The Ahrens Memorial Library is committed to providing our patrons access to a global body of information as well as providing our patrons access to software products that facilitate the creation, evaluation, and distribution of information. To that end, the library provides public access to Internet ready workstations with office software.
It is important to note that these are government computers and as such are subject to the same regulations as government computers everywhere. However, being a library, use is not restricted to official business.
By using the library workstations, the user is granting consent to have his or her workstation and Internet activities monitored.
The library assumes a certain degree of computer literacy on the part of its computer users. If you feel you need training prior to using the workstations, contact the Systems Administrator (572-7290). Bear in mind that our primary mission is information access. Someone will usually be available to help you with questions but this is not guaranteed.
If you have any comments, questions, or concerns regarding this policy or the library computers in general, please contact the Systems Administrator (572-7290).
The System Administrator will periodically monitor to insure compliance. Failure to adhere to the rules will result in losing library privileges.
Account Number and PIN
Library staff can look up account and PIN information for the sponsor and/or spouse only with proper identification presented. It is the sponsor’s responsibility to give the PIN to children under 18 to access computers. Up to 5 family members are able to log on at one time using the same library card.
It is possible to download files from the Internet. You can save it to our server (named: "SaveYourWorkHere"), CD, or USB flash drive. We have 8Gb USB flash drives available to check out for 3 days
Printing costs 10 cents per side for black and white documents and 25 cents per side for color. The bill validator will take $1, $5, and $10 bills but returns only coins. Please use the lowest denomination bill to keep from depleting the coin-op. To print choose “Print” from your program's menu. A blue pop-up will appear, name the print job and click the button. Then go to the print station, select your document, input your money, and print. Ask a member of the library staff for assistance if you are having difficulty. For maximum safety, you should have the printed document in hand prior to closing the document you're trying to print. Documents have been known to disappear in the cyberspace between the workstation and the print station. It is good practice to print preview your prints when printing from the internet and/or Outlook. The library is not responsible for print jobs sent incorrectly.
Users age 15 or over with an ID card may use their sponsor's library account number provided they have been given the PIN to access the computers. Users under the age of 10 may use the workstations only if their parent or guardian supervises them.
U.S. Copyright Law (Title 17, U.S. Code) prohibits the unauthorized reproduction or distribution of copyrighted materials, except as permitted by the principles of "fair use." Users may not copy or distribute electronic materials (including electronic mail, text, images, and programs) without the explicit permission of the copyright holder. Responsibility for any consequences of copyright infringement lies with the user.
Not all sources on the Internet provide accurate, complete, or current
information. It is the responsibility of the user to question and determine
the validity of the information found.
This is a Department of Defense computer system. This computer system, including all related equipment, networks and network devices (specifically including Internet access), are provided only for authorized U.S. Government use. DoD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DoD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.
Questions or comments regarding this web site should be directed to the
Ahrens Memorial Library System Administrator email@example.com.