A login and password are required so that we may manage the number of users on the network at one time.
This policy covers all wireless data communication devices.
Content filtering is a requirement of our Internet service provider Maine School and Library Network (MSLN)
Responsibility of Library Staff
The Library is not responsible for any loss of data caused by use of the library wireless network. Library staff will strive to inform wireless users of security and privacy policies and procedures related to the use of wireless communications in common areas.
The Library makes available printed directions for configuring a device on the Library wireless network. The Library staff will not configure a user’s computer.
Staff Access Points and Cards
Employees of the library may not provide personal off - the - shelf base stations and access points for themselves. Abuse Interference or disruption of other authorized communications or unauthorized interception of another's wireless traffic is a violation of this policy.
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Any public user in violation of this policy will be denied further access to the wireless network.
Wireless access points operate over a shared bandwidth. As the number of users increase, the available bandwidth per user diminishes dramatically. For that reason, we use methods to limit the number of concurrent users on our wireless network. Users needing higher bandwidth should use a wired library public access computer. As per our agreement with our Internet provider (MSLN), users cannot directly send and receive mail to and from mail servers located outside the MSLN network using the POP mail protocol. Users on the library wireless network must have configured their mail program to use the IMAP protocol in order to access their email directly from a server.*
Wireless networks inherently have greater risks than wired networks because wireless transmissions occur on unlicensed radio frequencies. Consequently, it is difficult to know who or what devices may be connected and listening. Users use the wireless network at their own risk. Users of the library wireless network should consider all unencrypted communications over the network as insecure and available and all content as clear text.
* POP was designed for, and works best in, the situation where you use only a single desktop computer. Normally, messages are downloaded to your desktop computer and then deleted from the mail server.
Adopted: June 17, 2004
Revised: March 21, 2013; April 18, 2013