron's debt. However, the patron must pay at least $10.00 a month toward the resolution of the debt. During the time the patron is regularly making payments the library will arrange for the collection agency to suspend collection activity. A missed payment will result in the account again becoming active with the collection agency.
- If a patron pays their fees after that account has been reported to the collection bureaus, the credit bureau will be updated to show a "paid” status.
ADOPTED: 7/24/91 REVISED: 4/21
POLICY: Closures and Delays Policy
CLOSURES AND DELAYS POLICY
Although Security Public Library (SPL) will make every effort to remain open for business as scheduled, there may be instances where conditions make it difficult to do so. These unexpected closures and delays include, but are not limited to, severe weather, declared state of emergency, utility outages and other facilities issues, disasters, and community emergencies. The ultimate decision to close, or delay, will be made by the Director, or Director’s appointee, in Director’s absence. This does not include expected closures and delays for holidays, trainings, staff meetings, and renovations.
Decision Making for Closures and Delays
· In general, we will close the library when the local school district closes or moves to e-learning day for inclement weather.
· In general, we will open by 10:00 a.m. if local school district has called a two hour delay. Staff are expected to report by 9:45 a.m. in order to prepare library for opening. If employee chooses to not report to work, or report to work after 9:45 a.m., they may use leave time or use leave without pay.
· Director, or Director’s appointee, will make the decision to close or delay opening on Saturday’s and school district holidays due to inclement weather.
· If library opens and weather conditions worsen during the day, the Director, or Director’s appointee, may close the library early.
· In event of non-weather related emergencies, Director or appointee, will make decision to close library, close library early, or delay opening.
· Director, or appointee, will notify library board of closure or delay.
· Director, or appointee, will notify staff of closure or delay.
· Director, or appointee, will
o Post closure on website
o FlashAlert (for t.v. crawler)
o Put notice on doors if possible.
Employees will be paid for their regularly scheduled hours if SPL has delay or closure.
ADOPTED: 4/21 Page 1 of 1
Security Public Library is pleased to accept donations of new and used books, music CD’s, CD-ROMs, and audiovisual items. These donations will be given to our Friends of the Library for ongoing and special book sales. The money the Friends of the Library earn through these sales is given to the Security Public Library to enhance programs and services.
We are not able to quote a value for the items you give us, but upon request the library staff at the Service Desk will give you a receipt for the number of items donated and the date of donation.
Please do not make donations of:
- Items in poor condition – yellow pages, highlighted text, mildew odor
- Encyclopedias older than 5 years
- Condensed books
- Computer books older than 5 years
- Videos/DVD's without cases
From experience we know that people won’t buy these items at the book sales. We understand that it is difficult to throw away items that you have found useful in the past, but they have served their purpose and it is really fine to discard books and other items that are no longer current or useful.
Fax Number is 719-392-7641
Library staff will fax documents for the public as time permits. Patron must provide a loose-leaf copy of the document.
Cost of sending fax is $.50 per page, with a maximum of $5.00. No additional charge for long distance faxes. Faxes can only be sent during library open hours and will be done as soon as time allows. If recipient does not receive fax, library will resend fax at no additional cost.
The library will accept documents via fax machine. If the document has a cover sheet with name and phone number the library will try and contact the intended recipient. If no cover sheet is provided it will be kept at the library for three days. Cost of receiving a fax is $.50 per page, with a maximum of $5.00. Faxes may be received anytime.
The library is NOT responsible for the quality of the fax received or sent including missing pages, bad transmissions, failure to transmit or incomplete information. Patrons are expected to confirm the receipt of the fax by the other party.
POLICY: Interlibrary Loan (ILL)
INTERLIBRARY LOAN - REQUEST
Interlibrary loan (ILL) is a transaction by which a library can borrow library materials that it doesn't have in its own collection. This service allows Security Public Library to provide access to more materials and information than is available within in its own collection. Other libraries are also able to borrow materials from this library that are not part of their collection.
- Books, DVD's, magazine articles, materials and information unavailable at our library may be borrowed through ILL.
- Items that have holds on them and entire issues of magazines are not available through ILL.
- In order to request a single magazine article include the title of the article, the author, name of the publication, date, volume number, and page. The library patron is responsible for compliance with U.S. Copyright Law, Title 17, U.S. Code.
- Delivery of ILL items can take from one to six weeks depending on the location of the item, its availability at the lending library, and the lending library’s response time. We can guarantee neither the delivery date, nor the actual delivery of requests to patrons.
- Any patron may have only ten active requests at any one time. Active requests include both items currently on loan and items currently being searched for.
