The Aurora Public Library permits patrons to connect their own equipment to the Internet via a wireless network, or "hotspot." The Library has designed the wireless network so as to reduce the chances of patron equipment being "hacked.” However, the parties acknowledge that security errors and hacking are an inherent risk associated with wireless Internet use and hotspot services. For that reason, users expressly agree that they knowingly assume such risk, and further agree to hold the Aurora Public Library harmless from any claim or loss arising out of or related to any such event of hacking or other unauthorized use or access into their computer.
The Library accepts no responsibility regarding the ability of patron owned equipment to connect to the wireless network.
Individuals accessing the Internet using their own equipment via the Library’s wireless connection must comply with this policy while on Library premises.
The Aurora Public Library accepts no responsibility for any software downloaded and/or installed, e-mail opened, or sites accessed while patrons are on the wireless Internet connection. Any damage to the patron’s equipment from viruses, plug-ins or other Internet born programs is the sole responsibility of the patron.
Library users access the Internet at their own discretion. The Library has no control over the information available on the Internet. Information may be inaccurate, out of date, or unavailable at times. Some content may be offensive to some patrons.
Patrons should remember that computers using the Library’s Internet connection are located in public areas, which must be shared by Library users of all ages and backgrounds. Individuals may not access potentially disruptive or harmful material and images, such as pornography or obscene images. Although the Library cannot consistently and effectively monitor the public’s use of the Internet, the Library reserves the right to:
Patrons are asked to respect the privacy of those at nearby computers and to refrain from attempting to view or read material being used by others.
Patrons shall use network resources only for lawful purposes and respect copyright regulations.
Destruction of, damage to, or alteration of the Library’s equipment, software, or network security is prohibited. The Library’s equipment is capable of monitoring and detecting viruses and other inappropriate intrusions. The Library will take necessary action against anyone violating this policy, up to and including prohibiting and/or quarantining patron-owned equipment from accessing the network.