{"id":601,"date":"2025-11-18T11:48:08","date_gmt":"2025-11-18T17:48:08","guid":{"rendered":"https:\/\/www.cmrlstest.lib.ms.us\/?page_id=601"},"modified":"2025-11-18T11:48:08","modified_gmt":"2025-11-18T17:48:08","slug":"public-computer-and-internet-safety-policy","status":"publish","type":"page","link":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/about-us\/policies\/public-computer-and-internet-safety-policy\/","title":{"rendered":"Public Computer and Internet Safety Policy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_heading title=&#8221;CMRLS Public Computer and Internet Safety Policy&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; title_text_align=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_heading][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; link_font=&#8221;||||on||||&#8221; ul_item_indent=&#8221;40px&#8221; ol_position=&#8221;outside&#8221; ol_item_indent=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>CENTRAL MISSISSIPPI REGIONAL LIBRARY SYSTEM<\/strong><\/p>\n<p><strong>PUBLIC COMPUTER AND INTERNET SAFETY POLICY<\/strong><\/p>\n<p><strong>Purpose<\/strong><\/p>\n<p>Central Mississippi Regional Library System\u2019s mission is to provide materials and services to help residents of our communities obtain information to meet their needs.\u00a0 Computers and the Internet are electronic tools provided by the library to assist in accomplishing this mission.<\/p>\n<p><strong>Definitions<\/strong><\/p>\n<p>Key terms are as defined in the<span>\u00a0<\/span><a href=\"http:\/\/tinyurl.com\/owagzuv\">Children\u2019s Internet Protection Act<\/a>.* (<a href=\"http:\/\/tinyurl.com\/owagzuv\">http:\/\/tinyurl.com\/owagzuv<\/a>)<\/p>\n<p><strong>Computers and the Internet<\/strong><\/p>\n<p>Computers and the Internet are an everyday part of our lives.\u00a0 The Internet is a global collection of computers and people, all linked together to provide the latest information on any subject.\u00a0 This is a new frontier for communicating and exchanging information.<\/p>\n<p>There is no one in control of the Internet.\u00a0 Anyone with a computer can access or place information on the Internet.\u00a0 Its available resources may contain material that is controversial, inaccurate, and\/or outdated.\u00a0 Central Mississippi Regional Library System staff has no control over the information accessed through the Internet and cannot be held responsible for its content.\u00a0 It is the policy of Central Mississippi Regional Library System to: (a) prevent user access over its computer network to, or transmission of, inappropriate material via Internet, electronic mail, or other forms of direct electronic communications; (b) prevent unauthorized access and other unlawful online activity; (c) prevent unauthorized online disclosure, use, or dissemination of personal identification information of minors; and (d) comply with the Children\u2019s Internet Protection Act [Pub. L. No. 106-554 and 47 USC 254(h)].\u00a0 All computers with Internet access have technology protection measures installed.\u00a0 To the extent practical, technology protection measures (or \u201cInternet filters\u201d) shall be used to block or filter Internet, or other forms of electronic communications, access to inappropriate information. \u00a0 Specifically, as required by the Children\u2019s Internet Protection Act, blocking shall be applied to visual depictions of material deemed obscene or child pornography, or to any material deemed harmful to minors.\u00a0 Subject to staff supervision, technology protection measures may be disabled or, in the case of minors, minimized only for bona fide research or other lawful purposes.\u00a0 Adults (Age 18 and over) may request the filter be deactivated for the purpose of bona fide research.\u00a0 Please see<span>\u00a0<\/span><strong>Disclaimer<\/strong><span>\u00a0<\/span>on page 2.<\/p>\n<p>In offering Internet access, library staff cannot control access points that change rapidly and unpredictably.\u00a0 Library staff cannot control the speed of Internet access during times of peak Internet usage.\u00a0 Library staff will assist with Internet as time allows.<\/p>\n<p><strong>Responsibility of Users<\/strong><\/p>\n<p>Parents\/legal guardians have the responsibility for deciding what resources their children will use in the library.\u00a0 Parents\/legal guardians should let their children know what they can and cannot access on the Internet.\u00a0 Parents must supervise their children\u2019s use of the Internet.\u00a0 A child under the age of thirteen can only use the Internet if they are accompanied by the parents\/legal guardians or adult responsible for the child.<\/p>\n<p>Users under the age of eighteen must have a signed permission form on file with the library.