Skip to main content
close
Font size options
Increase or decrease the font size for this website by clicking on the 'A's.
Contrast options
Choose a color combination to give the most comfortable contrast.

Public Computers & WiFi Access


All branches of the Prince George’s County Memorial Library System (PGCMLS) offer workstations to help with customers’ computing needs.

  • PC Access: You will need a valid PGCMLS library card or computer access card (register for a computer access card by giving only name, zip code and date of birth; with this card, you will be able to use our public computers, but not have full borrowing privileges). Each reserved session is for 60 minutes; time may be automatically extended if no one is waiting. PCs offer Internet access, MS Office Suite, Library catalog and online resources. Files can usually be saved to USB/thumb drives (customers must provide their own).
  • Catalog Only PCs: Offer access to the Library’s catalog, event calendar and other Library online resources, no Internet access. Not all branches provide catalog-only PCs.
  • Reserved PCs: Offer Internet access, MS Office Suite, Library catalog and online resources. Files can be saved to flash drives, or copied to a writable CD. Customers must provide their own media. You will need a valid PGCMLS library card or computer access card to reserve a session without the intervention of a library staff member. Each reserved session is for 60 minutes; time may be automatically extended if no one is waiting.
  • Express PCs: Offer 15 minutes of use only. Time may not be extended. Not all branches have express PCs.
  • Printing: Printing from Library PCs costs 15 cents per printed page. Color printing is available at The Laurel, New Carrollton, South Bowie and Spauldings branches (60 cents per page).
  • Wireless Access: Wireless access is available at all branches.

Acceptable Use Policy

The Library provides free access to the Internet as part of its mission to promote literacy, lifelong learning, personal fulfillment and the principles of intellectual freedom. Prince George’s County Memorial Library supports the free flow of information and ideas over the Internet. Your access to the service is conditioned on legal and appropriate use of the service. Responsibility for youth using the internet rests with the guardian, not with the Library personnel. Your use of the service and any activities conducted online through the service shall not violate any applicable law or regulation or the rights of PGCMLS or any third party.

Staff members are authorized to terminate the session of any customer who fails to comply with this policy, to take further action in accordance with the Library Rules of Behavior and to report illegal activity of which they become aware to the appropriate authorities for prosecution. The use of the Service for the following activities is prohibited:

Interfere with or Disrupt Other Users
Engaging in any activity that interferes or disrupts others

Intellectual Property Right Violations
Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including patents, copyrights, trademarks, service marks, trade secrets, or any other proprietary right of any third party.

Obscene or Indecent Materials
Using the PGCMLS network to advertise, solicit, transmit, store, post, display, or otherwise make available obscene or indecent images or other materials. PGCMLS will notify and fully cooperate with law enforcement if it becomes aware of any use of the service in any connection with child pornography or the solicitation of sex with minors.

Defamatory or Abusive Language
Using the Service to transmit, post, upload, or otherwise making available defamatory, harassing, abusive, or threatening material or language that encourages bodily harm, destruction of property or harasses another.

Damage, Altering or Degrading of Computer Equipment
Damage or alteration of computer systems or other property of PGCMLS or improper use will not be tolerated and is strictly prohibited.

Forging of Headers
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

Hacking
Accessing illegally or without authorization computers, accounts, equipment or networks belonging to another party, or attempting to penetrate security measures of another system. This includes any activity that may be used as a precursor to an attempted system penetration, including, but not limited to, port scans, stealth scans, or other information gathering activity.

Distribution of Internet Viruses, Trojan Horses, or Other Destructive Activities
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the Node or any connected network, system, service, or equipment.

Facilitating a Violation of this Agreement of Use
Advertising, transmitting, or otherwise making available any software product, product, or service that is designed to violate this Agreement, which includes the facilitation of the means to spam, initiation of pinging, flooding, mailbombing, denial of service attacks, and piracy of software.

Export Control Violations
The transfer of technology, software, or other materials in violation of applicable export laws and regulations, including but not limited to the U.S. Export Administration Regulations and Executive Orders.

Spamming and Invasion of Privacy
Sending of unsolicited bulk and/or commercial messages over the Internet using the Service or using the Service for activities that invade another's' privacy.

Other Illegal Activities
Using the Service in violation of applicable law and regulation, including, but not limited to, advertising, transmitting, or otherwise making available Ponzi schemes, pyramid schemes, fraudulently charging credit cards, pirating software, or making fraudulent offers to sell or buy products, items, or services.

Use of this system constitutes acceptance of the Prince George’s County Memorial Library System Information Technology Services Acceptable Usage Guidelines.


Workstation Use Policy

Workstations must be used in accordance with the PGCMLS Internet Policy and Acceptable Use Policy. These workstations are intended for searching the Library catalog, licensed databases and Internet information resources.

In the interest of serving all our customers, the Library reserves the right to set time limits on workstations. Users must vacate a computer when asked to do so by library staff.

Users may print information at a cost of 15 cents per page. We recommend that users always preview the number of pages in a document before selecting the print option to avoid having to pay for unnecessary pages. Please make an effort to conserve paper. The user assumes all responsibility for his/her use.

Users are reminded to follow Netiquette (Internet etiquette) and to be responsible and courteous to other users. Librarians will be available to assist users in accessing information.

If a user's behavior becomes inappropriate, the Library reserves the right to end the session.

Users wishing to save material are responsible for bringing and using their own storage media. Downloading from personal storage media to a Library computer is not allowed.


Internet Policy

The Internet, as an information resource, enables the Library to provide information beyond the confines of its own collections. It allows access to information, ideas and commentary from around the world. This global network of networks, accessible via the workstation, is unregulated. It offers access to a wealth of material that is personally, professionally and culturally enriching to individuals of all ages. It also enables access to material that may be inaccurate, offensive or disturbing.

Prince George's County Memorial Library System (PGCMLS) upholds and affirms the right of each individual to have access to constitutionally protected material. Access to obscene matter, visuals harmful to children and child pornography is prohibited on all Library computers. Toward that end, PGCMLS has in place software designed to filter prohibited materials on workstations. There are also procedures in place to enforce the policy. PGCMLS respects the rights and responsibility of parents to determine and monitor their children's use of library materials and resources and cautions parents against relying on software to protect the children or themselves from unwanted content.

The Library's Rules of Conduct, which are posted, and the procedures for enforcing the rules have been endorsed by the Board of Library Trustees and are a public record.


Guidelines for Wireless Access

  • The Library offers Wireless Internet access as a courtesy to our customers.
  • All Library rules and policies apply to Wireless Internet (WiFi) access from our branches. The Library reserves the right to deny wireless access to customers violating our policies. Please view our Acceptable Use Policy.
  • The Library is not responsible for customer possessions that are lost, stolen or damaged.
  • Customers are responsible for understanding how to enable wireless connections on their own computers. Staff will not be able to physically handle customer computers or assist with configuring wireless access. The Library does not guarantee wireless connectivity.
  • The Library does not guarantee the availability of AC outlets for customer equipment.
  • The Library is not responsible for customer files, disks, and email accounts or for the security or privacy of online communications.
  • The Library is not responsible for viruses, malicious code or any other outcome resulting from customer Internet activity.