The Library, at its discretion, will make laptop computers and other electronic devices available for patron use inside the library. The Library’s laptops may only be used in the Library. Removal of a Library laptop from the Library will be considered theft. All applicable laws will apply.

The borrower must present either: A) a valid driver’s license;  B) a state photo C.) School ID; or D.) Library Card. The identification card or license will be held at the Computer Desk until the laptop is returned to Library staff. Credit cards are not accepted as identification.

Laptops can be checked out from the Computer Desk for 90 minutes. The session may be extended if no other patrons are waiting to use it.

Laptop lending will end one hour before the Library closes. The laptop must be returned 30 minutes before closing.

Laptops are available on a first-come, first-served basis. Laptops must be returned to the computer desk in person.

Each device is configured with a specific operating system and suite of applications.  No additional software may be installed or downloaded.  Use within the library does not require an access code.

Audio or video files must be played with a headphone.

Wireless printing is available. Documents can be printed at any of the public print stations.

The Library’s Public Computer Use policy applies to laptop use. Users attest that they have read and will adhere to the policy.

Under no circumstances should a borrower leave the laptop unattended. The library will not be responsible for a lost or stolen laptop even when it is used in the library. It is the borrower’s full responsibility and fiscal liability for all costs associated with damage to the laptop or its associated peripheral equipment during the period it is checked out, or its replacement costs should it be damaged, lost or stolen. The Library’s IT Department will assess laptop issues and charge the user accordingly.

The borrower must return the laptop along with accessories to the computer desk at the end of the checkout period. A patron’s privilege to check out a laptop may be suspended if the patron fails to return loaned equipment by the time due. Laptops not returned by library closing time will be considered stolen. The Police Department will be notified and an investigation may be initiated.

The borrower is responsible for verifying the current physical condition of the laptop and that it is in working order when it is checked out. Please report damage, non-working laptops and laptops with any objectionable material downloaded on them immediately.

The laptops may not be used to engage in illegal activities or to disturb other patrons. If asked to refrain, the user must comply immediately. Failure to comply may result in loss of computer privileges. No filtering (blocking software) is used on these computers.

If patrons experience problems with laptop hardware or applications or have questions, they should ask for assistance at the Computer Desk. Library staff may not always be available to provide technical support.

The borrower will be financially responsible for any damage to a laptop if he/she tries to troubleshoot problems and damage occurs.

The Library is not responsible for damage to any removable drive (i.e. CD or flash drive) or loss of data that may occur due to malfunctioning hardware or software.

The Library is not responsible for any computer viruses that may be transferred to or from user storage devices. The library laptop is using current anti-virus software, but cannot guarantee protection against all viruses. The library does not assume responsibility for lost or corrupted files for any reason, such as hardware failure or network interruptions.  Users wishing to save files they have created must back them up to USB drives or personal internet based accounts.  All created files will be wiped clean after a session ends by software that is in use on the laptop.

The Library assumes no responsibility for any damage to Library users’ personal devices, software, files, and/or equipment. Tampering with Library equipment or attempting to access or modify the operating system or any other software or programming, including bypassing security functions, is prohibited.

Original approved by Library Board December, 2013.
Revision approved by the Library Board May 21, 2014

Revision approved by the Library Board November 16, 2016