\u00a0 A parent must accompany a user under the age of eighteen and sign the permission form in the presence of a library staff member.\u00a0 Parents must also bring a picture I.D. with them.<\/p>\n<p>Parents and children are encouraged to read<span>\u00a0<\/span><strong>Child Safety on the Information Highway<\/strong><span>\u00a0<\/span>and<span>\u00a0<\/span><strong>My Rules for Online Safety<\/strong>, distributed with permission of the National Center for Missing and Exploited Children.\u00a0 It is the sole responsibility of the parent to make the child understand that he\/she should not give out personal information.\u00a0 CMRLS will not allow nor be responsible for any unauthorized disclosure, use, and dissemination of personal information regarding minors.<\/p>\n<p>Users\u2019 eighteen (18) and older must read the policy and must sign a user agreement form.<\/p>\n<p><strong>Internet Functions Supported<\/strong><\/p>\n<p>Central Mississippi Regional Library System provides access to text and graphical interfaces.\u00a0 Web-based e-mail is available and will be filtered.\u00a0 Printing and downloading are also available.<\/p>\n<p><strong>Responsibilities of Staff<\/strong><\/p>\n<p>It shall be the responsibility of all members of the Central Mississippi Regional Library System to educate, supervise and monitor appropriate usage of the online computer network and access to the Internet in accordance with this policy, the Children\u2019s Internet Protection Act, the Neighborhood Children\u2019s Internet Protection Act, and the Protecting Children in the 21<sup>st<\/sup><span>\u00a0<\/span>Century Act.<\/p>\n<p>Procedures for the disabling or otherwise modifying any technology protection measures shall be the responsibility of the Branch Manager or his\/her designated representatives.<\/p>\n<p>Library staff should provide computer assistance to the public as time permits.\u00a0 Patrons may use ONLY computers designated for public use.\u00a0 Library staff will provide assistance with equipment malfunctions.<\/p>\n<p><strong>Disclaimer<\/strong><\/p>\n<p>Central Mississippi Regional Library System assumes no responsibility for damages caused by programs downloaded from the Internet.<\/p>\n<p>The U.S. copyright law (Title 17, U.S. Code) prohibits the unauthorized reproduction or distribution of copyrighted materials, except as permitted by the principles of \u201cfair use.\u201d\u00a0 Users may not copy or distribute electronic materials (including electronic mail, text, images, programs or data) without the explicit permission of the copyright holder.<\/p>\n<p>The Mississippi Code 1972, annotated:<\/p>\n<p>\u2013 Section 97-5-29 prohibits the public displaying of sexually oriented materials.<\/p>\n<p>\u2013 Section 97-45-3 prohibits computer fraud.<\/p>\n<p>\u2013 Section 97-45-7 prohibits offenses against compute equipment.<\/p>\n<p>Please read the attached codes.<\/p>\n<p><strong>Responsibility<\/strong><\/p>\n<p>Any responsibility for any results of copyright infringement lies with the user.<\/p>\n<p>Responsibility for any results of disobeying the Mississippi Code 1972\u00a0 lies with the user.<\/p>\n<p>Central Mississippi Regional Library System expressly disclaims any liability or responsibility arising from access to or use of information obtained through the Internet.<\/p>\n<p><strong>\u00a0<\/strong><strong>Rules Governing Use of the Computers and the Internet<\/strong><\/p>\n<ol>\n<li>Patron must have a valid library card or computer use only card.\u00a0\u00a0 Non-residents, visiting the library for a single visit, may use the Public Access computers by presenting valid legal identification to obtain a single use Guest Pass.\u00a0 Non- residents, wishing to use the Public Access computers for more than a single visit, must apply for a computer use only card.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li>The library does not provide electronic mail accounts.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li>No food or drink is allowed around computer equipment.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li>Headphones must be used for programs with sound.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li>Patrons may sign up for three thirty (30) minute sessions per day for computer use.\u00a0 If no one else is waiting to use the computers, patron\u2019s time may be extended.\u00a0 Patrons may also call the library to schedule time on the computer.\u00a0 Patrons, thirteen years and older, using Express Computers will be limited to a fifteen (15) minute session, with no extension of time.\u00a0 Patrons may access the Express Computers three (3) times per day.<\/li>\n<\/ol>\n<ol start=\"6\">\n<li>Patrons who are more than five (5) minutes late for pre-scheduled time may forfeit time requested to the next patron waiting.