- ILL materials must be returned to the Security Public Library. Do not return them to the original lending library.
- ILL items generally cannot be renewed, but the reference librarian may contact the lending library to request more time. If the item cannot be renewed, it may be requested again, after it has been returned to the Security Public Library.
- Patrons will be notified by phone call, postcard, or text when their materials are received. The items must be picked up within seven days or they will be returned to the lending library.
- Items borrowed through SWIFT will be checked out to patrons for four weeks.
- Patrons will be notified by postcard if ILL cannot be filled.
- Patrons will be required to pay list price for damaged or lost materials.
- We encourage residents from area library districts to contact their home libraries for their ILL needs.
INTERLIBRARY LOAN - LENDING
- SPL will lend books, DVDs, and audio materials for four weeks.
- SPL will accept ILL requests by fax, phone, or through StateWide Interlibrary-loan Fast Track (SWIFT).
- There are no limits as to the number of requests a borrowing library can make.
- Fines will not be charged to other libraries.
- Libraries will be sent an overdue notice when materials are two weeks overdue. If materials are not returned two months after due date, a bill will be sent. If materials that are three months overdue are not paid for/returned a block will be placed on that library’s card.
- Libraries will be required to pay list price for damaged or lost materials plus a processing fee.
- Materials can be renewed if borrowing library contacts SPL and arrangements are made.
- Reference materials will not be lent.
POLICY: Internet Access and Use
INTERNET ACCESS AND USE
I. Mission Statement for Internet Access
Internet access at Security Public Library is an extension of the library’s commitment to meeting the community’s information needs. In addition to using the Internet as an information resource, the library also seeks to provide the opportunity for Internet use, with limitations, to members of the public. The Security Public Library endeavors to develop collections, resources, and services that meet the cultural, informational, recreational, and educational needs of our diverse community. It is within this context that SPL offers access to the Internet.
II. Acceptable Use
- The Security Public Library does not monitor, nor has control over, information accessed through the Internet and cannot be held responsible for its content. The Internet is a worldwide community with a highly diverse user population and it is your responsibility to use this resource wisely.
- As with all library materials, the Library affirms the right and responsibility of parents/guardians, not library staff, to determine and monitor their children's (under 17 years old) use of the Internet. Library staff is willing to work in partnership with parents/guardians to help guide children in the safe use of the Internet. Because we cannot control all aspects of this vast resource, we urge parents to continually participate in their children's learning process by helping them make good choices in selecting appropriate materials and websites.
- Parents/guardians are ultimately responsible for instructing their children about safe Internet use, including, but not limited to, not giving out personal information online, what to do if they encounter an inappropriate site, or information and how to locate and use safe sites. Security Public Library staff are available to direct parents/guardians and their children to resources and information about safe Internet use.
- The Internet workstation must be used in a responsible manner, respecting the rights of others, and taking care with use of the equipment. Computer and Internet settings may not be changed.
- The workstations cannot be used for any fraudulent or unlawful purpose, including any activities prohibited under any applicable federal, Colorado, or local laws.
- Please be aware that material on the Internet and the World Wide Web is copyrighted. It is your responsibility to be aware of the display of any notices concerning the copyright of information on the Web and to respect the copyright laws of the United States.
- Internet access is filtered on all Security Public Library public computers to block access to obscene and sexually explicit materials by comparing access requests to a list of specifically prohibited sites. The Library does not assume any responsibility for the accuracy of its Internet filters.
III. Unacceptable Uses of Computers
Among the uses that are considered unacceptable and which constitute a violation of this policy are the following:
1. Uses that violate the law or encourage others to violate the law. Transmitting of offensive or harassing messages; offering for sale or use, any substance where the possession or use of
which is prohibited by law; viewing, transmitting or downloading pornographic materials, accessing or downloading information deemed inappropriate for public viewing, or materials that encourage others to violate the law; downloading or transmitting confidential, trade secret information, or copyrighted materials. Even if materials on the networks are not marked with the copyright symbol, users should assume that all materials are protected unless there is explicit permission on the materials to use them.
2. Uses that cause harm to others or damage to their property. Engaging in defamation (harming another's reputation by lies); uploading a worm, virus, "trojan horse," "time bomb", or other harmful forms of programming or vandalism; participating in "hacking" activities or any form of unauthorized access to other computers, networks, or information systems.
3. Uses that jeopardize the security of access of the computer network or other networks on the Internet. Disclosing or sharing the user's password with others; impersonating another user; using one's own software programs on the library's computers; altering the library's computer settings; damaging or modifying computer equipment or software.
