March 16, 2026 Regular Board Meeting

STOW-MUNROE FALLS PUBLIC LIBRARY

BOARD OF TRUSTEES

REGULAR BOARD MEETING

Monday March 16, 2026

The meeting was called to order at 6:32 PM by President Wyckoff

PRESENT

Carla Wyckoff, President; Tom Shubert, Vice-President; Emily Hegner, Secretary, Craig Mancuso, Angela Daniel, Michael Jundi, Richard Bedell

ABSENT

OTHERS PRESENT

Kristin Casale, Interim Director; Kevin Gemmell, Interim Fiscal Officer

PUBLIC

ACTION ITEMS

MOTION NO. 260316-1 APPROVE FEBRUARY 11, 2026 SPECIAL MINUTES

Shubert moved, Mancuso seconded:

RESOLVED: That the Board Minutes of the February 11, 2026 special meeting be accepted and approved.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert, Bedell

NAYS:

Motion carried.

MOTION NO. 260316-2 APPROVE FEBRUARY 12, 2026 SPECIAL MINUTES

Shubert moved, Mancuso seconded:

RESOLVED: That the Board Minutes of February 12, 2026 special meeting be accepted and approved.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert, Bedell

NAYS:

Motion carried.

MOTION NO. 260316-3 APPROVE FEBRUARY 16, 2026 ORGANIZATIONAL MINUTES

Shubert moved, Jundi seconded:

RESOLVED: That the Board Minutes of February 16, 2026 organizational meeting be accepted and approved.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert

NAYS:

ABSTAIN: Bedell

Motion carried.

MOTION NO. 260316-4 APPROVE FEBRUARY 16, 2026 REGULAR MINUTES

Shubert moved, Jundi seconded:

RESOLVED: That the Board Minutes of February 16, 2026 regular meeting be accepted and approved.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert

NAYS:

ABSTAIN: Bedell

Motion carried.

MOTION NO. 260316-5 APPROVE FEBRUARY 23, 2026 SPECIAL MINUTES

Mancuso moved, Shubert seconded:

RESOLVED: That the Board Minutes of February 23, 2026 special meeting be accepted and approved.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert

NAYS:

ABSTAIN: Bedell

Motion carried.

FINANCE

MOTION NO. 260316-6 APPROVE JANUARY 2026 TREASURER’S REPORT

Shubert moved, Bedell seconded:

RESOLVED: That the Board approves the January 2026 treasurer’s report.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert, Bedell

NAYS:

Motion carried.

MOTION NO. 260316-7 APPROVE FEBRUARY 2026 TREASURER’S REPORT

Bedell moved, Shubert seconded:

RESOLVED: That the Board approves the February 2026 treasurer’s report.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert, Bedell

NAYS:

Motion carried.

MOTION NO. 260316-8 APPROVE BOARD OF WORKERS COMPENSATION PAYMENT

Mancuso moved, Shubert seconded:

RESOLVED: That the Library Board of Trustees accepts the payment from the Ohio Board of Workers Compensation for $3,337 to be deposited into the Workers Compensation Account 101.0.51650.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Jundi, Wyckoff, Mancuso, Shubert, Bedell

NAYS:

Motion carried.

PROGRAM

INTERIM DIRECTOR’S REPORT

MOTION NO. 260316-9 ACCEPTS DIRECTOR’S REPORT

Shubert moved, Jundi seconded.

RESOLVED: That the Library Board of Trustees accepts the written February 2026 Interim Director’s report.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Mancuso, Jundi, Bedell, Wyckoff, Shubert

NAYS:

Motion carried.

DISCUSSION ITEMS

  1. Update on the Hinkle and Audit
    Mr. Gemmell stated that the Hinkle report has been completed and submitted. He added the auditors will reach out to the library when it is time to do the audit.
  2. Board Emails
    Ms. Daniel asked the Board members to verify their preferred contact email addresses.
  3. 125 Tax Issue
    Ms. Casale stated that the 125 tax issue has been resolved in full.
  4. OLC Trustees Dinner May 7
    All Board members stated they plan to attend the annual OLC trustees dinner on May 7.

