Main Library Hours:
Mon., Fri., Sat. 9-5
Tues., Wed., Thurs. 9-8
Sunday 1-5
Online 24/7
Library Resouces | Web Resources
Ancestry (Library Edition)
is only available within the library.

Heritage Quest
Heritage Quest is accessible from home.  You will be asked for the 14 digit number on your library card.

Meeting Room Policy

The following rules govern the use of community meeting rooms of the Nelson County Public Library:

  1. Meeting rooms may be used for meeting or programs by organizations whose membership is open to the public. An adult or adults must be in charge at all times.
  2. No Political meetings, religious services, private parties, or meetings to promote commercial interests may be held.
  3. No games or activities will be permitted which will damage the grounds, building or equipment.
  4. One person from the organization shall be responsible to the library for the group’s use of the meeting rooms. Library property, equipment or items on exhibit (paintings, photographs, etc.) damaged through misuse, carelessness or vandalism shall be replaced or repaired in a timely manner by the group using the facility.
  5. In case of night meetings, the key to the meeting area door is to be picked up by the adult representing the group at the library prior to 5:00 p.m. on the day of the meeting. The key should be returned through the book drop at the conclusion of the meeting. The meeting room checklist should be returned with the key. Staff members will not be available after regular hours of operation to assist with room security or clean up.
  6. There is no fee for use of the meeting room.
  7. The Library Director reserves the right to cancel reservation if an emergency meeting becomes necessary for library programming, Library Board of Trustees, Civil Defense, Homeland Security, or for any other reason.
  8. Our aim is to keep the meeting rooms and adjoining facilities as clean as possible. We require that the person responsible for a group check the items on the checklist when the meeting is over.


It is the policy of NCPL board that all facilities will be physically accessible according to the guidelines of the Americans With Disabilities Act (ADA).  The director will annually review the facilities to ensure that NCPL is in compliance with its Transition Plan to meet ADA minimum requirements.

Interlibrary Loans (ILLs)

  • Persons must have a library card, not have an overdue item, and not owe a fine of more than $3.00.
  • ILLs may only be made for books older than one year.
  • Ill Requests may be made by phone or at your library.
  • The fine for late ILL books is $1.00 per day.
  • Due dates for ILL books vary depending on the date that the lending library request the book be returned.   The ILL Loan Librarian writes the due date on a special book sleeve.
  • Branches may receive ILL requests if the patron is willing to pick up and drop off the book at the main library.

NCPL Computer Use Policy

  1. A Nelson County Public Library Internet and Computer Use Agreement form must be read and signed in order to use the Library’s computers. Ask for a copy at the circulation desk.
  2. Patrons under the age of 18 must have a Nelson County Public Library Internet and Computer Use Agreement form signed by a parent or guardian prior to using library computers or observing someone else using a library computer.
  3. Computer users need their library card to sign on to a computer or to get a reservation at the circulation desk.
  4. Computers are not to be turned off at any time except by library staff.
  5. Floppy disks may be purchased for 50 cents at the circulation desk.
  6. Violations of the Library’s Internet and Computer Use Policies will result in forfeiture of computer privileges.

Computer Usage Violations

  • When someone is observed, by other patrons or staff, displaying an offensive site, we first give them a verbal warning and tell them that if they are seen viewing an offensive site again, they will be unable to use the computers for 3 months. Be sure to put a note on that person’s name stating that they were given a warning, the date and your initials.
  • If the person is observed displaying an offensive site again, they will be unable to use the computer for 3 months. Tell them that if it happens again, their computer privileges will be taken away indefinitely. Be sure to update the note on their account stating they will be unable to use the computer for 3 months, the date (of the new entry), and your initials. You also need to put a “Block” on their name.
  • Once they are observed displaying an offensive site the 3rd time, their computer privileges are permanently taken away. Note this on the patron’s account and take Int privileges off their name, i.e. JInt to J or AInt to A.
  • If you are not comfortable approaching a patron who has been looking at an offensive site, feel free to ask the director of his/her designee to speak to him or her. If there is every another issue or problem with the policy, the director or his/her designee will gladly take care of it.
  • The purpose of the following procedure is not to control the sites patrons select but to protect the rights of other patrons and staff utilizing this public facility.