4. Uses that compromise the safety and security of minors when using e-mail, chat rooms and other forms of direct electronic communication. Giving others private information about one's self or others, including credit card numbers and social security numbers; arranging a face-to-face meeting with someone one has "met" on the computer network or Internet without a parent's permission.
5. Uses that Violate Confidentiality of Information: Personally identifiable information about users, including minors, will not be disclosed or used in any way, except to law enforcement authorities as provided in the law. Users should be aware, however, that due to the technical difficulties involved in providing absolute security, transactions and files could become public.
Response to Violations
The user's access to the library’s computer network and Internet is a privilege, not a right. A user violates this policy by his or her own action or by failing to report any violations by other users that come to the attention of the user. Further, a user violates this policy if he or she permits another to use his or her account or password to access the computer network and Internet. Failure to comply with this policy and its procedures will result in the forfeiture of the user's right to access these computers.
Guidelines for Public Internet Use
- Internet computers are available on a first-come, first-served, basis.
- Patrons may log on to an adult Internet computer with their own library card number and pin. Patrons are given one hour sessions. An extension up to one additional hour may be granted if there are no patrons waiting to use the computers. Maximum of two hours, per patron, per day.
- Guest passes are available for patrons without a library card. The session length for guest passes is one hour.
- Patrons actively engage in job searches and resume writing may receive a maximum time limit of three hours per day.
- The time limit for Children’s computers is 30 minutes per day. No extensions.
- Patrons who owe more than $5.00 in fees will be blocked from using the computer. One guest pass may be issued if amount is under $20.00 or if patron is making payments and/or returning items.
- Users may not install software on any Security Public Library computer.
- USB drives may be purchased at the service desk for $2.00.
- There is a fee of ten cents ($.10) per page for printing; twenty-five cents ($.25) per page for color printing.
- Internet access may occasionally be unavailable due to technical problems.
- Security Public Library cannot be responsible for the quality or accuracy of any information found on the Internet.
- All Internet workstations will be turned off 15 minutes before closing.
- Computer workstations are designed for use by one patron at a time, maximum of two patrons with staff approval.
- Basic assistance for the Internet may be available, as time permits. A variety of books on the Internet are available for check out.
- Library staff is authorized to take prompt and appropriate action to prohibit use by those who fail to comply with the Library’s Internet Access and Use policy.
IV. Wireless Network
- Patrons may use their own computers to access the Internet through the library’s wireless network or through an Ethernet port provided by the library. Users are subject to the same rules as users of the library computers. We ask that users turn off the sound, or use headphones, while using their personal computers in the library. Patrons who use their own computers are solely responsible for the consequences of their use.
- The library merely provides access to the Internet and is not responsible for any loss or damage that may result to a user’s computer or files as a result of that use. The library’s wireless network is not secure unless you are connected to a secure, encrypted website. Guard your personal information.
V. Internet and children
Parents and guardians are responsible for monitoring Internet access for their children who are minors. Any additional restrictions placed on a child's access to the Internet on the library's network is the responsibility of the parent or legal guardian.
VI. Internet Filters
The library Internet is filtered. As such, some sites, even though benign, may be blocked due to these filters. We can submit a request to have sites unblocked, but we may not be able to gain access to these sites.
Policy: Laptop Loan Policy
LAPTOP LOAN POLICY
Borrower must be 18 years of age or older and have a SPL patron card in good standing (no fines/fees on account) and have had a SPL library card for at least 60 days. The library reserves the right lend, restrict or terminate computer use privileges if patron misuses or abuses library equipment or does not act in accordance to library policy. Borrower must read Laptop Loan Agreement.
Borrower must leave a photo ID at the circulation desk to check out in-house laptop; ID will be returned at the time of laptop check-in.
Borrower must have sufficient knowledge to operate the computer including knowledge of:
- How to start and shut down the computer.
- How to access the Internet and other programs.
- How to save files with a flash drive (not provided).
In-house laptops may be checked out for 2 hours per day. Laptops are not available for check out one hour or less prior to library closing time. Laptops must be returned to library staff at least 30 minutes prior to library closing. Laptops are not to be taken from the library and not to be left unattended.
Out of library laptops may be checked out for three weeks. Laptops may be reserved and renewed.
Fees and Liability
- Borrower accepts full responsibility for the laptop computer and accessories.
- Borrower will not alter any settings or configurations on the laptop.
- Borrower must save to a removable storage device since any work will not be saved to the laptop.
