Telecommunications Policy

Security and privacy of patron information and system passwords must be a cornerstone of our telecommunications system.

Information protected by state law, including patron information, and private system information, such as passwords, must not be sent over the Internet without encryption or other secure transmission methods in our member libraries.

Library local area networks (LANs) must be set up to segregate staff traffic from library user traffic via Virtual LANs or other security methodology to prevent data eavesdropping. All staff wireless access must have the maximum degree of security enabled.

Interconnections with other local area networks or wide area networks, including municipal and academic networks, must be configured to protect the security of the patron and staff information of the library. Additional network security enhancements may be required to preserve security in the interconnection and are the responsibility of the library.

NOBLE-provided lines, software and equipment must be used exclusively for library services, and are not to be used for other purposes, such as HVAC systems, security systems or telephone systems including cell phone hot spots, to maintain optimum security and throughput. Third-parties must not be granted access to NOBLE-supported telecommunications systems by member libraries. While NOBLE will assist and consult as reasonable, construction, troubleshooting and maintenance of library LANs and related equipment beyond the NOBLE router (if applicable) is the responsibility of the library. Any equipment provided by NOBLE remains the property of NOBLE.

Use of the NOBLE-provided telecommunications system for illegal purposes or to transmit threatening, obscene or harassing materials is strictly prohibited. Using library computers and telecommunications system to copy and distribute copyright protected works may be an infringement of the copyright law (Title 17 U.S. Code). In a case where copyright violation is alleged the library agrees to investigate and remove any alleged infringing material as soon as possible.

Approved by Meeting of the Members, May 5, 2011, amended September 24, 2015.