<\/li>\n<\/ol>\n<ol start=\"7\">\n<li>Patrons may purchase a CD or a jump drive for downloading or saving a file.\u00a0 The cost per CD is $1.00, and the cost of a jump drive is $10.00.<\/li>\n<\/ol>\n<ol start=\"8\">\n<li>Copies made from the computer workstations are $.25 per copy.\u00a0 If front and back are copied, the total cost is $.50.\u00a0 Color copies are $0.50 per copy. Patrons must present a valid library card to pick up printed copies.<\/li>\n<\/ol>\n<ol start=\"9\">\n<li>Information cannot be saved on the hard drive of the computers.\u00a0 CMRLS reserves the right to erase any files or materials on the hard drive at any time.\u00a0 The Library is not responsible for loss of patron data on the computers.<\/li>\n<\/ol>\n<ol start=\"10\">\n<li>Patrons may not install any software; alter or attach any equipment to the Library\u2019s hardware.<\/li>\n<\/ol>\n<ol start=\"11\">\n<li>Unaccompanied adults are prohibited from using Public Access Computers in areas specifically designated Juvenile and\/or Young Adult spaces.<\/li>\n<\/ol>\n<ol start=\"12\">\n<li>Misuse of the computer or Internet access will result in loss of your computer privileges.\u00a0 Violators of this policy may lose library privileges.\u00a0 Specifically, as required by the Children\u2019s Internet Protection Act, prevention of inappropriate network use includes: (a) unauthorized access, including so-called \u2018hacking,\u2019 and other unlawful activities; and (b) unauthorized disclosure, use, and dissemination of personal identification information regarding minors, and will be subject to prosecution by local, state, or federal authorities.<\/li>\n<\/ol>\n<p><strong>Warnings and Penalties<\/strong><\/p>\n<p>Although CMRLS utilizes McAfee virus protection software on all library computers, there is no guarantee that files downloaded from the Internet are virus-free.\u00a0\u00a0 Central Mississippi Regional Library System assumes no responsibility for any downloaded files that contain a virus.<\/p>\n<p>Actions that cause damage to equipment or software, willful violation of library policies, or refusal to follow staff directions will result in the loss of computer privileges.<\/p>\n<ul>\n<li>The library staff reserves the right to terminate computer use or to deny use to those who engage in illegal activities as specified by the Mississippi Code 1972, Annotated. Computer privileges will be revoked permanently.<\/li>\n<\/ul>\n<ul>\n<li>Branch library staff may terminate computer use for a day.\u00a0 Revocation of Computer Privileges must be determined by the CMRLS Board of Trustees.<\/li>\n<\/ul>\n<ul>\n<li>A written warning will be issued for the first documented case of computer abuse noted on a patron\u2019s record.\u00a0 A second documented case of computer abuse will result in the patron\u2019s computer privileges being revoked for a period of six (6) months.<\/li>\n<\/ul>\n<ul>\n<li>Patron may request that their computer privileges be reinstated by talking to the Branch Manager. If a patron is reinstated, and violates any computer use policies, the patron\u2019s computer privileges will be permanently revoked.\u00a0 Permanent revocation may not be appealed.<\/li>\n<\/ul>\n<ul>\n<li>Vandalism or patron misuse that results in damage to library computer equipment will result in computer use being revoked for a period of six (6) months. All acts of vandalism or misuse must be documented by CMRLS staff.<\/li>\n<\/ul>\n<ul>\n<li>The patron will be responsible for penalties which include the cost of repair or replacement equipment including labor and mileage incurred by CMRLS staff.\u00a0\u00a0 Parents\/Legal Guardians are responsible for damage caused by children. All library privileges will be revoked until payment of all penalties are paid in full.<\/li>\n<\/ul>\n<p><strong>Adoption<\/strong><\/p>\n<p>This Public Computer and Internet Safety Policy was adopted by the Board of Trustees of Central Mississippi Regional Library System at a public meeting, following normal public notice, on November 27, 2001.<\/p>\n<p>&nbsp;<\/p>\n<p>POLICY APPROVED AND \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0Date: November 27, 2001<\/p>\n<p>ADOPTED BY: THE LIBRARY BOARD OF CMRLS\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Revised: May 28, 2002<\/p>\n<p>Revised: November 22, 2005<\/p>\n<p>Revised: November 28, 2006<\/p>\n<p>Revised: February 28, 2006<\/p>\n<p>______________________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Revised: April 28, 2021<\/p>\n<p>President<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Central Mississippi Regional Library System<\/strong><\/p>\n<p><strong>Computer and Internet Safety User Agreement<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>As a user of the library\u2019s computers and access to the Internet, I have read, understand, and will abide by the policy and rules governing the computers and Internet use.