HomeMy WebLinkAboutAgenda Packet - LB - 2003.07.15 URLINGAME PUBLIC LIBRARY (LINGAME
Board of Trustees Agenda
July 15, 2003 - 4.30pm °e�1 RP
480 Primrose Road - Board Room c
SUGGESTED ACTION
1.CCALL TO ORDER
2.,;ROLL CALL
3. -WARRANTS & SPECIAL FUND Approval
4. ,MINUTES Approval
5. ELECTION OF OFFICERS Approval
6. CORRESPONDENCE AND ATTACHMENTS Information
a. Resolution No. 2003-002 Thanking Staff for Superior Service
In The Outreach Program
b. Internet Use Policy
c. Internet Filtering Software Facts
d. Letter to Foundation President Jane Dunbar from Mayor Coffey
e. Business Cards for Trustees
f. Trustee City Council Contacts
;. Note from Caroline Beaverstock of Project Read
Library Statistics May 2003
7. FROM THE FLOOR (Public Comments)
& REPORTS Information
v'a. City Librarian's Report- Escoffier
vb. Foundation Report- Rossi
9. UNFINISHED BUSINESS
a. Easton Project Status - Escoffier Discussion
b. Use of Duncan Trust Funds for Easton Project Shortfall Action
c. Budget—Restoration of Library Hours Discussion
10. NEW BUSINESS
a. Internet—Supreme Court Decision Implications Information
b. Outreach Resolution (4v-t; J Airs— Discussion/Action
c. Business Card Update )JA
Discussion/Action
1 ANNOUNCEMENTS
12. ADJOURNMENT r Adjourn
BURLINGAME PUBLIC LIBRARY
Burlingame Public Library
Board of Trustees
Minutes
June 17, 2003
I. Call to Order
President Andrew Gurthet called the meeting to order at 4:30pm.
II. Roll Call
Trustees Present: Cecile Coar, Andrew Gurthet, Catherine
McCormack, Mary Herman and Carol Rossi
Staff Present Al Escoffier, City Librarian
Sidney Poland, Recorder
III. Agenda Addition — A motion was made to add the item Emergency
Resolution for Use of Foundation Gift Funds to the current agenda
under the section entitled New Business. M/S/C (McCormack/Herman)
IV. Warrants and Special Funds
The Trustees unanimously agreed to approve the warrants. M/S/C
(Herman/McCormack)
V. Minutes
The Trustees unanimously approved the minutes of the May 20, 2003
meeting. M/S/C (Herman/McCormack)
VI. Correspondence and Attachments
Correspondence mailed in the Board packets was reviewed.
A. Impacts of Library Reductions That Affect Public — At the
request of the City Manager, Jim Nantell, the City Librarian prepared a
summary of the reduction of specific services that would directly affect the
library patrons.
VII. From The Floor - None
VIII. Reports
A. City Librarian's Report — Highlights of Report
1. Transaction Based Reimbursement — Presently TBR has
been retained in the State Budget but it is still a possibility that the
program could be removed from the final budget.
2. Budget Approval — The City Council approved the City
budget for the fiscal year 2003-2004 on Monday, June 16, 2003.
480 Primrose Road•Burlingame•CA 94010-4083
Phone (650) 558-7474'Fax (650) 342-6295
3 Friends Merger— The Friends of the Library officially voted
to disband their organization of 30 years. Friends who still wish to
volunteer for the Library will form a committee to help with the book sales
under the auspices of the Library Foundation. The Foundation will not
officially change its name but the book sale events will be held in the
name of the "Friends and Foundation".
4. Flood Restoration — Restoration of the tile is in its final
stages. Book donations from the Amazon wish list continue to be received
from patrons who want to help the Library rebuild its collection.
B. Foundation Report — Carol Rossi — The Foundation will hold its
next meeting September 7, 2003 at 4:30pm. The newsletter is scheduled
to be released in the fall of 2003.
IX. Unfinished Business
A. Hillsborough Contract — The Hillsborough City Council agreed to
a three-year contract for library services with the City of Burlingame and
the City of San Mateo. The contract includes a 90-day release clause after
the approved contract has been in place for one year. Hillsborough will
pay a higher per capita rate to the City of Burlingame than to the City of
San Mateo.
1 . Citizens Committee — A Hillsborough Citizens Committee
has been formed to research long range financial planning of library
_ services for its residents. Carol Rossi has been asked to serve on this
committee.
B. Easton Project — Plans are presently undergoing the plan check
process. This item will be agendized for the August 4th City Council
Meeting.
1 . Project Shortfall — The Trustees discussed the approximate
$150,000 needed to complete the Easton project and discussed using
funds from the Duncan Trust to cover the shortfall. Trustee Coar
requested that the City Librarian contact the fund manager to ascertain if
any restrictions apply as to how the funds are distributed. There is a
possibility that the Foundation could provide a portion of the funds
needed. The City Librarian requested that the Trustees determine if the
Duncan Funds should be used for the completion of the Easton Project at
the July 15th Library Board meeting.
2. Phasing of Project — Trustee Herman inquired into the
possibility of phasing the project. The architect, Hal Brandes, has not
been supportive of this idea in the past, as he feels it will increase
expenses. The City Librarian advised the Trustees that it is still possible to
consider the idea.
3. Review of Architectural Plans — The City Librarian and the
Trustees agreed that a second party should review the project plans to
determine if there is any possible way to further cut costs.
Library Board of Trustee Minutes 2
June 17, 2003
X. New Business
A. Emergency Resolution for Use of Foundation Gift Funds — The
Trustees passed a motion to accept the Emergency Resolution for Use of
Foundation Gift Funds in the amount of $65,000 to be used as follows:
$30,000 to the book budget and $35,000 to the part time staff budget.
M/S/C (Herman/Coar) Trustee Herman recommended that a letter be
written to the Foundation acknowledging their generous donation.
1. President's Letter— Foundation President Jane Dunbar
noted in her letter to the City Council that this donation is a one time gift
for the Library to help in these difficult financial times.
2. Friday Night Openings — The gift of $35,000 will allow the
library to remain open on Friday night 5:00 — 9:00pm for a one year period
by providing the addition of one extra shift.
B. Nomination of Officers — Trustee Herman nominated Catherine
McCormack to serve as President of the Board of Trustees for the year
2003/2004. M/S/C (Herman/Coar) Trustee Herman nominated Trustee
Coar to serve as Secretary of the Board of Trustees for the year
2003/2004. M/S/C (Herman/Rossi)
C. New Trustee — Dave Carr was appointed to the Library Board of
Trustees by the City Council on June 16, 2003.
