MPPL WiFi Guidelines and Internet Policy
Patrons are now able to connect to the internet at MPPL to check e-mail, surf the Web or browse the catalog using their personal laptop. In order to use this network, laptop computers must have a wireless network (WiFi) card installed. The Library’s uses WiFi equipment that is 802.11b and 802.11g compatible. The laptop needs to be set to use “Automatic DHCP.” Wireless access is available during Library hours up to 5 minutes before closing time.
MPPL Wireless users:
- Are responsible for configuring the wireless equipment connecting to the Library’s wireless network.
- Are responsible for the security of their own equipment. The Library does not provide antivirus protection.
- Must agree to comply with the Library’s Internet Policy.
- Understand that the Library’s Internet Access is filtered.
- The Library does not provide software or hardware support.
- Wireless access is available only during Library hours up to 5 minutes before closing time.
Mount Prospect Public Library Internet Policy
The Internet allows patrons to connect to sites/resources outside of Mount Prospect Public Library. Mount Prospect Public Library has no control over these sites/resources nor does the Library have complete knowledge of what is available on the Internet. Patrons access the Internet at their own risk. Mount Prospect Public Library supports the right of all library users to access information and will not deny access to electronic information networks based solely on age.
Mount Prospect Public Library makes no representations or warranties of merchantability and fitness for a particular purpose. Mount Prospect Public Library further makes no representations about the suitability of any software or content or information made accessible by the software of this system. Information on the Internet may be reliable, complete and accurate or it may be inaccurate, incomplete, out-of-date or unavailable at times.
The access is provided “as is” without express or implied warranty, including the implied warranty or merchant ability and fitness to a particular purpose. By using the Internet you agree that Mount Prospect Public Library shall not be liable for any damages suffered by the users of this system or the software, programming and other documentation found on this system.
Mount Prospect Public Library further disclaims any liability whatsoever for any of the information, documentation, programs, software or other material which is or may become a part of the system, the user agrees to abide by the copyright laws and all other applicable laws of the United States.
Mount Prospect Public Library is part of the Illinois Century Network. Patrons using the Internet must also abide by the Illinois Century Network acceptable use policy, available at www.illinois.net/AUP.pdf.
Mount Prospect Public Library requires that library patrons using electronic information networks such as the Internet do so within the guidelines of acceptable use. The following activities are unacceptable:
- Use of electronic information networks for any purpose which results in the harassment of other users.
- Destruction of, damage to, or unauthorized alteration of the Library’s computer equipment, software or network security procedures.
- Use of electronic information networks in any way which violates Federal, State, or local law including copyright and licensing infringement.
- Use of electronic information networks in any way which violates licensing and payment agreements between this Library and network/database providers.
- Unauthorized duplication of copyright protected software or violation of software license agreements.
- Violations of system security.
Illinois Century Network Acceptable Use Policy
This Acceptable Use Policy (hereafter referred to as ‘AUP’) specifies certain actions prohibited by the Illinois Century Network (hereafter referred to as ‘ICN’ or ‘Network’) for users of the Network. The ICN reserves the right to modify this Policy at any time to stay in compliance with all known laws, regulations, policies, and security requirements that may be established by appropriate legislative or regulatory authorities or enacted by ICN management. By using ICN services, any customer, employee or third party unconditionally accepts the terms of this policy.
The ICN is a publicly owned private network established by the ICN Act (20 ILCS 3921) and signed into law on June 8, 1999. ICN systems and services are for the use of authorized users only. Authorized users are subject to monitoring of all activities on ICN systems and recorded by ICN staff during routine network monitoring for the purpose of security and network performance audits. Any user of ICN systems expressly consents to such routine monitoring and is advised that if such monitoring reveals possible evidence of criminal activity, ICN staff may provide the evidence of such monitoring to law enforcement officials. Further, if illicit activity of any kind is suspected as a result of the aforementioned routine monitoring, an internal investigation may result and employment may be suspended or terminated pending the outcome of such investigation. The ICN also reserves the right to deny IP addresses or revoke IP addresses.
The ICN may be used only for lawful purposes. Transmission, distribution or storage of any material in violation of any applicable law or regulation coming to or from any unauthorized network or system is prohibited. This includes, without limitation, material protected by copyright, trademark, trade secret or other intellectual property rights used without proper authorization; government and military data protected by law and applicable national security policies and concerns; ICN data protected by public policy; and material that, in ICN’s sole discretion, is obscene, defamatory, constitutes an illegal threat, or violates export control laws or any other laws or applicable regulations. Any violation of the above which compromises the integrity of the ICN or any other network connected to the ICN is strictly prohibited.
SYSTEM AND NETWORK SECURITY
Violations of system or network security are prohibited, and may result in criminal and/or civil liability. Use of the ICN network constitutes consent to ICN’s routine network monitoring. Should any violations of the law or this AUP be discovered during monitoring, ICN will involve and cooperate with local, Illinois, and Federal law enforcement authorities for resolution. Examples of unlawful acts, system, or network security violations include, but are not limited to, the following:
- Unauthorized access to or use of data, systems or networks, including any attempt to probe, damage, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network. ICN employees may scan or test the vulnerability of ICN systems or networks that they are responsible for or they manage.
- Unauthorized monitoring of data or traffic on any network or system without express authorization of the owner of the system or network. ICN employees may monitor data or traffic on any ICN network or system owned and operated by the ICN or for which the ICN is expressly responsible to manage through agreement with the owner. Interference with service to any user, host or network including, without limitation, email “bombing”, email “spamming”, flooding, deliberate attempts to overload a system, and broadcast or “smurf” attacks.
- Unauthorized access to any data, system, or network from an unauthorized system or network for any purpose which is not lawful or which is intended to do harm.
- Forging of any TCP-IP packet header or any part of the header information in an email or a newsgroup posting. Electronic forging of any kind to include but not limited to IP addresses, domains, business names, etc.
Email “bombing” is characterized by abusers repeatedly sending an identical email message to a particular address. Email “spamming” is a variant of bombing; it refers to sending email to hundreds or thousands of users (or to lists that expand to that many users). It may also occur innocently, as a result of sending a message to mailing lists and not realizing that the list explodes to thousands of users, or as a result of an incorrectly set-up responder message. Flooding, or SYN floods, occurs when a target machine is flooded with TCP connection requests. The target host becomes extremely slow, crashes or hangs. Broadcast or “smurf” attacks cause network links to become overloaded. The “smurf” attack sends a stimulus stream of ICMP echo requests (“pings”) to the broadcast address of a subnet.
Having read the ICN Acceptable Use Policy, the undersigned agrees to abide by the provisions herein. By signing this document, the undersigned acknowledges that if the provisions of the Policy are violated, the undersigned may be subject to disciplinary action or referral to the legal authorities. If disciplinary action is initiated, due process as provided by the Illinois Century Network policy will be followed. In consideration for the privilege of using the ICN and in consideration for having access to the public networks, I hereby release the ICN, its staff, and any institutions with which they are affiliated from any and all claims and damages of any nature arising from my use of, or inability to use, the system, including, without limitation, the type of damages identified in the ICN’s acceptable use policy.