using personal laptop computers and PWPL internet must adhere to the Computer
and Internet Use Policy and Guidelines
as if they were on a Library computer.
users have three options for connecting to the Internet while at
- Ethernet data jacks located throughout the Library. These jacks are orange in color and are identified by
circular colored labels adhered above or below each available jack. In
order to connect to these data jacks, your laptop will need a network
card/adapter and an ethernet cable to plug into one of the data jacks.
Ethernet cables are available for free use at the Reference Desk upon
surrender of a driver’s license or other ID. Handouts are available, upon request,
at the Reference Desk to assist laptop users to configure their laptops
for Internet use.
- Northern Michigan University
(NMU) laptops are able to use the NMU WiMAX system, owned and operated by the university.
from any laptop is available for devices connected to the Library Wi-Fi, depending on your computer format. Check
with the Reference Desk for specific instructions. You may also print a document by e-mailing it to
yourself, and using one of our public computers to retrieve the
document for printing.
All patrons accessing the Internet via a
laptop must comply with the following:
- Internet workstations are in public areas shared by people
of all ages. Users are responsible for the selection of sites and
should be aware that others may be involuntarily exposed to what is
displayed. Library patrons are advised that displaying pages depicting
pornography is inappropriate for a public and open environment and is
prohibited. Staff are authorized to ask computer users to stop using
the Internet if they are displaying pornography.
- Patrons must respect the privacy of others using the
computers, and their right to a quiet environment. Patrons who are
disturbing others may be asked to leave.
- The Library's security systems may interfere with a
patron's ability to perform certain tasks. Some examples include:
downloading file attachments, opening zip files, and accessing private
company e-mail systems (VPNs). While the Library recognizes that may be
an occasional inconvenience, patrons must recognize that the Library's
priority must be to maintain the integrity of its own hardware and
software. Staff cannot circumvent security systems to accommodate
specific requests for service.
- Patrons should recognize that the Library Staff does not
have time or expertise to assist individuals with specific computer
Library staff will:
- Make patrons aware of the Computer
and Internet Use Policy and Guidelines
through signs and brochures and on the Library's website. (See Computer
- Use reasonable efforts to ensure compliance with the Computer
Use Policy and Guidelines.
- Respond to patron complaints through appropriate channels.
- Take measures to ensure the privacy of patrons using data
- Offer assistance to patrons when time and
knowledge permit. Library staff may not be
familiar with all procedures needed to connect. Handouts to assist
laptop users are available upon request.
Any activity that interferes with or disrupts computer access
is prohibited. The Peter White Public Library reserves the right to
restrict Internet access to violators. When it is appropriate,
violators will also be prosecuted to the full extent of the law.
Examples of misuse include:
- Use of data ports for illegal or criminal purposes or to
seek access to unauthorized areas.
- Infringement of copyright and other intellectual property
- Sending unsolicited commercial material or "spamming."
- Patrons using data ports must use designated ports and may
not disconnect library equipment.
Consequences of Violating Computer Use Guidelines
Library Staff will determine if a patron has violated the Peter
White Public Library Computer and Internet Use Policy and Guidelines.
Consequences are based on the severity of the infraction.
For a complete copy of the Computer
and Internet Use Policy and Guidelines see Computer
Policies, or ask at the Reference Desk for a