BOARD COMMITTEES

Buildings and Grounds and Technology

MOTION NO. 260316-10 ADOPT BOARD BOARD POLICY: CYBER SECURITY POLICY

CYBER SECURITY POLICY

Ms. Hegner brought the following resolution forward.

RESOLVED: That the Library Board of Trustees adopt the Board Policy: Cyber Security Policy as follows:

Cyber security is defined as the administrative, technical, or physical safeguards the Stow-Munroe Falls Public Library (“library”) uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle confidential customer or staff information (“confidential information”).

The library will take every reasonable precaution to ensure that any confidential information that is kept by the library for any purpose is safeguarded from unauthorized access. The library has a responsibility to ensure that the accessing, handling, sharing and disposing of confidential information complies with the Privacy Policy of the Stow-Munroe Falls Public Library, the Confidential Information Rules for the CLEVNET System, the CLEVNET Cyber Security Policy, and the Ohio Revised Code Chapter 1347. Within the credit card holder data environment, the library will also comply with the latest revision of the Payment Card Industry Data Security Standards (PCI DSS).

This policy covers all electronic information resources in the library. It applies equally to network servers, workstations, both staff and public access, network equipment, telecommunications equipment, and peripherals, such as printers, within the library. The policy applies to all library staff, volunteers, and contract workers using the library’s computer resources.

ROLES AND RESPONSIBILITIES

Under the guidance of the Library Director and the staff of CLEVNET, the Information Systems Manager will be designated to oversee the library’s information security program. They will address potential risks to the security, confidentiality, and integrity of confidential information that could result in a compromise. The Information Systems Manager must ensure that the following standards are met on every computing system, equipment, or network with access to confidential information:

  • Secure computing systems, equipment, and networks with confidential information
  • Restrict physical and login access to authorized users
  • Maintain up-to-date software patches and anti-virus software
  • Ensure and maintain complete system backups
  • Enable and use host-based firewalls if available
  • Perform regular security scans on computing systems, equipment, and networks
  • Provide training, or at least written training materials, to all staff, volunteers, and contract workers in the appropriate use of the network, awareness of the possible effects of misuse or unauthorized use of computer resources, and the consequences of any unauthorized use.

AUTHORIZED USERS

Authorized users may be staff members, volunteers, and contract workers. They are responsible for confidential information in their custody. Maintaining the confidentiality, integrity, availability, and regulatory compliance of confidential information stored, processed, or transmitted at the library is a requirement of all authorized users. All authorized users with access to confidential information will:

  • Be assigned a unique user ID and initial password according to established procedures to gain access to network resources. Users must not share or disclose unique user IDs/passwords unless the user ID is already designated as a departmental “shared” user ID/password. 
  • Notify their manager and Information Systems Manager immediately if confidential information, passwords, or other system access control mechanisms are lost, stolen, or disclosed or suspected of being lost, stolen, or disclosed. 
  • Restrict physical access to laptop computers when the user is physically away from the computer by locking the door or using security cables or devices. 
  • Secure all staff computers by using a screen saver or built-in lock feature when the user physically walks away from the workspace. 
  • Maintain possession or control of mobile devices to the extent possible to reduce the risk of theft and unauthorized access. 
  • Secure computers and mobile devices with passwords and/or two-factor authentication for highly sensitive information. 
  • Use secure methods to transfer confidential information. CLEVNET-provided email systems are enabled with encryption capabilities on demand. 
  • Not intentionally damage, alter, misuse any library owned or maintained computing systems, equipment, or networks.

LIBRARY MANAGERS

Library managers, with guidance or direction from the Information Systems Manager, are ultimately responsible for ensuring that this Information Security policy and individual responsibilities are clearly communicated to staff and are adequately followed. Specific responsibilities of library managers include:

  • Ensuring staff understand the danger of malicious software, how it is generally spread, and the technical controls used to protect against it. 
  • Informing the Information Systems Manager and the Director of the change in status of staff, volunteers, or contract workers who use the library computer resources. This could include a position change (providing greater or more restricted access privileges) or termination of library employment.

