Library Information Technology polices

Scarborough Public Library Privacy Policy

The Scarborough Public Library adheres to the following:

We maintain all user information, documents, and records in all formats according to the highest standards of confidentiality and security.

The Scarborough Public Library adheres to the following:

We maintain all user information, documents, and records in all formats according to the highest standards of confidentiality and security.

We use the services of a confidential destruction company to collect and dispose of all confidential documents associated with your library transactions and donations and to dispose of IT equipment such as computer hard drives.

The Library is committed to protecting the privacy of our patrons. We limit our collection and use of borrower information to that which we need to effectively manage library operations, plan our services, and promote the use of the Library.

We do not reveal detailed information to third parties about any borrower transactions except as may be required by library policy or statute.

Our procedures are designed to ensure the accuracy and completeness of our borrower or donor information. Any inaccuracies are addressed immediately.

Information displayed on library public access computers and / or printers is deemed to be confidential and will not be revealed to law enforcement except as required by library policy or statute. Material left in our public copiers and printers is collected for secure disposal.

Borrower information is accessible only to library employees with a business need to see it. We train our employees in their responsibilities in handling confidential borrower information. Confidential borrower information is not discussed in any public areas of the library or in the presence of third parties such as volunteers or trustees.

To search our library catalog successfully, your browser must be set to accept cookies. Like most organizations and businesses, we use cookie technology and similar code on our web sites to facilitate searching and site navigation through our web catalog and to collect non-personal information about users of the library web site and catalog such as:

  1. a user's IP address (i.e., the type of web browser and version (i.e. Firefox, Safari, or Internet Explorer) and operating system (i.e. Windows or MAC) being used,
  2. the pages of the web site a user visits and
  3. the referring web site (i.e. the web site visited just prior to visiting the library web site).

We collect this information in order to monitor functionality of our web site and to improve design aspects of our web site. These cookies and their resulting data do NOT contain any personally identifiable information such as your name or email address.

Any external person or organization offering products or services to our borrowers or staff must receive prior Library Board authorization.

Donations made to the library may be publicly acknowledged unless the donor requests anonymity. The library complies with reporting standards required by standard auditing practice, state, and federal regulations.

Donor mailing lists are compiled from borrower information and other publicly attainable information for the exclusive use of the library and will not be shared with nonaffiliated entities.

The library is not responsible for any personal in formation left in library materials, at the public printer, photocopier or embedded in public access computers.


Approved: 9/21/00; amended 9/18/03; amended 6/21/2007; amended 10/17/2008

Policy on Review of Internet Content Blocking Parameters

Specific determination regarding what matter is inappropriate for minors shall be made by the Library Board of Trustees.*

Content blocking parameters will be reviewed by the Board of Trustees annually or more frequently at the request of the library staff. 

All other actions needed for the protection, management, and optimization of the local area network and its devices will be determined by the network administrator.

Adopted 12/20/2001



*A determination regarding what matter is inappropriate for minors shall be made by the school board, local educational agency, library, or other authority responsible for making the determination. Section 254 (2) of the Communications Act of 1934 (47 U.S.C. 254) amended

Technology Committee Responsibilities

The Technology Committee shall advise the Board of Trustees on matters pertaining to Information Systems policies and planning.

The Technology Committee shall advise the Board of Trustees on matters pertaining to Information Systems policies and planning.

The Committee will:

  • Provide overall guidance for Library information systems policies and long range planning;
  • Review information systems policies and state and federal mandated Technology Plan once every year or more often as needed;
  • Submit for approval recommendations on information systems policy matters to the Board of Trustees;
  • Provide advice to the Personnel Committee, when requested, in the areas of benefits, training, compensation, recruitment, and retention of information systems staff;
  • Provide advice to the Personnel Committee, when requested on information systems staff job descriptions;
  • Identify technology related changes that may have financial implications and report to the Finance Committee regarding these impacts.

Appropriate skills and characteristics for Technology Committee

  • At least one trustee.
  • Those with experience in areas such as transfer of information, management of networks, hardware acquisition and maintenance, software acquisition, end-user support and training.
  • The Library Assistant Director will serve as staff liaison to this committee.


July 31, 2003


Wireless Network Policy

The Library provides a wireless network to allow public access to the Internet before, during, and after library business hours. It is a separate network from the Library wired network and by its nature, like all public hotspots, is less secure.

A login and password are required so that we may manage the number of users on the network at one time.

Devices Covered

This policy covers all wireless data communication devices.

Content Filtering

Content filtering is a requirement of our Internet service provider Maine School and Library Network (MSLN)

Responsibility of Library Staff

The Library is not responsible for any loss of data caused by use of the library wireless network. Library staff will strive to inform wireless users of security and privacy policies and procedures related to the use of wireless communications in common areas.

The Library makes available printed directions for configuring a device on the Library wireless network. The Library staff will not configure a user’s computer.

Staff Access Points and Cards

Employees of the library may not provide personal off - the - shelf base stations and access points for themselves. Abuse Interference or disruption of other authorized communications or unauthorized interception of another's wireless traffic is a violation of this policy.


Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Any public user in violation of this policy will be denied further access to the wireless network.


Wireless access points operate over a shared bandwidth. As the number of users increase, the available bandwidth per user diminishes dramatically. For that reason, we use methods to limit the number of concurrent users on our wireless network. Users needing higher bandwidth should use a wired library public access computer. As per our agreement with our Internet provider (MSLN), users cannot directly send and receive mail to and from mail servers located outside the MSLN network using the POP mail protocol. Users on the library wireless network must have configured their mail program to use the IMAP protocol in order to access their email directly from a server.*

Wireless networks inherently have greater risks than wired networks because wireless transmissions occur on unlicensed radio frequencies. Consequently, it is difficult to know who or what devices may be connected and listening. Users use the wireless network at their own risk. Users of the library wireless network should consider all unencrypted communications over the network as insecure and available and all content as clear text.

* POP was designed for, and works best in, the situation where you use only a single desktop computer. Normally, messages are downloaded to your desktop computer and then deleted from the mail server.


Adopted: June 17, 2004
Revised: March 21, 2013; April 18, 2013