D. Board Recognition of Andrew Gurthet — The Trustees thanked
Andrew Gurthet for his service to the Library Board. Trustee Gurthet
expressed his appreciation to the Trustees for their support.
XI. Adiournment
The meeting was adjourned at 5:30pm. M/S/C (Herman/Coar) The next
meeting of the Library Trustees will be held June 17, 2003 at 4:30pm.
Respectfully Submitted,
alvIlwki- I Le--
Alfred H. Escoffier
City Librarian
Library Board of Trustee Minutes 3
June 17, 2003
RESOLUTION NO. 2003-002
RESOLUTION OF THE LIBRARY BOARD OF TRUSTEES
OF THE CITY OF BURLINGAME
THANKING STAFF FOR THEIR SUPERIOR SERVICE
IN THE OUTREACH
PROGRAM
RESOLVED, by the Board of Trustees of the City of Burlingame:
WHEREAS, the excellent work of the staff of both library branches serve the needs of
all library patrons in the community;
WHEREAS, staff who coordinate the Library's Outreach Program to shut-ins work one-
on-one with individual library patrons helping them select materials, tracking their reading
interests, selecting new materials; and hand delivering materials to patron residences;
WHEREAS, this relatively small library program reaps large rewards in patron loyalty
and appreciation;
WHEREAS, the Library Outreach Service is the only service of it's kind in the
community that brings library books to individual patron homes, assisted living facilities and
nursing homes;
WHEREAS, Outreach staff and volunteers put a "human face" on library service in a
very unique way;
NOW, THEREFORE, IT IS RESOLVED:
To warmly thank Dan Alvarez and Kathy von Mayrhauser for their superior work with
the Outreach program, and to express the Board's appreciation for those efforts that resulted in a
major financial gift in gratitude for service from the estate of the late Diane Dougherty of
Burlingame.
Catherine McCormack
President, Library Board of Trustees
Approved at Library Board of Trustees Meeting, Tuesday, July 15, 2003, Burlingame, California.
� 1
Internet Use Policy
Tne Burlingame Public Library provides public access to the Internet in keeping with its role in providing
_ equal access to information and resources to meet the educational, informational, and recreational needs
of members of a free and democratic society. Users of the Internet should be aware that the Internet is a
global entity. The library has no control over the information on the Internet and cannot be held
responsible for its contents. Some Internet sites contain information that users may find to be inaccurate,
incomplete, outdated, controversial, or offensive. All Internet users are expected to adhere to the general
rules of behavior in the library and to use library computer equipment in an appropriate and responsible
manner.
Staff Assistance
Librarians are available to assist you in finding the information you seek, however, basic computer
r those who wish to learn more about accessing the World Wide Web, tutoring is
literacy is required. Fo
available. Staff cannot control the accuracy and validity of the information, the availability of links users
would like to visit,or materials users may find offensive. ,
Filtered Access
Filtered access to the Internet is available to children in the Children's Department of the library. Our
librarians share parents' concern for safety on the web. Parents are encouraged to explore the Internet
with their children. Even with filters there is no real control over the content of online sites. Children
hould be aware that many sites may be funded through advertising. Other sites may be offensive,
,:ontain inappropriate material, or be harassing.
User Responsibilities
With the freedom and privilege to access computer networks cogs the responsibility to use them in an appropriate
manner. The library's workstations are in a public area. Because others may be involuntarily exposed to what you
view, the library asks that in consideration of others you exercise judgement in what you view on these public
workstations• lu what you view causes discomfort to others, staff may intervene.) In addition the library has
deemed the following to be unacceptable uses of the Internet and all other electronic resources within the library.
Violations may result in disciplinary actions up to and including loss of library privileges.
• Using resources for illegal or unauthorized purposes.
• Moving,damaging or tampering with computer equipment in any way.
• Attempting to modify or gain access to files,passwords, or data belonging to the library or others.
• Seeking unauthorized access to computer operating systems and/or altering software components of a
computer, database or network. _
• Making unauthorized copies of copyrighted or licensed software or data.
• Violating the posted library behavior policies or procedures.
• Harassing other users or staff.
• Violating another user's right to privacy.
r -he Internet is a useful and powerful source for information. Users are encouraged to access "search the
—internet" for librarian-recommended sites located on the Peninsula Library System Home Page.
ALA I Internet Filtering Software Page 1 of 15
ALA American Library Association Search ALA Cont;
About PLA Organizabon Conferences,Ewnts Online Learning Comrnftlee Work
;A
MM
About PLA
Organization
Conferences,Events and Home__ Tech Notes
Online Learning
Committee Work
Publications&Reports
Public Libraries
PLDS Statistical Report
Publications List
Publication Proposal
Publication
ndlProcedures delines Plain Facts About Internet Filtering
Shared Resource List
Tech Notes Software
Audiotapes
Projects
Resources Filters (also known as content filters or blocking software) are software
Members only programs that block the transmission of data over the Internet. Internet content
Awards filters are one of a number of tools in the spectrum of resources available to
News
Issues and Advocacy librarians for managing Internet content. For over 100 years, public libraries
have gradually become more open to the public, through additions to our
Print this page services such as children's rooms, popular reading collections, open stacks,
and outreach programs. In the last decade, the world has also come to us
through the burgeoning Internet. The Internet, especially the Web, has
changed library services in many positive ways, but it has also introduced new
challenges. Internet filtering—now used by one in five public libraries,
according to a study performed in 2000 by the University of Illinois—is one
tool librarians consider when exploring how to improve Internet management.
All public librarians can benefit from understanding the concepts and
challenges associated with Internet filtering, but you will find this information
particularly helpful if:
• You receive federal or E-Rate funds for Internet Service Provider(ISP)
costs directly or through any grant or regrant program—since recent
legislation requires compliance with the Children's Internet Protection
Act(CIPA) in order for your library to continue receiving these funds.
See the section below, "Understanding CIPA."
• Your state or local government is considering or has passed legislation
requiring filtering for some or all of the computers in your library that
have open access to the Internet
• Library users, trustees, staff, media or other stakeholders have expressed
concern about filtering (or the lack of it)
• You plan to use Internet filters in your library for any reason
• You are evaluating the wider range of tools available for managing
Internet access, such as privacy screens, privacy desks, or proxy servers
for configuring special-use machines
What Are Filters And How Do They Work?
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech_Notes/Int,... 6/27/03
ALA Internet Filtering Software Page 2 of 15
Filters employ two primary methods for blocking data: word blocking and site
blocking.