GENERAL POLICIES

  • The Information Systems Manager and CLEVNET IT are responsible for maintaining the security of the computer. All authorized users of the system are responsible for following all policies and procedures in this policy. 
  • Server security shall be exclusively controlled by the Information Systems Manager and CLEVNET IT. Access to server security mechanisms by all other users without prior authorization shall be considered unauthorized access. 
  • All users must be authenticated to the network before accessing network resources. 
  • Users may not log into library resources with the intention of providing access to any other user, including staff members, volunteers, or contract workers. 
  • Use of network hardware or software such as traffic monitors/recorders and routers shall be restricted to network management or a designated administrator. 
  • Security training shall be integrated into existing library training programs such as orientation programs for new employees or volunteers, in the use of computers, software, and network information resources. 
  • Incident logs and subsequent security reports will be generated and reviewed on a regular basis.

ENFORCEMENT

When users fail to comply with this policy, confidential information that is stored, processed, or transmitted on the Stow-Munroe Falls Public Library network may be exposed to the unacceptable risk of loss of confidentiality, integrity, or availability. Violations of security guidelines and procedures established to support this policy will be promptly investigated and could result in disciplinary action up to and including termination of employment or termination of rights to use the computer resources.

BREACH OF SECURITY

Any actual or suspected security breaches involving confidential information must be reported immediately to the Information Systems Manager, the Director and CLEVNET IT. Incident response procedures will be initiated to identify the suspected breach, remediate the breach, and notify appropriate parties.

RANSOM PAYMENTS

Ransom payments must be approved by the Board of Trustees before being transmitted if library data or software is held for ransom by an external entity.

The roll being called on its adoption, the vote resulted as follows:

AYES: Daniel, Hegner, Mancuso, Jundi, Bedell, Wyckoff, Shubert, Bedell

NAYS:

Motion carried.

FINANCE

Mr. Bedell reported that Finance did not meet and stated the library has approximately $2,078,102 in savings, which is over and above the preferred minimum of $1 million.

FUNDING INITIATIVES

Ms. Wyckoff said she had nothing to report.

HUMAN RESOURCES

Mr. Mancuso stated the committee has been meeting regularly and has scheduled FO candidate interviews

LEGISLATION/RULES

Ms. Daniel said the committee March 4 and made revisions to the bylaws. A draft copy will be sent to the Board next month.

LONG RANGE PLANNING

Mr. Shubert stated the committee has not met and had nothing to report.

RECORDS COMMISSION

This committee did not meet, because it meets annually in the fall.

NEW BUSINESS

EXECUTIVE SESSION

MOTION NO. 260316-11 THAT THE BOARD OF TRUSTEES ADJOURN TO EXECUTIVE SESSION

Shubert moved; Mancuso seconded;

RESOLVED: That the Board of Trustees moves to adjourn into executive session to discuss the hire of fiscal officer and director and exit interview of outgoing director at 7:44 PM.

AYES: Bedell, Hegner, Jundi, Wyckoff, Daniel, Shubert, Mancuso

NAYS:

Motion carried.

MOTION NO. 260316-12 THAT THE BOARD OF TRUSTEES ADJOURN TO REGULAR BOARD MEETING

Shubert moved, Mancuso second;

RESOLVED: That the Board of Trustees moves to adjourn to the regular meeting at 8:17 PM.

AYES: Mancuso, Hegner, Jundi, Wyckoff, Daniel, Shubert, Bedell

NAYS:

Motion carried.

ADJOURNMENT

MOTION NO. 260316-12 ADJOURNMENT

Shubert moved; Mancuso seconded to adjourn the meeting at 8:18 pm.

All were in favor.

Motion carried.

Board Secretary ________________________________

Board President ________________________________

Kristin Casale

Interim Library Director


Source URL: https://www.smfpl.org/about/board/minutes/mar162026reg