Revised Scheduling Policy Due to the volume of computer usage requests, scheduling of public access computers will be regulated as follows: *Patrons may use public access computers for a maximum of 2 hours per day. Patrons may access a computer for two sessions if needed. *Sessions are scheduled in one-hour increments.

Wi-Fi – Computer & Internet Access

In support of its public service mission, the library provides free access to computers and to internet resources.

The internet offers access to many valuable information sources. However, some information found on the internet may be inaccurate, incomplete, dated, or offensive to some. Customers must evaluate the validity and appropriateness of information found on the internet. The library does not monitor or control the accuracy of information accessed through the internet and assumes responsibility only for the information it creates and provides on its home pages.

Parents/guardians are responsible for deciding what library resources are appropriate for their own children. Consequently, parents must guide their children in use of the internet and inform them about sources they should not use. The library will not monitor a child’s internet use on behalf of the parent. Computers designated for public use in the children’s area of the library are not internet access computers and are therefore safe for use by children.

Users should be aware that the internet is not a secure medium and that third parties may be able to obtain information regarding users’ activities. However, the library does not keep information on the use of specific internet resources by the public except as required by law or necessary for the proper operation of the library.

The library staff is unable to assist library customers with solving technological problems relating to their personal computer or specific computer programs or services they may wish to purchase.

Public Computers
The library uses a public computer reservation system to manage reservations and printing from public computers. Cardholders in food standing may use their library card to log on to any available computer. Computer use is limited to one hour during peak times. During slow periods, customers may request that staff extend their session if other reservations have not been made. Customers are limited to two (2) sessions per day.

Customers may print letter-size pages from the internet or their own documents at a cost of $.15 per page.

The Library’s public computers and internet access may not be used to:
• Violate the law
• Send, receive, or display text or graphics that may reasonably be construed as inappropriate or obscene
• Harm or compromise the safety, security, privacy, or property of others
• Seek unauthorized access to any computer system
• Alter or damage software components of any network, host server, or database
• Install software of any kind or download plug-ins
As part of the computer usage agreement customers must abide by these policies and are advised that failure to do so will result in the loss of computer and internet privileges at the library. This includes use of another customer’s library card number to log on to a computer.

Laptop Check out Policy
Library laptops are available for check out in two- hour increments. The primary purpose of library laptop access is for computer projects that may take longer than the usual one- hour limit. This includes research, typing papers, resumes, etc. Laptops may be used for short-term use if all of the desktop computers are occupied with a waiting time more than 30 minutes. Library customers must be 18 or older AND have a library account in good standing (no fines or overdue materials) in order to check out a laptop.

Patrons must present their library card AND a valid photo ID in order to check out laptops. The equipment may NOT be removed from the building.

Customers using their personal computer equipment with library wireless service are required to observe the above listed guidelines.

Computer Usage Violations will be dealt with as follows:
• An individual observed, by staff or other library users, displaying an offensive site, a verbal warning is given.
• A second violation may result in the suspension of library computer use for three months
• The third and final violation will result in permanent suspension of library computer use.

Online public access catalog (PAC) computers. Library customers may use the PAC computers to search the catalog or make public computer reservations. Only library staff may the PAC computers to search databases in response to reference questions.

Wireless access
Customers must supply wireless network card devise. Most wireless equipment is compatible. However, the library makes no guarantees as to the compatibility of a customer’s hardware with the library’s network. Printers are not part of wireless accessibility in the library. To print, customers must save their work to a USB drive, then log into a public computer and send the job(s) to the public printer. You may also ask at the information desk about use of the wireless printer.

The library’s wireless network is an open network, and therefore not secure. Information sent to or from a wireless device can be intercepted by anyone else with a wireless device and appropriate software, within the range of the library’s wireless access point. The library also cannot guarantee the safety of computer communication across its wireless network. The library also assumes no responsibility for the configurations, security or files on a customer’s laptop or wireless device resulting from connecting to the library’s network.

The Nelson County Public Library’s website provides information about the library system’s collections, services, events and ongoing activities, directories, and a variety of databases and resource materials. It also contains useful links to other websites.

In choosing sources to link to our home pages, the library staff follows its materials selection guidelines. However, the library is not responsible for content or changes in content of the sources to which its home pages link, or for the content of sources accessed through secondary links. The library strives to make its website, current, informative, and easy to use.