College & Research Libraries News
The library takes the lead: Wichita State University Library proposes a university-wide Internet policy
What happens when the library takes the lead in creating the university’s Internet policy? At Wichita State University (WSU), Ruth Jackson, dean of libraries, took the ini- tiative to find this out. In spring 2000, she formed the “Ad Hoc Committee to Develop a Policy on Internet Access and Pornogra- phy.” The charge was to review existing li- brary policy and recommend a policy that would be uniformly applicable to the cam- pus community. This article will discuss some of the processes we used to get through the rigorous process of drafting a university-wide Internet policy.
From earlier discussions among the library faculty, two common goals emerged regarding Internet use, which became the working values for our committee: to preserve academic and intellectual freedom and to protect patrons’ right to privacy. By taking the lead, the libraries were able to create Internet policies and procedures from a proactive stance, rather than a reactive one, guaranteeing open access.
Jackson made a vital decision to include representatives from key technology service points, as well as representatives from the student body and faculty, on the committee. The 12-member committee included 8 library members, representing staff, faculty, technical services, reference, circulation, and interlibrary loan. In addition, University Computing, Media Resource Center, Student Government Association, and Faculty Senate each sent a representative. It was important, if the policy was to be accepted, that representatives from areas outside the library have a voice.
As the chair of the “porn” committee, as we came to be known, I decided to conduct informal meetings with the goal of creating an environment conducive to open sharing of experiences and opinions.
Getting started
Each member left our first meeting in June 2000 with an information-gathering assignment. The areas we looked at included legal cases involving the Internet and libraries, pending legislation, library literature, Internet policies from other institutions nationally and locally (including academic and public), university policies, and technological options (i.e., privacy screens). A central reading file was created that continued to expand through the course of our committee work.
We also monitored legislation being considered at the time (including CIPA, COPA, and the McCain amendment) and court cases involving Internet access and libraries. I continued to monitor relevant cases and legislation to maintain a current awareness as the issues surrounding Internet access in public spaces continued to evolve.
About the author
Beth A. Smith is engineering librarian at Wichita State University, e-mail:beth.smith@wichita.edu
By taking the lead, the libraries were able to create Internet policies and procedures from a proactive stance, rather than a reactive one, guaranteeing open access.
Through our literature search, we found an article by Janis DybdahP that provided a list of elements that libraries in her study included in their Internet policies. We used this as a checklist to guide discussions about the types of things we wanted to include in our Internet policy.
Sharing perspectives
The wide range of experiences of the group gave our committee a broader perspective of the issues than if any single group had written the Internet policy. For example, when researching the cost of placing privacy screens on each of the public terminals, one of our members recounted the experience of another library in the state that had tried this. The reference librarians at that institution complained that the privacy screens made it difficult to assist patrons with their work.
Therefore, in our final recommendations to the dean regarding library procedures, we suggested placing privacy screens on a small bank of computers. Patrons could use these computers to ensure their privacy or they could be asked to move to those computers if there were complaints regarding the material they are viewing.
Our Computing Center member had experience with filters at a small private college. The filters lasted 13 hours before the cry of “Academic Freedom!” was heard and legal action threatened. Ironically, the day after our first meeting, a patron approached me at the reference desk to inform me that another patron was viewing child pornography. At our second meeting, I was armed with this information and able to share my experience with the committee.
Maintaining focus
A clear charge was necessary to keep discussion on track, as we found ourselves bogged down in trying to consider procedures for the library. It was important for the committee to review its charge to focus the discussion. Our role was to recommend policy. We decided, as a committee, that procedures should be the responsibility of the individual departments. The library members on the committee did make some recommendations to the dean of libraries regarding procedures after the final draft of the policy had been completed.
In looking at WSU’s existing policies, the committee discovered that the library and University Computing each had a policy, and that the campus e-mail policy was an entirely separate document from those. However, the library policy was outdated and University Computing’s policy had never been discussed with the library during its creation. (The University Computing representative admitted to sending students viewing “objectionable” material to the library on occasion.)
In addition to assessing technology policies across campus, we reviewed the university’s sexual harassment policy and talked to campus police regarding their policies and procedures.
Although the libraries’ former Internet-use policy was too vague for the current environment, we felt the basic premise could be maintained. Our goal was to create a policy that gave more detail and examples of what was not “acceptable use.”
