Computer Usage/Behavior Rules
Patron workstations are provided to support the educational, research, and informational activities of the University of Central Missouri community. The use of these computers is a privilege. It requires that individuals use the resources appropriately. This understanding governs this document, other relevant library and university policies (including UCM Acceptable Use Guidelines), and all applicable federal, state, and local laws. It is expected that public patrons not affiliated with the university will produce a photo ID with a birth date upon request by library personnel.
- Computer workstations are available throughout the library. Patrons must have a valid logon to use computers within the Kirkpatrick Library. All computers in JCKL are secured by a password except for those with restricted access to specific resources. These limited resources access computers on first and third floors are designated to access the online catalog and/or specific library resources only. UCM students, faculty, and staff have accounts established through Information Services. Should an account be inoperable, he/she can be given a temporary account for a one day period by filling out a request form at the HCC front counter with a valid university ID. Groups of approved guests supervised by university faculty and staff (a visiting high school class, for example) can be logged on using a guest login that is provided at the Harmon Computer Commons desk.
- Six computers, 3 in the Harmon Computer Commons and 3 on the second floor near the Reference Center desk, are designated for internet access by non-campus visiting patrons and are equipped with time limiting software. A photo ID must be produced at either the HCC desk or the Reference Center desk in order to obtain the visiting patron logon code. The time-limited access granted is one hour, but visiting patrons may be granted continued internet access if there is no wait list for a computer.
- First priority for use of computers is accorded to current UCM students, faculty, and staff. The library extends user privileges to others as resources permit. Any patron may be asked to present a Central ID or a photo ID with birth date.
- Computers are allocated on a first-come, first-served basis. Activities supporting the educational and research goals of the university community are primary. Secondary uses (such as personal email, chat, and computer games) may be prohibited if they are interfering with primary activities. At times, the demand for library computer equipment exceeds availability. Patrons are asked to be sensitive to the needs of others and limit use during heavy demand. The library may take additional steps to regulate computer use such as setting time limits on designated workstations. Patrons needing software or hardware on particular machines will have priority on that equipment.
- Library instruction provided by library personnel to groups and individuals has priority over al other activities.
- Food and drink is allowed anywhere within the building. Drinks should be in closed containers. Litter should be disposed of in trash containers, and
spills should be reported to the nearest service desk. All use of tobacco is
prohibited in the library.
- The library is not responsible for loss or damage of data or disks that occurs while using equipment. Do not save files on library equipment.
- Do not leave the area while the computer is logged in. Others could use your e-mail, delete files, and/or use your account for illegal activities while you are away.
- Children under age 14 may not use computers in JCKL unless under the direct supervision of a responsible adult. All activities of children must be monitored by the accompanying responsible adult.
- As an academic institution, JCKL does not filter or monitor internet content. JCKL affirms and acknowledges the rights and responsibilities of parents and legal guardians to monitor and determine their children’s access to online resources. JCKL employees assume that children accompanied by a responsible adult have parental/guardian approval to use the internet.
- Individuals are responsible for using the library’s workstations in an ethical, respectful, and lawful manner. Disruptive behavior will not be tolerated. Any activity that interferes with the rights of other patrons to use the library; disrupts the normal functioning of the library; could result in physical, emotional, or mental injury to oneself or others; or could result in damage to the facilities, equipment, or materials is considered disruptive and unacceptable behavior (e.g. moving from workstation to workstation, running, fighting, horseplay.)
- Headphone levels should not be audible to others. Patrons must be mindful of the rights of others throughout the library. Excessive noise is prohibited.
- Users may not tamper with or damage library furnishings, equipment, or computer software and hardware. They must not attempt to circumvent security (hardware or software).
- External hardware devices may not be connected to the workstations. Headphones may be connected to the external jack and USB drives may be used.
- University property must not be used for illegal activity such as scanning of identification cards, money, concert tickets or any other materials that are illegal to forge; making illegal copies of music, video or any other material covered under copyright laws; and software cannot be copied from lab workstations or illegally downloaded. Unauthorized software must not be installed.
- The public display of sexually explicit material is prohibited by Missouri law (RSMO 573.060).
- Use of library computers to solicit or conduct commercial business of any kind is prohibited.
- Courteous cell phone use is required. Please show consideration of other library patrons by conducting conversation in a quiet voice and refraining from inappropriate language or personal information. Set cell phones to vibrate or to a soft volume ring when in the library.
Library personnel reserve the right to ask any patron to leave the building if disruptive or unacceptable behavior occurs. Any of the following actions will take place:
- An individual may be notified that he/she is in violation of the standards of conduct and will be given a verbal warning.
- An individual may be asked for photo identification and the incident will be recorded and reported to the Dean’s Office.
- Library personnel may call Public Safety when deemed appropriate. Additional disciplinary action by the university may ensue.