Regardless of the methods used for blocking Internet content, no filter is
perfect. All filters under-block and over-block (see especially Ayre, 2001 and
Schneider, 1997). The far-reaching claims of some filtering products may lead
to a false sense of security among members of your community, who may
believe that filters never block information they are interested in or that
children will never see "surprising" Internet sites. Additionally, filters are
useless in preventing adults from preying on children. Ensure that your
Internet management practices include advising parents that filters can never
substitute for parental involvement, and advising all members of your
community that filters may block information they want to see.
Word Blocking
Word blocking (also known as keyword blocking) matches web pages against
a list of keywords. If the web pages match the keywords, the web pages are
blocked. Word blocking is the easiest form of filtering to implement, because
it relies on software, rather than human review. Word blocking is also the
most inaccurate form of filtering. When people talk about web pages blocked
because they include the phrases "XXX" or"chicken breast,"they are
referring to keyword blocking. Many libraries that use filters disable keyword
blocking because of its tendency to indiscriminately overblock. Some filtering
companies make their keyword stoplists available on their Web sites, but most
�-- do not.
Site blocking
Site blocking matches web pages on the Internet against a list of
predetermined sites. When the user attempts to access the site on the stop list,
the filter's stoplist prevents this action, sometimes by displaying a web page,
or"denial page,"that announces that the site in question is blocked. The
default denial page can range from an obscure error code (such as, "Cyber
Patrol Code 2") to a list of the site or sites blocked with a link to email the
library staff. In some cases, library technical support staff can customize this
denial page to include alternate text or to point back to another webpage; be
sure to watch for this feature when evaluating filters.
Most site-blocking stoplists are created in part or entirely by human review;
employees of the filtering companies select sites to be included on the stoplist.
(The article by Peter Lewis included in this bibliography is a revealing look
inside the site selection process.) Because creating these proprietary databases
is expensive, to protect the company's investment, most filtering stoplists are
hidden; you (or anyone else) can't see any of the sites included in the filter's
database. In four years of evaluating filters, I have identified only one product
that allowed a viewable stoplist—and it was such a short list that the product
was essentially useless. In practice, the only way you will know if a filter
blocks a Web site inappropriately is if someone reports it after the fact, or you
constantly review all web activity. (Some filtering companies provide search
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int.... 6/27/03
ALA I Internet Filtering Software Page 3 of 15
engines for determining if a Web site is blocked, but this presents the same
problem; you aren't going to enter all 116 million Web sites into the filter
company's search engine.)
How often a company updates its stoplist, and how frequently your staff
updates the filter's local database, impact the reliability of the filter. Filtering
software, like anti-virus software, must be continually updated. Note that most
filter companies charge maintenance fees for updated filtering lists as well as
technical support.
What is your recourse when a site is inappropriately blocked (or not blocked)?
In most cases, if you are aware of the problem, you can add or delete sites to a
local stoplist, which addresses the needs of your own site, but actual changes
to the filter itself to correct database errors must be forwarded to the company,
which may take days, weeks or months to review the request. Of course, a site
list created by one company is not going to be able to adapt itself to every
community, let alone every person viewing a Web site. What we discovered in
a filtering study conducted in 1997 is that over time, controversial Web sites
disappear and reappear in filters—possibly due to requests to remove and then
reinstate the sites. This underscores the highly subjective nature of filters; in
the end, filters represent the opinions of the people who select their content
content and the many different interpretations of what is, and is not,judged to
be obscene, objectionable, or simply offensive.
Filtering Categories
Most filtering stoplists are broken into categories which can be selected for
blocking or for open access. These categories are arbitrary; there is no
"MARC" standard (or any other industry standard) for filtering categories.
While most filters include categories related to sexual activity and nudity, the
wide range of filtering categories reflect the target markets: filters produced
for business environments may include categories for"vehicles," "travel," or
other Web sites employers may not want employees using during business
hours. Filters produced for the school market may include categories for
"violence" or"hate sites." (Very few filters are produced primarily for the
library market, which also means that the needs of library customers take a
back seat in designing filters.)
Vendors usually provide the criteria for filter categories on their Web sites.
However, these categories, and the Web sites assigned to them, are highly
subjective, so when evaluating and configuring library filters, be careful about
assumptions, such as "anything we would provide would automatically make
it through a filter." A filter I tested recently blocked one of our in-house
databases, Valueline, because the filter placed it in a category of financial
resources inappropriate for use during "business hours."Additionally, due to
human error, Web sites can end up in any category—and due to the hidden
nature of filters, this will not be obvious to you unless you see the site
blocked, or someone who attempts to access a blocked site reports it.
Organizations such as the Quakers, the Mormons, the American Association
of University Women have been blocked by filters. Filtering sites that are not
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int.... 6/27/03
ALA Internet Filtering Software Page 4 of 15
related to sexual content raise far more concerns about First Amendment
rights.
Software, Server, or Remote Proxy?
Some Internet filters are client software, intended to be installed and managed
on individual computers. Others are server-based software, which means they
are centrally installed and managed. Finally, some filters are provided through
remote servers, often called remote proxy servers and less frequently, but
more accurately, ASPs (Application Service Providers).
Evaluations of Internet filtering software have identified characteristics
common to client, server, and remote proxy servers. Client filters can interfere
with other computer software, is the least reliable with respect to under- and
over-blocking; however, in small libraries, or where you only plan to filter a
few workstations, client filters are typically the least expensive alternative.
Server-based filters require central installation and management, do not
require software to be installed on individual computers, is more reliable than
client software, is cost-effective in large numbers, and usually provides the
most features and configuration options. Remote proxy filters provide some of
the advantages of server-based filters, particularly centralized management,
and can be cost-effective for libraries that do not maintain their own servers
and do not want to maintain software on each computer, but in most cases
provide few if any options for local configuration and control, such as the
ability to configure the denial page or override a blocked site. Both server-
based and remote proxy filters usually offer the ability to configure filtering
per-machine or per-user; for example, if your library has a Microsoft NT
network, the "staff' group could have one level of access and the "public"
group could have another, or you could determine that a specific machine
would be filtered or not filtered regardless of who logged in to it.
Finally, several vendors offer the capability to provide barcode or smart-card
management. (Smart cards have computerized chips embedded in them that
contain patron data; smart cards also require special readers on each
computer.) Automated authentication is very good news, as managing who has
access to filtered or unfiltered Internet computers can be a daunting and
unpleasant task for front-line library employees, who may feel that their job
title has changed from"reference librarian"to "police officer." Barcode
management is the least expensive, since most libraries currently use barcode
technology and configuring computers with barcode readers are not essential
(patrons can type the numbers). Barcode readers are under$100, if you would
like to make the Internet logon experience more comfortable for patrons.
