Internet Safety and Computer Use Policy

The mission of the New Jersey State Library is to adapt quickly and effectively to the dynamics of the information age. As the New Jersey State Library is a gateway and guide to ideas, and information, the Library endeavors to develop collections, services and resources to fulfill this mission. One such resource is the Internet, to which the Library provides free access.


  1. Computer users must be registered New Jersey State Library cardholders. New Jersey residents 17 years of age or older may register for a library card. Out-of-state customers who are at least 17 years of age may request access as a guest user. Those under age 17 may ask library staff to locate information for them.
  2. Computers are available during normal hours of library operation Monday through Friday 8:30 a.m. to 5:00 p.m.
  3. Users are limited to two 60-minute sessions each day. Each session can be extended automatically for an additional 30 minutes, if no one is waiting.
  4. Customers who do not show up for a computer reservation within the 10 minute grace period, automatically lose a session from their daily allotment.
  5. Downloads may be made to a USB flash drive, which are available for purchase at the Circulation desk on level 3 and the Reference desk on level 4.
  6. Print charges are 15 cents per page. State employees and TESU staff are not charged for prints upon presentation of their State or University ID. Uncollected print jobs will be automatically cancelled after three hours.
  7. Library staff does not provide technical help or troubleshooting. Assistance is given in locating information or searching any of the Library’s online databases.
  8. The Library utilizes filtering software on its public computers. Anyone 18 years or older may have the filtering disabled by asking staff at the Law desk on level 3 or the Reference desk on level 4 to do so.
  9. The Library retains the right to reserve computers for special purposes.

User Responsibilities

  1. Respect the privacy of others during their computer sessions.
  2. Illegal use of the Internet is prohibited. The library cooperates fully with authorities wishing to prosecute criminals.
  3. Sending lewd or threatening messages is prohibited.
  4. Sending unsolicited email messages to large numbers of people is prohibited.
  5. Customers may not use their own software programs on the library’s computers or alter the computer settings.
  6. Damaging or altering computer hardware or software is illegal pursuant to NJSA 2A:38A.
  7. Customers may not attempt to circumvent or compromise the security of any host, network, or account. This includes but is not limited to probing the security of other networks, logging into a server or account that the customer is not expressly authorized to access or masquerading as another person in order to obtain access to their account.
  8. Allowing others to use your library barcode or using someone else’s library barcode for access is prohibited.
  9. While using library computers, or the wireless network, customers are expected to abide by policies regarding food, drink and behavior, as outlined in the New Jersey State Library’s Visitor Conduct Policy.

Public access to the State Library computer network and the Internet is a privilege not a right. Failure to comply with this policy will result in the forfeiture of the user’s right to use the Library’s public computers.

Wireless Access

The New Jersey State Library provides unfiltered wireless Internet access. Individuals utilizing the wireless connections agree to comply with all provisions of the current N.J. State Library Internet Safety and Computer Use Policy.

Individuals wishing to use the Library’s wireless Internet access must have a portable device, such as a laptop computer, with a standard wireless network interface card. The State Library does not provide portable devices for library visitors to use and does not provide technical assistance to individuals using their own portable device.

The Library’s wireless Internet access is unencrypted. Use of the wireless connection is done at the individual’s own risk. By using this connection, individuals acknowledge that security errors and hacking are an inherent risk associated with any wireless service. For that reason, individuals expressly agree that they knowingly assume such a risk, and further agree to hold the Library harmless from any claim or loss arising out of, or related to, any such instance of hacking or other unauthorized use of access into the individual’s computer.

The Library accepts no responsibility regarding the ability of the individual-owned equipment to connect to the wireless network. Library staff will not change settings on individual equipment.


  1. The Library makes no guarantees about and is not responsible for the security of information transmitted and received during your Internet sessions; therefore users should be aware that transactions and files could become public.
  2. The Library accepts no responsibility for any software downloaded and/or installed, e-mail opened, or sites accessed while individuals are on the Internet. Users are advised to utilize virus checking software on their own computers to check downloaded files. Any damage done to the individual’s equipment from viruses, identity theft, spyware, plug-ins, or other Internet-born programs, or any loss of data, is the sole responsibility of the individual; and the individual indemnifies and holds harmless the Library from any such damage.
  3. The Library endeavors to provide access to information of the highest quality; however, it specifically disclaims any warrant as to the information’s accuracy, timeliness, authoritativeness, usefulness or fitness for a particular purpose.
  4. The Library will have no liability for direct, indirect or consequential damages related to the use of information accessed through the Library’s Internet service.
  5. The Library, having installed and enforced the operation of filtering software on its public computers in compliance with the Children’s Internet Protection Act, will have no liability for damages related to the operation of, or failure of, the filtering software, or for its circumvention by users.


Revised 12.19.07; 8.15.08; 12.10.08; 4.1.11; 2.22.12; 12.28.15; 8.2.16