<\/p>\n<p>&nbsp;<\/p>\n<p><u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0____________________________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>Print Name<\/p>\n<p>&nbsp;<\/p>\n<p><u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_______________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span>\u00a0<\/span><\/u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_____________________<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>Signature\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0Date<\/p>\n<p>&nbsp;<\/p>\n<p>Staff Name:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0___________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Parental Permission Agreement Form<\/strong><\/p>\n<p>As the parent\/legal guardian of the minor child named below, I have read, understand, and agree with the policy and rules governing CMRLS Internet access.\u00a0 I accept the responsibility and agree to allow my child, age thirteen (13) to seventeen (17), to use the Internet independently.\u00a0 I agree to accompany and remain with my child under the age of thirteen while he\/she uses the Internet.<\/p>\n<p>I hereby grant permission for my child to access the Internet at any of the libraries in the Central Mississippi Regional Library System.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Parents\u2019 Signature:<\/strong><u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0__________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Parent Name:<\/strong><u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0____________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>(Please print your name)<\/p>\n<p>&nbsp;<\/p>\n<p>Child\u2019s Name:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0____________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>(Please print your child\u2019s name)<\/p>\n<p>&nbsp;<\/p>\n<p>Child\u2019s Age:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_____\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span>\u00a0<\/span><\/u>\u00a0\u00a0Child\u2019s Birthday:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p>Address:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0____________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p>_______________________________________________________________________<\/p>\n<p>&nbsp;<\/p>\n<p>PhoneNumber:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_________________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p>Date:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0______________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/u>_____<\/p>\n<p>&nbsp;<\/p>\n<p>Staff Name:<u>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0_________________________________\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0<\/u><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Mississippi Code 1972, Annotated<\/strong><\/p>\n<p><strong>Section 97-5-29.\u00a0\u00a0 Public Display of Sexually Oriented Materials.<\/strong><\/p>\n<p>(1) Any person who intentionally and knowingly places sexually oriented materials upon public display, or who knowingly and intentionally fails to take prompt action to remove such a display from property in his possession after learning of its existence shall be guilty of a misdemeanor and upon ($500.00) nor more than five thousand dollars ($5,000.00) or be imprisoned for not more than one (1) year in the county jail, or be punished by both such fine and imprisonment.<\/p>\n<p>(2) For purposes of this section any material is sexually oriented if the material consists of representations or descriptions of actual or simulated masturbation, sodomy, excretory functions, lewd exhibition of the genitals or female breast, sadomasochistic abuse (for the purpose of sexual stimulation or gratification), homosexuality, lesbianism, bestiality, sexual intercourse, or physical contact with a person\u2019s clothed or unclothed genitals, public area, buttocks, or the breast or breasts of a female for the purpose of sexual stimulation, gratification or perversion.<\/p>\n<p>(3) A person places sexually oriented material upon public display within the meaning of this section if he places the materials on or in a billboard, viewing screen, theater stage or marquee, newsstand, display rack, window, showcase, display case or similar place so that sexually oriented materials is easily visible from a public street, public road or sidewalk or from areas of public business in which minors are normally business invitees.<\/p>\n<p><strong>Sources: Laws, 1979, ch. 475, 2, eff from and after July 1, 1979.