Smart-card technology, while promising, is still expensive to implement; the
one working configuration I am familiar with (Englewood Public Library,
Colorado) requires a second, high-priced"smart card" exclusively for Internet
access. Nevertheless, typed or"swiped"barcodes or smart-card technology
offer the opportunity to do away with clumsy sign-in sheets, and give you the
opportunity to place computers anywhere in the library.
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA I Internet Filtering Software Page 5 of 15
Be Vendor-Savvy
Be wary of promises that a filter blocks "obscenity" or"illegal content," and
also be cautious if a sales representative pressures you to use a particular
product in order to comply with local, state or federal laws. While the recent
CIPA legislation will require libraries to block transmission of content
"harmful to minors," in practice, there is no way to guarantee that this has
been accomplished, and all filters have demonstrated that they will let through
content they are supposedly designed to block.
Only a court of law can determine if content is obscene, and filtering
companies do not have police or lawyers on staff to determine whether content
is "illegal." (Furthermore, reassurances that a filter complies with "the law"
because it blocks "porn" should be ignored, as pornography is not illegal.)
However, it is a legitimate sales pitch to say that a filter blocks (or attempts to
block) Web sites depicting—for example—a content-neutral category such as
"full nudity."
Some companies have begun pressuring libraries to purchase filtering software
in order to be compliant with the Children's Internet Protection Act(CIPA).
Libraries that receive federal funding, such as E-Rate and LSTA grants, will
need to certify by late October, 2001, that they plan to implement"technology
protection measures"by Funding Year 5 (July 1, 2002), or filtering, for all
publicly-accessible Internet computers—staff as well as public, according to
the FCC guidelines (there are also no exceptions for consortium staff).
�-- However, as of this writing, there is no legal requirement at the federal level to
install or use a filter if you are not receiving E-Rate or LSTA funding for
telecommunications costs. Some state have passed filtering legislation that
impacts libraries. If CIPA is upheld, it will only apply to libraries receiving
federal funding for the purposes outlined in the law.
What happens if a library (or library consortium) chooses not to comply? If
the FCC audits the library and determines that the library certified it was in
compliance but was not in fact compliant, the library could fail to receive (or
be directed to return) its federal funding.
Inevitably, software companies have attempted to improve library filters.
Some filters claim to incorporate artificial intelligence features. Vendors may
toss around terms such as "dynamic document review" or"intelligent content
recognition."These terms boil down to simple keyword analysis, sometimes
with a small mathematical algorithm tossed in for good measure—which, as
librarians understand, is an extremely crude method of organizing or filtering
information. While vendors claim that their products have become extremely
sophisticated, the reality, demonstrated by all evaluations of filtering software
performed outside the filtering industry, is that filters are still mechanical tools
wrapped around subjective judgment, and no bell or whistle can change that.
Often, so-called "advanced" tools rely on unproven technologies—such as
filters that claim to be able to distinguish human flesh from other images—or
on embellishments to keyword blocking that sound sophisticated but are no
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA Internet Filtering Software Page 6 of 15
great improvement. One "advanced" filter blocked a site with cat poetry
because the word"pussy cat" appeared too often on the webpage. Use
common sense in evaluating vendor claims; if it sounds like an amazing new
�-- discovery, it probably isn't.
How Much Do Filters Block?
Librarians should evaluate filter features (discussed in the next section), and
should use a working environment to examine products carefully before
purchase. However, evaluating filters by testing them against a few dozen
Web sites or keywords—while useful for evaluating filters against one
another--can be very misleading with respect to conclusions about filters in
general. As of this writing, there are over 116 million web sites—with several
new hosts added every second. If a filter blocks 1 out of a thousand Web sites,
simple math tells us that the filter could, potentially, block hundreds of
thousands of Web sites. A claim of 99% accuracy—not made by any filter
known to this author—would still result in blocking 1.6 million Web sites.
Any given host may provide millions of individual web pages, with many
more added every day. Clearly, even a modest rate of error has the potential to
block vast amounts of valuable—and Constitutionally-protected—information.
Conclusions about the impact of blocking "only" a number of Web sites
should take into account how filters work. Your own library provides the best
analogy. Web sites removed by filters are not placed on book trucks for your
inspection before final "weeding." Instead, imagine that every night a special
weeding team crept in and removed a few books from your library's shelves,
and the books' records were silently expunged from your catalog. Unless your
library was extremely small, it would take a while to even realize that books
were missing—and identifying what was gone would be extremely difficult.
Nevertheless, the impact on your collection would be very real, particularly in
areas of the collection that have controversial materials. That is how filters
work—by silently removing all evidence that the sites in question ever existed,
and relying on a very large data set(the Internet) to obscure the absence of this
content.
Filters and Privacy
Many filters have the capability to gather information about Internet use.
Depending on the filter, this information can be highly detailed, including
time, date, machine, and sites accessed. Some products allow administrators to
view actual Internet use per-machine in real time. Products that display and
report user information can, of course, gather and store highly-sensitive data.
Data gathered by filters can be very helpful for interpreting use patterns, filter
effectiveness, and even network response time. However, ensure that you can
configure a filter so it does not gather or store information that your policies
and laws prevent you from gathering or storing.
Additionally, several proxy-based filters offer or plan to offer the capability to
�– store information off-site. One product includes an"after hours" feature where
Web sites or entire categories that are locally blocked can be deferred to an
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech_Notes/Int,... 6/27/03
ALA Internet Filtering Software Page 7 of 15
off-site server so the user can access the information later. [This feature raises
legal and ethical questions about ownership of off-site data. State
�-- confidentiality laws or local policies may prevent you from signing contracts
that delegate control of patron data to commercial third-parties.
Finally, remote proxy servers by definition store all data off-site, since the
filtering servers are located at the parent company. In 2000, the Wall Street
Journal revealed plans for N2H2, publishers of the widely-used Bess remote
proxy server, to sell children's Internet-use data to the Department of Defense.
After widespread publicity,N2H2 backed off, but this illustrates the
importance of a contract that protects your patrons' Internet data.
CIPA and Filtering
At least this year, no discussion of filtering is complete without outlining
compliance guidelines for CIPA. CIPA was passed as a rider to an
appropriations bill in December, 2000. The ALA Web site for CIPA,
www.ala.org/cipa , includes the full text of the bill, legal interpretations of
CIPA by the legal counsel for the American Library Association (ALA), and
current status of legal activity. Both ALA and the American Civil Liberties
Union are challenging CIPA in court. (The case is scheduled to go to trial in
February 2002.)