- Borrower will reimburse SPL for the cost of repairing or replacing this laptop and/or its accessories if they are damaged, lost, or stolen while checked out.
- Overdue fines accrue at $5.00 for every hour, or portion thereof, if the in-house laptop is returned late. Patron will be charged a fine plus lose laptop borrowing privileges for one week.
- If not returned by closing time, the in-house laptop will be considered lost and patron will be responsible for a replacement fee of $1,000.
- Borrowers of out of library laptops will be charged a $1,000 replacement fee if not returned by due date.
- Borrower accounts with overdue laptops will be sent to collection’s agency.
- Printing is $.10 per page or $.25 per page for color.
Security Public Library will not assume responsibility for lost files due to viruses, hardware failure, and network interruptions.
Library wireless connections are not secure, and patron should take appropriate caution with personal information while using a library computer.
Library has Internet filtering software. Filters are not 100% effective and the library will not be held responsible for any site that is or is not blocked.
POLICY: Materials Selection
The mission of the Security Public Library is to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library resources and services.
Purpose of the Collection within the Context of the Mission
A library is identified and defined principally by its holdings of materials and information resources. The library acts to fulfill its mission by selecting, acquiring, organizing, preserving, maintaining, deselecting and providing access to a collection of materials and electronic resources that address the interests and needs of the diverse members of its community. The Security Public Library strives to provide a collection that balances viewpoints across a broad spectrum of opinion and subject matter in formats suitable to a variety of learning and recreational interests and skills.
The Security Public Library selects, makes available, and promotes the use of library materials, whatever the format, which:
1. Meet the information needs of the community.
2. Meet the recreational needs of the community.
3. Supplement formal and informal study.
4. Reflect a variety of opinions on a subject.
5. Support business, cultural, recreational and civic activities in the community.
6. Stimulate self-understanding and growth.
7. Enhance job-related knowledge and skills.
8. Increase knowledge of and participation in the affairs of the community, the country and the world.
Authority and Responsibility for Materials Selection
The authority and responsibility for the selection of library materials is delegated to the library director and, under his or her direction, to the library staff who are qualified for this activity by reason of education, training and experience. The advice of specialists in the community is requested in fields in which staff members do not have sufficient expertise. Suggestions from library users are welcome and are given serious consideration within the general criteria. Final decision for purchase rests with the library.
Gifts and Donations
The library accepts gifts of books and other materials with the understanding that they will be added to the collection only if appropriate and needed. If they are not needed because of duplication, condition, or dated information, the director can dispose of them as he/she sees fit. Magazines, Reader’s Digest Condensed books, and textbooks will not be accepted. Gift materials will be evaluated according to the same criteria as purchased materials. Memorial gifts of books or money are also accepted with suitable bookplates placed in the book. When the Library receives a cash gift for the purchase of materials, whether as a memorial or for any other purpose, the general nature of subject area of the materials to be purchased will be based upon the wishes of the donor. Selection of specific titles, however, will be made by the library staff in accordance with the needs and selection policy of the Library.
By law, the library is not allowed to appraise the value of donated materials, though it can provide an acknowledgement of receipt of the items if requested by the donor.
Withdrawal of Materials
To ensure a vital collection of continued value to the community, materials which have outlived their usefulness will be withdrawn. An up-to-date, attractive, and useful collection is maintained by retaining or replacing essential material, and removing, on a systematic and continuous basis, those works that are worn, outdated, of little historical significance, or no longer in demand.
Criteria for Selection
The primary goal of material selection is to provide the best possible collection with the financial resources available. The evaluation of materials is characterized by flexibility, open-mindedness and responsiveness to the changing needs of the residents of the Security Public Library. Materials are evaluated as a whole and not on the basis of a particular passage or passages.
All acquisitions, whether purchased or donated, are considered in terms of the following standards. Clearly, however, an item need not meet all of the criteria to be acceptable. In some instances, materials may be judged primarily on artistic merit, or because of scholarship, or as valuable human documents, or as critical to the information needs of the community. The following general criteria are used:
1. Present and potential relevance to community needs.
2. Suitability of subject, style, and reading level for the intended audience.
3. Insight into human and social conditions.
4. Importance as a document of the times.
5. Appropriateness and effectiveness of medium to content.
6. Reputation and/or significance of the author, publisher, or producer.
7. Demand for the material.
8. Positive critics’ and staff members’ reviews.
9. Relationship to existing materials in the collection on the same subject.
10. Within limits of budgets for materials.
11. Author or illustrator is local.
The choice of library materials by users is an individual matter. Responsibility for the reading or viewing of materials by children and adolescents rests with their parents or legal guardians. The library does not stand in loco parentis. While a person may reject materials for himself or herself and for his or her children, he or she cannot exercise censorship to restrict access to the materials by others.