Writing the policy
We looked at a wide range of Internet policies from academic libraries, public libraries, and institutions. Many were too restrictive or contained language that we considered vague, such as banning the viewing of “objectionable” material. We considered this as too subjective and something that would place librarians in the role of the Internet police.
Rutgers University’s “Acceptable Use Policy for Computing and Information Technology Resources”2 had the kind of detail our policy was lacking, and, with the author’s permission, we used it as our model. Rather than listing a vague statement that illegal activity is prohibited, specific actions are listed in the Rutgers’ policy as being illegal by federal and state statutes, e.g., “to make more copies of software than allowed by license or to view, download, distribute, or possess child pornography. …”
A subcommittee of three librarians was selected to actually write WSU’s policy. The first draft was completed in August 2000 and was sent to all members. The full committee met to discuss changes and subsequent drafts were sent as e-mail attachments. I kept meetings at a minimum until the final wrap-up session. After eight drafts, the final document was completed and unanimously approved by the full committee in November 2000.
By fall 2001, all levels of the university administration had accepted the policy. It has made its way through the Faculty Senate Library Committee, university counsel, several vice presidents, and the president of the university. In line with the committee’s recommendation to consolidate all university Internet and information policies, Jackson has been appointed chair of the University Technology Subcommittee to Review WSU Technology Policies.
The creation of the university-wide Internet policy was a lengthy process, especially for the library representatives involved. Three key elements helped us to succeed: involving all the technology centers on campus, the thoroughness of our research, and maintaining a relaxed team atmosphere with a common goal.
What happens when the library takes the lead in creating the university’s Internet policy? At Wichita State University the result is a uniform Internet-use policy that preserves intellectual freedom and protects individuals’ right to privacy.3
Notes
- Janis Dybdahl, “Internet use policy: some features to consider.” Colorado Libraries (1999) 25:43-7.
- “Acceptable use policy.” Rutgers University, available at http://rucs.rutgers.edu/ acceptable-use.html; accessed 2002, June 10. See also, “Acceptable use guidelines.” Rutgers University, available at http://rucs.rutgers.edu/ acceptable-use-guide.html; accessed 2002, June 10.
- The author thanks the members of the Ad Hoc Committee to Develop a Policy on Internet Access and Pornography for all of their hard work. Thanks to David Duncan, Ted Naylor, and Sandy MacGill for drafting the policy. Special thanks to Janet Brown, Ted Naylor, and Kristen Sen for their roles in presenting the policy for the Kansas Library Association. ■
Article Views (By Year/Month)
| 2026 |
| January: 8 |
| 2025 |
| January: 7 |
| February: 2 |
| March: 9 |
| April: 8 |
| May: 10 |
| June: 70 |
| July: 8 |
| August: 14 |
| September: 24 |
| October: 28 |
| November: 26 |
| December: 27 |
| 2024 |
| January: 1 |
| February: 0 |
| March: 1 |
| April: 7 |
| May: 9 |
| June: 4 |
| July: 7 |
| August: 8 |
| September: 2 |
| October: 1 |
| November: 4 |
| December: 6 |
| 2023 |
| January: 3 |
| February: 2 |
| March: 2 |
| April: 7 |
| May: 2 |
| June: 0 |
| July: 1 |
| August: 0 |
| September: 2 |
| October: 1 |
| November: 1 |
| December: 2 |
| 2022 |
| January: 0 |
| February: 2 |
| March: 0 |
| April: 0 |
| May: 2 |
| June: 4 |
| July: 3 |
| August: 2 |
| September: 4 |
| October: 0 |
| November: 1 |
| December: 1 |
| 2021 |
| January: 8 |
| February: 2 |
| March: 3 |
| April: 4 |
| May: 5 |
| June: 4 |
| July: 1 |
| August: 1 |
| September: 0 |
| October: 4 |
| November: 3 |
| December: 0 |
| 2020 |
| January: 1 |
| February: 3 |
| March: 2 |
| April: 1 |
| May: 8 |
| June: 1 |
| July: 4 |
| August: 0 |
| September: 3 |
| October: 6 |
| November: 2 |
| December: 1 |
| 2019 |
| January: 0 |
| February: 0 |
| March: 0 |
| April: 0 |
| May: 0 |
| June: 0 |
| July: 5 |
| August: 12 |
| September: 7 |
| October: 4 |
| November: 9 |
| December: 8 |