Key points:
• Applies to libraries, library consortia, and schools that receive federal
funding, including E-Rate, LSTA and other federal sources
• Affects Internet Service Provider(ISP) costs, not the discounts received
for data lines (phone service, dedicated Internet lines) or internal
connections (hardware).
• Can be selectively implemented in consortia, provided that the system
only request discounts for the libraries that certify compliance with
CIPA
• Does not require consortia or state libraries to police compliance
• IMLS guidance for LSTA is still forthcoming—watch carefully for
grant guidelines
• Filtering is not required in E-Rate Funding Year 4 (July 1, 2001 through
June 30, 2002)
• To receive discounts on ISP costs in Funding Year 5 (July 1, 2002
through June 30, 2003), a library must certify it is in compliance with
CIPA. For E-Rate funding year 5, compliance means you have...
o Implemented"technology protection measure" (interpreted to
mean a filter) for all computers that have access to the open
Internet, staff as well as public, adults as well as children (no
exceptions for administrators, system staff, and so forth).
o Developed an Internet policy on use of the Internet by adult and
child users
�.. o Held public meetings about the library's Internet services and
policies, including filtering
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int... 6/27/03
.ALA Internet Filtering Software Page 8 of 15
The resources at the end of this Technote can help you with the specifics of
these compliance areas. However, it's important to note that the guidelines for
CIPA vary according to the E-Rate funding year. For Year 4 (beginning July
1, 2001 through June 30, 2002, a library only has to be "undertaking action"—
not actually filtering--to be in compliance with CIPA.
Be sure to thoroughly read the documents cited at the end of this Technote,
particularly the resources from the FCC, ALA, and the Schools and Libraries
Division. Guidance for CIPA is still evolving.
ALA's Position On Filtering
The position of the American Library Association on filtering is probably as
misunderstood as filtering software itself.
In 1997, the Council of the American Library Association, a body elected by
ALA members, voted overwhelmingly to approve a resolution that states in
part, "RESOLVED, That the American Library Association affirms that the
use of filtering software by libraries to block access to constitutionally
protected speech violates the Library Bill of Rights."
In this statement, the American Library Association reminds libraries that
Internet practices should be congruent with the principles of intellectual
freedom. Filters are designed to block data; that is their purpose. The inherent
characteristics of filters—which rely on hidden, anonymous third-party
decision-making--make it inevitable that filters block some Constitutionally-
protected speech. Therefore, any use of filters in libraries should be designed
to ensure that patrons may have access for any lawful purpose to an entirely
unfiltered Internet, without prior restraint. This emphasis on the patron's right
to choose is consistent with our profession's commitment to intellectual
freedom, and is consistent with many library practices. Libraries rarely limit
what can be read in a library. Librarians do not search patrons' book-bags for
titles the library would not purchase, or police reading tables to see if patrons
are reading materials consistent with local collection-development policies. In
a similar vein, many libraries offer open access to the Internet, so that the
patron may choose what to read. Librarians believe in supporting a wide
variety of information needs.
In many libraries, standard practice and policy is to defer filtering decisions
for children to their parents (and only the children's parents). Unlike teachers
in many schools, public librarians do not act in loco parentis (in place of the
family).
Key Questions For Planning Internet Management
Strategies
Internet filters are just one of many tools available for managing Internet
content, and integrating them into your service scheme is important. Before
selecting a filter and determining how it will be configured, first ask:
. What is it you are trying to accomplish? (Prevent people from
accidentally viewing sexually-explicit content? Provide a choice of
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and Reports/Tech–Notes/Int.... 6/27/03
AL1 I Internet Filtering Software Page 9 of 15
filtered or unfiltered access? Provide adults with mechanisms for
determining whether their children will have open or unfiltered Internet
access? Compliance with legal mandates, such as CIPA or state or local
laws?)
• What intellectual-freedom principles do you want to support? (A choice
of unfiltered access for adults? Patron privacy? Open access for all,
regardless of age?)
• What information should be provided to the patron about the filter?
Should the patron be made aware that the search is filtered? Should he
or she see the URLs for blocked sites? Should they have recourse to
contacting library or company staff?
• Which tools will meet your needs? (The answers here could include
filters, privacy screens, positioning computer monitors away from foot
traffic, educational materials and programs, privacy desks, customized
browsers that authenticate users based on access level, etc.)
• Which tools match the risk level that your governing board or
commission is willing to accept?
As you begin the process of evaluating your Internet management options,
including filtering, keep in mind that the process of anonymous third-party site
selection means no filter can guarantee patrons will never see content you or
anyone else considers inappropriate. This is also important to remember when
writing Internet policies; you cannot promise that patrons will never access
information they find offensive.
�-- Evaluative Questions about Internet Filters
After these questions, I have provided"checklist" questions for you and your
technical support staff to use in evaluating Internet content filters, and in the
bibliography, I have cited several recent evaluations of Internet content filters.
Here are several broad questions to ask about each product:
• Is the vendor's contract congruent with your policies and laws?
• Can you configure the filter so it is congruent with your Internet access
and privacy policies and laws?
• Does the Internet filter integrate well into your current network
operating environment (such as your operating system and network
support capabilities)?
• Compared to similar products, how well does the filter block the types
of content you intend to block, and provide access to resources you
intend to make available?
Pay attention as well to TCO issues (Total Cost of Ownership). Does the
filtering software require a separate piece of hardware, such as a dedicated
server, and how much will that cost to establish and maintain (including
annual licensing requirements for the filtering database and technical
support)? Will you require special training or more staff hours to support it?
Do you need to purchase additional hardware to implement the filter? Who
~' will be responsible for ensuring that it works properly? Will the company
provide a list of current customers or at least several libraries that are using its
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int... 6/27/03
ALA I Internet Filtering Software Page 10 of 15
product? Will you need to train library staff how to respond to inappropriate
blocks? If it is an remote proxy server, does it require communicating with the
company every time a minor change is required? One library wrote its own
web browser in order to implement filtering in a manner consistent with its
Internet policy; this was a significant investment. These are only a few
questions to consider in introducing any new technology, including filters, in
your network.
Features In Filters
In the table below, I have left two columns empty for you to fill in. The first
column, Ranking, is where you would weight or prioritize each feature.
Decide on a weighting scheme—for example, 1 for"must," 2 for"should," 3
for"nice to have," etc. The second column, Grade, lets you evaluate the ability
of the product to fulfill this feature—any scale will do, but school grades (A
through F) are one way to go. Finally, TCO is your calculation, based on the
initial and ongoing costs of the filtering software and associated hardware,
network, equipment, personnel and training costs, of what it will cost you to
deploy this filter in your networking environment.