The Security Public Library supports intellectual freedom and endorses the following statements: “Freedom to Read,” American Library Association, “Freedom to View,” American Film and Video Association, and the “Library Bill of Rights,” American Library Association.
The Security Public Library recognizes the prerogative of patrons to question library policy regarding materials selection and library operations. Patrons requesting reconsideration of materials contained within the library's collection will be asked to fill out a Request for Consideration of Library Materials Review form. The library director will respond to this request, in writing, within thirty days of receipt of the request. If the director's explanation of the material's selection, or solution to the complaint, is not adequate to the complainant, that person may then decide to present the complaint, in person, at a regularly scheduled Library Board of Trustees meeting for a decision to be determined later. Questions about censorship are a regular part of the library's annual report to the State Library, and details about "challenged" materials are requested.
Security Public Library
715 Aspen Drive
Security, CO 80911
Request for Consideration of Library Materials Review
1. Please state your objections to this material: ________________________________
2. Please quote the offensive passages and provide the page number or list objectionable sections of nonprint media:
3. Have you read or viewed this material in its entirety?_______
4. Does this material present the information accurately?_______
5. For what age group would you recommend this work? ________
6. Do you feel that this work has any value?____________________
7. What would you like the library to do about this material?
a. Do not lend it to my child____________
b. Withdraw it from all readers__________
c. Re-evaluate its selection_____________
8. In place of this work, what other work of equal literary quality would you recommend that would convey as valuable a picture and perspective of the subject treated?
The Security Public Library welcomes your interest and support in protecting the public's freedom to read. It is our endeavor to present to this community materials that enriches the quality and diversity of thought and expression.
Address_______________________________ Date_________ Telephone___________
POLICY: Meeting Room
In keeping with the Library's mission and strategic initiatives to create welcoming spaces that serve as public commons and to encourage civic engagement by offering people opportunities to connect and interact, the Security Pubic Library meeting room is available for use by non-profits and community groups for informational, educational or cultural meetings and programs when not needed for library purposes. The meeting room is available at no cost. Use of the library’s meeting room does not imply endorsement by the library staff or Trustees of the viewpoints presented.
First priority in scheduling the use of the meeting room is reserved for Library programs and services.
One member of each group must be a registered Security Public Library user and present his/her library card at the Circulation Desk. This person is the “responsible user”. The names of each person in the group are required for registration. Use of the community room is scheduled through the library staff.
The responsible user must tell the Circulation Desk staff when they are leaving. As a courtesy to the next group, the meeting room should be vacated in a timely manner.
Groups may reserve space for up to four meetings per month.
MEETING ROOM GUIDELINES
- The meeting room is for groups of 2-12 people on a first-come, first-served basis. The meeting room may be scheduled for up to three hours per group. Additional time may be added at the discretion of library.
- The meeting room is available during the library’s normal hours of operation for no charge. Users must vacate the meeting room 15 minutes prior to closing.
- Commercial enterprises may use the room to present informational programs, but may not sell products or services in the library.
- All meetings must be free. The Library does not endorse the goals, beliefs or policies of groups or individuals using the meeting rooms.
- Meeting rooms may not be used for activities that are likely to disturb regular Library functions. The Library expects organizations to be considerate of Library users and activities. The Library reserves the right to deny space to meetings that are likely to become disruptive to normal Library operations.
- Any activity which contravenes Federal, State or local law or relevant regulations, including health, safety and fire regulations.
- Any activity which may disrupt the neighborhood.
- Political activity, including the advocacy of political positions and campaigning for a political candidate.
- Religious observances.
- The room will be booked only to adults. Youth groups may use the room if a responsible adult is present at all times.
- Wireless internet access, Smart T.V. and a whiteboard are available. Groups will need to bring their own laptops.
- Materials are not to be attached to walls, windows, doors, or furnishings except at the direction of authorized staff.
- The room must be left in a clean and neat condition. The responsible user will be held financially responsible for any damage to the meeting room or furniture.
- Security Library is not responsible for materials or equipment left in meeting room by users.
- Light refreshments are permitted provided that food and drink remain in the meeting room.
- Other designated “quiet” areas of the library are available for individuals who wish to study.
The Security Public Library reserves the right to deny the use of the meeting room if, at any time, the conduct of the group or any member if the group is disruptive or destructive, or if information is falsified on the meeting room reservation form.