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Section 97-45-3.\u00a0 Computer Fraud; Penalties.<\/strong><\/p>\n<p>(1) Computer fraud is the accessing or causing to be accessed of any computer, computer system, computer network, or any part thereof with the intent to:<\/p>\n<p>(a) Defraud; or<\/p>\n<p>(b) Obtain money, property or services by means of false or fraudulent conduct, practices or representations; or through the false or fraudulent alteration, deletion or insertion of programs or data.<\/p>\n<p>(2) Whoever commits the offense of computer fraud shall be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00), or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.<\/p>\n<p><strong>Sources: Laws, 1985, ch. 319, 2, eff from and after July 1, 1985<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Section 97-45-7. Offense Against Computer Equipment; Penalties.<\/strong><\/p>\n<p>(1) An offense against computer equipment or supplies is the intentional modification or destruction, without consent, of computer equipment or supplies used or intended to be used in a computer, computer system or computer network.<\/p>\n<p>(2) Whoever commits an offense against computer equipment or supplies shall be punished, upon conviction, by a fine of not more than One Thousand Dollars ($1,000.00), or by imprisonment for not more than six months or both such fine and imprisonment.\u00a0 However, when the damage or loss amounts to a value of One Hundred Dollars ($100.00) or more, the offender may be punished, upon conviction, by a fine of not more than Ten Thousand Dollars ($10,000.00) or by imprisonment for not more than five (5) years, or by both such fine and imprisonment.<\/p>\n<p><strong>Sources: Laws, 1985, ch. 319, 4, eff from and after July 1, 1985.<\/strong><\/p>\n<p>* CIPA Definition of Terms:<\/p>\n<p><strong>TECHNOLOGY PROTECTION MEASURE<\/strong><strong>.<\/strong>\u00a0 The term \u201ctechnology protection measure\u201d means a specific technology that blocks or filters Internet access to visual depictions that are:<\/p>\n<ol>\n<li>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span>\u00a0<\/span><strong>OBSCENE,<\/strong><span>\u00a0<\/span>as that term is defined in section 1460 of title 18, United States Code;<\/li>\n<li>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<span>\u00a0<\/span><strong>CHILD PORNOGRAPHY<\/strong>, as that term is defined in section 2256 of title 18, United States Code; or<\/li>\n<li>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Harmful to minors.<\/li>\n<\/ol>\n<p><strong>HARMFUL TO MINORS<\/strong>.\u00a0 The term \u201charmful to minors\u201d means any picture, image, graphic image file, or other visual depiction that:<\/p>\n<ol>\n<li>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Taken as a whole and with respect to minors, appeals to a prurient interest in nudity, sex, or excretion;<\/li>\n<li>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Depicts, describes, or represents, in a patently offensive way with respect to what is suitable for minors, and actual or simulated sexual act or sexual contact, actual or simulated normal or perverted sexual acts, or a lewd exhibition of the genitals; and<\/li>\n<li>Taken as a whole, lacks serious literary, artistic, political, or scientific value as to minors.<\/li>\n<\/ol>\n<p><strong>SEXUAL ACT; SEXUAL CONTACT.\u00a0<span>\u00a0<\/span><\/strong>The terms \u201csexual act\u201d and \u201csexual contact\u201d have the meanings given such terms in section 2246 of title 18, United States Code.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CENTRAL MISSISSIPPI REGIONAL LIBRARY SYSTEM PUBLIC COMPUTER AND INTERNET SAFETY POLICY Purpose Central Mississippi Regional Library System\u2019s mission is to provide materials and services to help residents of our communities obtain information to meet their needs.\u00a0 Computers and the Internet are electronic tools provided by the library to assist in accomplishing this mission. Definitions Key [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":583,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-601","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/pages\/601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/comments?post=601"}],"version-history":[{"count":2,"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/pages\/601\/revisions"}],"predecessor-version":[{"id":604,"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/pages\/601\/revisions\/604"}],"up":[{"embeddable":true,"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/pages\/583"}],"wp:attachment":[{"href":"https:\/\/www.cmrlstest.lib.ms.us\/index.php\/wp-json\/wp\/v2\/media?parent=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}