In some cases, you may end up with a requirement that no filter can meet. One
recourse is to communicate your needs to the vendors whose products
otherwise meet your top ranking criteria. For example, if the filters that are
compatible with your network operating environment will not allow you to
view the stoplists they use to block Web sites, you should take that concern
back to the vendors and negotiate from there. Since in some cases you may
experience external pressure to use a particular filter, consider documenting
your product decisions to explain to your stakeholders why you have chosen
not to implement a product.
Finally,please note the extensive product notes below this table. For further
explanation of these product criteria, see extended discussions in Schneider,
Karen G., A Practical Guide to Internet Filters,Neal Schuman, 1997.
❑Feature Found In Ranking Grade TCD
❑ �00❑
1❑Vendor-supplied stoplist Most filters
n2 [Viewable stoplist
11ters
3 couple of Pclient
Add or remove sites in Most filters �❑❑
stoplist
4 Automated stoplist Most filters ❑❑
download
5nFrequencyof stoplist Varies widely ❑❑
update
O(Note Support third-party listsMost filtersEl
1)
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA Internet Filtering Software Page 11 of 15
ulKeyword filtering IlMost filters
d8 Can disable keyword Most filters ❑
filtering
9 ]Block to file level (Note 2) Most filters
10 Block by protocol (Note 3) Many filters
11 )ock by time of day(Note Many filters ❑
12 Block by NT or Novell Many service-based El user groups filters
n13 Block by IP of workstation Many service-based
filters
Can talk to ILS patronOne or two server-
P14
database (Note 5) based filters
H
Host name resolves to IP Most filters
(Note 6)
n16Support barcode entry Many server-based
(Note 7) filters El
Support smart-card logins Many server-based
17 (Note 7) filters
18 Support multi-choice login Some server-based
pace (Note 8) filters El
19 Vendor-defined categories Most filters
Notes Regarding Filters
Note 1. Support Third-Party Lists. This feature allows you to create your own
filtering lists. This can be particularly useful for special-use computers, such
as machines restricted to commercial databases, or children's computers you
wish to restrict to several h undred"kid-friendly"resources.
Note 2. Block to file level. The filter is able to block individual files on Web
sites, versus an "all or nothing" approach where the entire site is blocked or
not blocked.
Note 3. Block by protocol. The filter can block or enable access to specific
protocols, such as telnet, ftp, Usenet, and SMTP. This feature was more
significant before most applications moved to the Web, but still can be useful
in some settings.
Note 4. Block by time of day. The level of access can vary with the time of
day. One useful application of this feature is to block all or most Internet
access when the library is not open, to prevent contractors from using Internet
computers for personal use.
Note 5. Can talk to ILS patron database. A very nontrivial feature. Vastly
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA I Internet Filtering Software Page 12 of 15
simplified for this Technote, a filter that can talk to a patron database
presumably has an API (application programming interface) that allows data
to pass between the filter and the integrated library system (ILS). This would
provide the potential to use the ILS for authenticating and organizing access to
the Internet, for example, providing filtered access for children and unfiltered
access for adults.
Note 6. Host name resolves to IP. Some less-expensive filtering software is
unable to translate the IP (numeric) address for a Web site to the hostname,
meaning filtered Web sites can be easily bypassed by typing in their IP
addresses. However, the flip side of this problem is that filters
Note 7. Support barcode and/or smart-card login. Several server-based filters
offer the potential to authenticate users through barcoded cards or proprietary
smart-cards.
Note 8. Support multiple-choice login page. The filter can support an
authentication page that allows users to select how they log in (filtered or
unfiltered access, for example).
Note 9. "After hours" feature. This feature, discussed earlier, stores selected
Web sites in an offsite server, for later retrieval.
Note 10. Option to warn versus block. This feature provides the ability to
present a warning screen which a patron could then choose to override.
Note 11. Option to monitor versus block. Some filters provide the capability to
turn on the filter and run it in filtering mode without blocking, so you can
analyse how the filter works, what sites are accessed, and what sites the filter
blocks.
Note 12. Web rating systems are not in widespread use, but occasionally come
up in discussion. These rely on voluntary rating systems for Internet Web
sites, and browsers that support implementation of these ratings. See
Schneider, A Practical Guide to Internet Filters, for a longer discussion. Web
rating systems are not important criteria for an Internet filter.
Note 13. Administrative override for blocking. Some filters allow
administrators to override a block by entering a password.
Note 14. Administrative delegation. Some filters provide the capability to
delegate selected administrative functions to other staff, including the ability
to administer an entire subnet without full access to the server. Selective
delegation of administrative functions is particularly useful when it enables
system staff to empower front-line staff, such as reference librarians, to
override blocked content.
Note 15. Remote administration. Allows the software to be managed remotely,
most often through a Web interface. Some server-based products require
installation of the management module at each client used for
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA I Internet Filtering Software Page 13 of 15
administration—a cumbersome requirement.
Note 16. Report and logging capabilities. Analysing what the filter does
requires its ability to log detailed filtering activities. Some filters provide
internal report tools. Otherwise look for filter logs that can be interpreted by
standard applications such as Excel, Access or Webtrends. Look for"canned,"
customizable reports.
Bibliography
Children's Internet Protection Act (CIPA)
Bocher, Robert. 2001. Wisconsin E-Rate Information.
Bocher, Technology Consultant for the Wisconsin Division of Public
Instruction, also serves on the E-Rate Task Force of the American Library
Association. His analyses of CIPA are excellent; other resources on this site
include a chronology of filtering legislation.
[CIPA Web site_.] American Library Association. 2001.
This Web site provides information about the status of ALA's lawsuit, full text
of the legislation, legal analyses, and additional citations related to the
Internet, filtering, and intellectual freedom.
Center for Democracy and Technology. 2001.
A readable version of the actual text of the CIPA legislation.
Federal Communications Commission. 2001. [FCC CIPA Regulations.]
These are the FCC's regulations for compliance with CIPA. This document is
essential reading for library administrators, systems librarians and E-Rate
coordinators. The regulations provide most of the answers to commonly-asked
questions about implementing CIPA.
Latham, Joyce. 2001. Positioning the Public Library in the Modern State: The
Opportunity of the Children's Internet Protection Act (CIPA). First Monday,
6:7.
A legal and historical analysis of CIPA. Thoughtful and far-reaching;
addresses the question of public forums and the library.