Meeting room assignment is at the discretion of the library director. Library programming has priority use of meeting room.
Policy: Customer Access to the Children’s Room
CUSTOMER ACCESS TO THE CHILDREN’S ROOM
The Children’s area of the Library is specifically designed to serve the needs of our young customers. This space should be a safe space for children to browse the collection and utilize specific services and as such, adult access will be limited as outlined below:
Teachers, students, adults accompanied by a child, and adults in the area looking for materials for their child or for their personal use are allowed.
Adults in the area not actively using the collection and specific services offered will be asked to exit the Children’s area and use other areas of the building. Obviously, reasonable and sound judgment must be used when requesting customers to use other areas of the facility.
We serve a diverse clientele, including adult customers with reading disabilities. Make sure you consider whether the adult is using the collection and specific services offered to help guide your decision.
POLICY: Patron Confidentiality Policy
PATRON PRIVACY AND CONFIDENTIALITY
The Security Public Library (SPL) maintains that patron records and other information that identifies a person as having used the library are confidential under provisions of the Colorado Library Law (Colorado Revised Statutes 24-90-119). Security Public Library staff shall consider use of the library, questions asked, materials borrowed, use of databases and Internet, attendance at programs, and presence of the patron in the library, as being protected by this law. In accordance with library law, privacy of library records is protected as follows:
- Except as set forth in subsection (2) of this section, a publicly-supported library or library system shall not disclose any record or other information which identifies a person as having requested or obtained specific materials or service or as otherwise having used the library.
- Records may be disclosed in the following instances:
- When necessary for the reasonable operation of the library;
- Upon written consent of the user;
- Pursuant to subpoena, upon court order, or where otherwise required by law;
- To a custodial parent or legal guardian who has access to a minor’s library card or its authorization number for the purpose of accessing by electronic means library records of the minor.
- Any library official, employee, or volunteer who discloses information in violation of this section commits a class 2 petty offense and, upon conviction thereof, shall be punished by a fine of not more than three hundred dollars.
The Security Public Library does not create unnecessary records and only retains information needed. Although the Library must keep information on such items as overdue and lost materials, outstanding fees, and payments of patron accounts, these records are kept secure and are purged from the Library’s computer system when no longer needed for library business purposes. Paper records containing personal information such as names, addresses, and phone numbers, are shredded once added to the computer system. Only library staff shall have access to personal data stored by the Library.
Security Public Library enters into agreements with third-parties to provide online services. SPL makes reasonable efforts to ensure that SPL’s agreements with third-parties reflect the policies and legal obligations concerning patron privacy and confidentiality.
SPL encourages patrons to review the privacy policies of all third-party providers. This policy does not apply to external applications or websites that may be accessed from SPL’s computers, devices, or wireless network. Patrons are cautioned that any electronic communication utilizing Internet or a wireless network may be intercepted.
Patrons may conduct only legal activity while using SPL resources and services. Nothing in this policy protects SPL from exercising its right to enforce its Patron Behavior Policy; protect its patrons, staff, facilities, network, and equipment from harm; or prevent use of SPL facilities and equipment for illegal purposes. SPL can electronically log activity to monitor its public computers and network and reserves the right to review such logs when a violation of law or SPL policy is suspected. Staff is authorized to take immediate action to protect the security of patrons, staff, facilities, computers, and network. This includes contacting law enforcement authorities and providing information that may identify the individual(s) suspected of a violation.
Guidelines for access to patron information:
1. Staff members cannot reveal patron information to anyone other than the registered patron unless the registered patron has given prior permission to release it to certain individuals. This includes, but is not limited to, information on what titles have been checked out or what fees are owed.
2. Staff do not page patrons. Staff may take a message if somebody wants to contact them and, if they see the patron, they will give them the message.
- Patron records, including items checked out, on hold, overdue and fees owed, are available online through My Account in the library catalog at www.securitypubliclibrary.org. The library card number and PIN (last four digits of phone number) are required to access this information.
- A parent or guardian of a child may be provided information by library staff of checked out materials if the primary purpose is to pay fees or recover missing materials. The parent or guardian must present the child’s library card or name and birth date. The parent or guardian may be required to verify address and phone number and present current picture identification.
5. If SPL staff (Supervisor if possible) ascertain that a patron is an imminent danger, to themselves or others, OR, if their behavior is disruptive to the library, they may contact the police or authorities. Staff may then disclose to the authorities information on the patrons presence and actions in the library. Staff are prohibited from disclosing information related to patron’s account or use of specific resources of the library.
- SPL staff will refer any public records requests and law enforcement inquiries to the Director or Supervisor. The Director or Supervisor may confer with legal counsel before determining the proper response to any requests of records.
12/08/05 REVISED 11/20
PATRON RESPONSIBILITES AND CONDUCT
The mission of the Security Public Library is
to meet the evolving educational, cultural, informational, and recreational needs of the public by providing modern library
resources and services.
The Security Public Library strives to maintain a safe and comfortable environment for all our patrons. The Library supports free and equal access to Library services while reserving the right to enforce reasonable rules and guidelines. The Library reserves the right to remove any person whose behavior is disruptive, inappropriate for a library environment, or interferes with the use of the library by others. The library is authorized to call upon other agencies (police, fire department, etc...) in order to protect people and property.
Patron Responsibilities and Conduct
It is a patron's responsibility to maintain necessary and proper standards of behavior in order to protect their individual rights and the rights and privileges of other patrons. Patrons should be engaged in activities associated with the use of a public library while in the building. Patrons who fail to observe the Security Public Library Patron Responsibilities and Conduct Policy may be asked to leave the library building and grounds, be banned from the Library for a period of time, be subject to arrest, or be subject to other lawful action.
The Security Public Library prohibits any activity or condition that unreasonably interferes with Library user or staff comfort, safety, or use of the Library, including but not limited to:
- Any violation of federal, state or local laws.
- Guns or other weapons (except for law enforcement).
- Verbally, physically, or sexually harassing Library users or staff.
- Interfering with staff in performance of their duties.
- Making any loud or unreasonable noise or other disturbance such as running, throwing objects, fighting, abusive language, or talking loudly.
- Disruptive use of personal communications or entertainment devices, such as cell phones, head phones, and radios.
- Offensive body odor due to poor personal hygiene, overpowering perfume, or cologne.
- Excessive public displays of affection; sexual misconduct.
· Using, possessing, or being under the influence of alcoholic beverages or illegal drugs.
· Animals, except for those identified as “Service Animals”.
· Smoking, use of tobacco products or use of electronic smoking devices.
· Loitering, soliciting.
· Sleeping, bathing.
· Damaging or improperly removing Library materials, equipment, or furniture.
· Blocking any library entrance, exit, aisle, or path.
· Eating and drinking, unless approved by library personnel.
· Bikes, skateboards, roller blades/skates and scooters.
· Appropriate clothes, including shirt and shoes, are required.
· Entering staff areas without permission.
· Use of the computers and Internet to engage in illegal activity. Viewing information or images that is offensive to library patrons and staff.
The Security Public Library encourages visits by young children and it is our desire to make this important visit both memorable and enjoyable for children. Library staff is not expected to assume responsibility for the care of unsupervised children in the library.
The Board’s policy affirms that the library staff does not take the place of the parent, act as caregiver or baby-sitter, nor assume responsibility for children.
Therefore, it is library policy that all children under the age of eight must be accompanied by a parent or designated responsible person, while in the library. Also, if the young child is attending a library program, we require the parent/responsible person to remain with the child throughout the program.
Children of all ages are encouraged to use the library for homework, recreational reading, and program attendance. The library staff realizes that the library will be noisier at busy times and that children by nature can cause more commotion. However, children (whether with parents or not) who are being continually disruptive will be given a warning that they must settle down or will be asked to leave the library. If after a second warning the child continues to be disruptive, they will be asked to leave the library. If the child needs to contact a parent, they may do so and then wait with a staff person until the parent arrives.
Our staff is comprised of good-natured library professionals who strive to provide excellent library service to every patron. We want the time you spend with us to be productive, pleasant, and worthwhile. In order to accomplish this we need your cooperation. Those responsible for children should know:
· If a child is disruptive, ill, or injured, staff will ask the parent/guardian, if in the building, to properly supervise their child.
· Staff will try to phone the parent/guardian, if absent from the building, to have them remove their child from the library.
· If the parent/guardian is not located, a staff member may contact the El Paso County Sheriffs Department.
REVISED 12/20 3 of 3
Policy: Social Media
The library’s social media sites are intended to be a limited public forum for discussing Library programs, events, resources, and materials, and to open a dialogue between library staff and patrons to exchange information and share news. The library does not make its digital and social media accounts available for general public discourse, but rather reserves and limits the topics that may be discussed. Social media accounts must maintain the same level of customer service provided in the physical library.