Schools and Libraries Division. Universal Service Corporation. 2001. Specific
CIPA Guidance for Year 4 "Undertaking Actions" Certification.
Another helpful document for administrators navigating the CIPA
implementation maze.
Filtering
Ayre, Lori Bowen (2001). Internet Filtering Options Analysis: An Interim
Report._ Infopeople Project.
An evaluation of key filtering products, with guidelines for assessing and
selecting filters. Addresses limitations of filters without making that the focus
of the report.
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and Reports/Tech–Notes/Int,... 6/27/03
AL1 I Internet Filtering Software Page 14 of 15
"Digital Chaperones for Kids," Consumer Reports, March, 2000.
This well-respected consumer magazine evaluated Internet filters and
concluded they were imperfect.
Hunter, Christopher. Filtering the Future?: Software Filters, Porn, PICS, and
the Internet Content Conundrum. 1999.
This lengthy paper, submitted in partial fulfillment of a thesis requirement,
discusses the imperfections of filters.
Hunter, Christopher. "Internet Filter Effectiveness: Testing Over and
Underinclusive Blocking Decisions of Four Popular Filters." Computers,
Freedom, and Privacy 2000 Conference Proceedings.
Another analysis of the performance issues related to content filtering by a
doctoral student who has followed this issue for several years.
Intellectual Freedom Committee, American Library Association. 2000.
Statement on Library Use of Filtering Software
ALA's statement on filtering is frequently misquoted; read it carefully.
Lewis, Peter. "Web 'watchdogs' work to block sex, violence from eyes of
young surfers." The Seattle Times Dec. 17, 1997.
A reporter interviews the young part-time employees selecting sites to block in
filters.
Meeks, Brock and McCullagh, Declan. 1996. Keys to the Kingdom.
An early expose of Internet content filters; one of the first recorded instances
of a filter blocking innocuous sites such as the National Organization for
Women.
"Lifting he Curtain on Web Filter Strategies ,"New York Times,November
16, 2000.
A history of efforts by the filtering industry to protect the content of their
stoplists.
Nunberg, Geoffrey. The Internet Filter Flimflam.
A scientist at Xerox PARC evaluates filtering.
Other Related Resources
Glogoff Stuart, The RFP Process. [1998.]
A concise and articulate overview of the process for establishing a Request
For Proposal.
Schneider, Karen G. (1997). A Practical Guide to Internet Filters. Neal
Schuman.
An early study of Internet content filters, including evaluation of 12 filtering
products. Includes an in-depth discussion of how filters work.
For further reading about filtering, see in particular Christopher Hunter's
biblio r aphy,
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
ALA I Internet Filtering Software Page 15 of 15
Library Research Center. Graduate School of Library and Information
Science. 2000. Survey of Internet Access Management in Public Libraries.
University of Illinois.
�-' A study found that approximately 15% of all public libraries filtered at least
one Internet computer.
Author Notes
Karen G. Schneider is the Coordinator, Librarians' Index to the Internet,
lii.org (as of October 1, 2001). Schneider, who has extensive public library
experience, is also the author of A Practical Guide to Internet Filters (Neal
Schuman, 1997), co-moderator of PUBLIB, the discussion list for public
librarians, a columnist for American Libraries, and a frequent speaker on
library issues.
The Public Library Association's Tech Notes project grew out of the desire to
continue the work of Wired for the Future: Developing Your Library
Technology Plan, by Diane Mayo and Sandra Nelson,published for PLA by
ALA in 1999. Each of the Tech Notes, written by GraceAnne A. DeCandido, is
a Web published document of 1,500-2,000 words,providing an introduction
and overview to a specific technology topic of interest to public libraries at a
particular point in time. Topics were identified by PLA's Technology in Public
Libraries Committee. Each note is marked with the date of its completion and
posting, and with the date, approximately one year later, when links and other
information were reviewed.
The Technology for Public Libraries Committee is currently evaluating if the Committee should request PLA funding for
additional Tech Notes.Readers'comments and suggestions are welcome and should be addressed to plana ala oor.Please use
Tech Notes in your subject line.
http://www.pla.org/Content/NavigationMenu/PLA/Publications_and_Reports/Tech Notes/Int,... 6/27/03
�CITY
BURLINGAME
p oe
0q 9
RATED JUNE 6
MIKE COFFEY,MAYOR
ROSALIE M.O'MAHONY,VICE MAYOR The City of Burlingame
CATHY BAYLOCK
JOE GALLIGAN CITY HALL—501 PRIMROSE ROAD TEL: (650)558-7200
MARY JANNEY BURLINGAME,CALIFORNIA 94010-3997 FAX: (650)342-8386
June 20, 2003
Jane Dunbar, President
Library Foundation
732 Crossway Road
Burlingame, CA 94010
Re: Library Foundation Donation
Dear Ms. Dunbar:
I want to express the City's appreciation for your recent generous donation of$65,000. The
restored funds provided by this donation will greatly benefit the Library's budget for the new
fiscal year, and our library patrons will benefit greatly with the opportunity we will now have to
restore library hours on Friday evenings.
Again, thank you for supporting our library services.
Sincerel
Mike Coffey
Mayor
Business Cards for Trustees
Do you need cards?
Please initial for accuracy and correct any information as needed.
Thanks.
Mary Herman Armstrong David Carr
Library Trustee Library Trustee
480 Primrose Road 480 Primrose Road
Burlingame, CA 94010 Burlingame, CA 94010
650-344-8056 650-342-9871
Email: armherm(c�aol.com Email:
david.j ane.carr(c-�,comcast.net
Cecile Coar
Library Trustee
480 Primrose Road
Burlingame, CA 94010
650-344-8092
Email: Cecile.Y.Coar(cTmarshmc.com
Katie McCormack
Library Trustee
480 Primrose Road
Burlingame, CA 94010
650-692-4252
Email: katiemc uJgc.org
Carol Rossi
Library Trustee
480 Primrose Road
Burlingame, CA 94010
650-548-1346
Email: Carol_Rossi(a,yahoo.com
- Library Trustees
City Council Contacts
The Library Board has traditionally maintained a one-on-
one contact with City Council members. With the
replacement of a Board member the contacts need to be
updated.
City Council as of July 1, 2003:
Council Member Trustee Contact
Mike Coffey, Mayor
Joe Galligan
Mary Janney �� ,�
Rosalie O'Mahony
kathy Baylock
l� Zpa3
�wth s � ✓�i� 0
BURLINGAME PUBLIC LIBRARY STATISTICS FOR THE MONTH OF MAY 2003
_gistered Borrowers Previous month's total #Added Total Registered
Burlingame Adults 15,763 101 15,864
Burlingame Children 4,447 34 4,481
Hillsborough Adults 2,424 8 2,432
Hillsborough Children 1,231 3 1,234
Non-San Mateo Co. Borrowers 1,316 25 1,341
Totals 25,181 171 25,352
Circulation Activity Main Branch
Adult Print Materials 18,695 802
Children's Print Materials 9,202 1,420
AudioNisual Materials 8,690 267
Circulation Totals
This month total Main 39,476 This month previous year 39,539 -0.2%D
This month total Branch 2,933 This month previous year 2,485 +18%1
This month Grand Total 42,409 This month previous year 42,024 10%1
Reference Activity Inter Library Loans
Questions Directions Lent 2,967
Reference 2,923 329 Borrowed 2,429
Children's 1,203 1,113 TOTAL 5,396
Lower Level 1,791 2,721
Branch 149 30
TOTAL 6,066 4,193
Collections Main Titles Volumes Main Titles Added Branch Volumes Added
Adult Non Fiction 379 295 2
Children's Non Fiction 64 60 0
YA Non Fiction 0 0 0
Adult Fiction 217 152 25
Children's Fiction 181 160 10
YA Fiction 22 10 0
Cassettes Audio 28 26 0
Compact Discs 75 43 0
Videos 29 13 0
Children's Audio 6 0 0
Children's Video 1 0 0
Children's Compact Disc 30 0 0
^VD 19 13 0
iildren's DVD 0 0 0
TOTALS 1,051 772 37
4
BURLINGAME PUBLIC LIBRARY STATISTICS FOR THE MONTH OF MAY 2003
PAGE 2
Other Material Volumes Added Total Held
Adult un-cataloged books 95 5,713
Idren's un-cataloged 75 5,065
books
Foreign Language un- 30 657
cataloged
Dynix Deposit to City Treasurer Main $6,592.97
Branch 562.80
Total $7,155.75
Main and Easton Deposits Revolving Account Rental (Main) $130.00
Revolving Account PLS Video (Main & Easton) $ 41.00
Trustees Special Fund Photocopies (Main & Easton) $808.35
Estimated User Traffic 31,540 Daily Average 1,051
Community Room Adult*
TOTAL MEETINGS HELD 14 402
Adult Programs Attendance
' ^ctures, Film Series etc. 1 25
)k Groups 2 22
Childrens and Young Adult Attendance
Pre-school programs 34 1,370
School Age 2 330
Book Groupies
Special Program
Total 36 1,700
Internet Use
One Hour Express Childrens Total
1,532 2,340 56 3,928
BURLINGAME PUBLIC LIBRARY
City Librarian's Report
July 15, 2003
New Library Hours Expanded Thanks to Foundation!
New library hours were effective Monday, June 30, 2003. The new hours
include 4 additional hours for the Friday evening opening thanks to the
Library Foundation.
Main Library
10 AM —9 PM, Monday through Thursday
10 AM- 9 PM, Friday
10 AM- 5 PM, Saturday
1 PM- 5 PM, Sunday
�.. Easton Branch
2 PM- 6 PM, Monday through Friday
2 PM- 5 PM, Saturday
The Foundation also donated $ 30,000 to bring the book budget back up to-
the full amount as last year. We are indeed grateful for these gifts to the
library during these difficult financial times.
Children's, Teens, Read-to-Me Summer Clubs
The children's summer programs are in full swing with the registration
higher than ever. The Club will likely be impacted by local library closures:
San Mateo main and branches,.and the smaller Millbrae temporary library.
Sue Reiterman has taken over the reins of the Children's and Branch
responsibilities and we are working toward staffing the children's desk with
more professional staff than in the past. A team of staff is doing the 6
weekly story times at both Main and.Branch libraries.
Status of Easton Renovation Project
The Easton plans have undergone the City plan check process and are
`.. currently in the permit process. A meeting of the Easton Renovation team
48o Primrose Road-Burlingame-CA 94010-4083 1
Phone (650) 558-7474'Fax (650) 342-6295
will be held on July 7th with the architect to answer a number of questions
brought up during the review process.
In a separate move, Craig Rossi, local contractor, who volunteered his time
to the project, checked the plans. His comments were forwarded to the
architect. My personal thanks go to Craig Rossi for taking the time to review
and comment on the plans.
Internet Filtering Decision
In a landmark decision, the Supreme Court agreed that libraries receiving
Federal funds must provide filters for their public Internet terminals.
Burlingame is not the recipient of Federal funds, so there is no direct affect
on our Internet policy. As a reminder, we offer two filtered Internet stations
in the Children's Room, using Cyber patrol, for those children who wish to
use them. Attached is our current Internet policy, along with some
information regarding the Supreme Court decision. It is too early to know
what impact the decision will have on the Peninsula Library System, which
does receive some Federal funds for E-rate telecommunications discounts. I
will keep the Board posted on developments as they occur. We expect a
legal opinion from the attorneys of the American Library Association in the
coming weeks.
New Loan Periods, Fines, etc.
The public seems to be reacting well to the many changes in public service.
The major changes include: longer 3 week loan periods for most all
materials including new books; relying on printed receipts instead of
stamping the date due slips; trimming our service hours by 7 hours total per
week; increase of overdue fines and fees; the implementation of Debt
Collect for very overdue collections of materials and fees.
Employee Awards
Five employees will be receiving service awards from the City at a special
Luncheon in their honor on July 9th. Dorothy Ezquerro and Jan Laurie will
receive awards for 30 years of service; Sidney Poland and Maribeth Farcich
will receive awards for 15 years each; Ramona Boada will receive an award
for 20 years. Sidney has actually worked for the library for 26 years, but has
been a permanent employee for 15 years.
2
r
v
Changes in Administration
Lisa Wyatt has left Administration for duties in Circulation, due to the
budget reductions. This reduces administrative support by 1 FTE staff.
Jackie Martin will be taking over Accounts Payable and assisting with
Personnel and Payroll activities with Sidney Poland. We are looking for
ways of streamlining purchasing and other administrative operations.
Upcoming Events:
• Independence Day Holiday, Friday, July 4, Closed
• Trustees Recognition Dinner, Tuesday, July 8, 6 PM
• Library Board Meeting, July 15, 4:30 PM
• Library Board Meeting, August 19, 4:30 PM
• Labor Day Holiday, August 31 & September 1, Closed
• Burlingame Library Foundation Board, September 4, 4:30 PM
• Library Board Meeting, September 16, 4:30 PM
Alfred Escoffier
City Librarian
July 2, 2003
3