Public Use of Social Media. SPL is not liable for content posted by the public on any digital or social media site. The library reserves the right to review all content posted on the library’s sites and remove any comments, photographs, or posts that it deems abusive, defamatory, in violation of copyright, trademark right or other intellectual property right, or otherwise inappropriate. This includes, but is not limited to:
- personal attacks, insults, profanity and threatening language;
- defamatory, fraudulent, or libelous comments;
- posts which discriminate on the basis of race, color, religion, national origin, gender, handicap, age, sexual orientation, creed or ancestry;
- copyrighted or plagiarized material;
- comments, photos, or links not related to discussion;
- anything that violates laws or library policies’;
- private, personal information published without consent; and
- spam, commercial promotions, or non-library organized political activity or lobbying.
The library reserves the right to ban or block users who violate this policy. If a patron has a complaint or concern regarding content on a SPL site, or has questions regarding this policy, the patron needs to contact the Head of Public Services or Director.
Staff Use of Library Social Media: Information posted on SPL social media sites may be viewed by users as official library sponsored information. Therefore, staff must follow the guidelines set forth below when representing Security Public Library via social media:
- conduct themselves at all times as representatives of SPL
- comment and post relevant information that directly pertains to library programs, events, resources and libraries in general in accordance with the library mission
- not make statements about specific patrons, or post, transmit, or otherwise disseminate confidential patron information
- not conduct political activities or personal business unless advocating on behalf of the library
- observe and abide by all copyright and trademark restrictions in posting materials to electronic media.
- If staff publish or post regarding library matters on personal sites, they must include a disclaimer such as, “The postings on this site are my own and do not necessarily represent SPL positions, strategies, or opinions.”
Library Trustee and Staff Use of Personal Social Media: Library trustees and employees have the same right to self-expression enjoyed by members of the community as a whole when discussing matters of public concern. When posting content about library-related subjects on personal social media accounts, library trustees and employees should keep in mind the following best practices:
- Make it clear that the views expressed are yours alone and do not represent the views of SPL or other trustees.
- Respect SPL’s confidential and proprietary information. Do not post information that is still in draft form or is confidential.
- No comments with any kind of negative, mocking, condescending, etc. slant should be made about library patrons or staff in general, about specific questions from patrons, about interactions with staff of the library, or about patron behavior on the library’s social media sites.
- If staff publish or post regarding library matters on personal sites, they must include a disclaimer such as, “The postings on this site are my own and do not necessarily represent SPL positions, strategies, or opinions.
The purpose of this policy is to provide overall guidance to the staff and volunteers of Security Public Library concerning volunteer efforts. The volunteer program at the Security Public Library provides an opportunity for community residents to assist their library by donating their time and support.
A library volunteer is a person who, without wages, performs tasks on behalf of the library. Volunteers are not considered employees of the library and do not replace staff. Prospective volunteers must complete an application form and be interviewed by the Head of Technical Services and/or the Director. Library volunteers must be over 18 years old unless otherwise approved by the library Director. Volunteers will not be eligible for health insurance benefits or worker’s compensation.
Volunteers agree that library staff can make changes to volunteer’s assignments at any time. Volunteers may be dismissed at any time. In addition, volunteers may stop being a library volunteer at any time. Work schedules will be arranged between supervisor and volunteer.
Tasks that may be performed by volunteers:
- Administrative functions
- Assisting Technical Services Librarian
- Shelf reading/shelving
- Maintenance of library
- Program assistants
- Other duties as assigned
- Expected to notify supervisor if unable to work.
- Required to sign in and out each day they volunteer.
- Expected to complete duties assigned to the best of their abilities.
- Should present a good image and dress appropriately for their duties.
- Direct any questions to library managers.
- Train and supervise volunteers.
- Notify volunteers if there are changes in the library’s schedule.
- Provide safe workplace.
- Library will sponsor a volunteer recognition program.
Security Public Library (“The Library”) provides wireless Internet access for patrons using personal laptop computers equipped with a wireless network connection. Wireless password can be obtained at the Service Desk. Library’s wireless service can be used for an unlimited amount of time.
The Library's wireless network is not secure. Information sent from your laptop can be captured by anyone with a wireless device and appropriate software within or near the Library. Library staff cannot provide technical assistance. The Library assumes no responsibility for the safety of your equipment or for any alterations or loss of configurations, security, or data files resulting from connection to the Library's wireless network. Printing capability is not available.
Important Notice: By choosing to use this free wireless service you agree to abide by Security Public Library's Computer Use Policy.
The Library reserves the right to require individuals to discontinue the display of information or images which could cause a disturbance in this, a public building. The Library reserves the right to deny wireless access to anyone at any time and can make no guarantees about the availability or proper function of this service.