Library Computer Use Policy

Glendale Community College - Library Media Center Effective: January, 1998

I. Introduction.

The Library of Glendale Community College (GCC) provides access to electronic resources in accordance with its mission which is "to make available to students, faculty, staff, and community patrons resources and services that support and enrich the curricula and contribute to the intellectual and cultural development of the college community.

Users of electronic information resources are expected to use these resources in a responsible manner, consistent with the educational and informational purposes for which they are provided and to follow the basic regulations, policies and procedures of the Maricopa Community College District (MCCD), Glendale Community College, and the Library Media Center. Use of Library computer systems shall conform to applicable local, state, federal, and international law.

Use of the Library's systems shall not interfere with the operations, integrity, or security of those systems, nor otherwise inhibit normal library activities or the operations and activities of other campuses and district computer systems and networks.

In accordance with its mission and the mission and policies of GCC and the MCCD, the Library reserves the right to the following:

> to alter the provisions of this policy > to change the conditions of use of its electronic information > to terminate or change, without notice, the nature of access to specific electronic resources.

Computers/Internet Access

Use of the computers in the Computer Commons area is restricted to those who are enrolled in a course at GCC. There are computers for quick look up of the catalog and databases at the west end of the library near the Information Desk. These are available for anyone; however, printing of documents cannot be done from these stations.

Open access to GCC technology resources is available to non-students for a $24 non-credit enrollment fee per semester. Contact the Help Desk for more information. For more information please visit: http://www.gccaz.edu/technology-help/computer-labs

II. Limitation of Liability.

A. General Disclaimer.

The Library disclaims any warranty of the accuracy, authoritativeness, timeliness, or usefulness of the information obtained from its electronic information systems. The Library shall have no liability for any direct, indirect, or consequential damages related to the use of the information contained in, or obtained through, its electronic information systems.

B. Access to External Networks.

The Library provides access to external computer networks, such as the Internet World Wide Web, which may enable the library and its users to obtain information not contained in the Library's collection of resources. However, the material may be unregulated and may contain information that is controversial, offensive, disturbing, erroneous, or illegal.

The Library does not monitor and has no control over materials obtained on the Internet, and cannot be held responsible for its content. The Library cannot control access to materials or protect patrons from materials they may find offensive.

As is the case with access to other materials in the Library's collection, any restriction of a minor's access to, or use of, external networks shall be the responsibility of the minor's parent or legal guardian.

C. Links to Internet Sites.

The Library, through its World Wide Web home page, provides links to useful Internet sites, which, in turn, may be linked to other sites. In choosing links, the Library selects sites that are consistent with its mission and general materials acquisitions principles. However, due to the unregulated nature of the Internet, the Library cannot monitor the sites to which it links, nor any subsequent links, and cannot accept responsibility for the content or availability of those sites.

D. Use of Copyrighted Materials.

The Library provides access to copyrighted materials, including copyrighted electronic materials. Copyright protection extends to many resources on the Internet. Responsibility for the consequences of copyright infringement shall lie with the user. The Library expressly disclaims liability or responsibility from copyright infringement by users.

E. Computer Viruses.

External computers and networks may be unregulated and may contain viruses that are potentially harmful to user's computer systems. Responsibility for identifying and eliminating viruses in data or files downloaded from the Library information systems shall lie with the user.

The Library expressly disclaims liability or responsibility for damages resulting from viruses contained in transmissions, data, files, or programs obtained from or through the Library's electronic information systems.

III. Responsibilities.

Users of the Library's electronic resources are responsible for compliance with the provisions listed under ethical use, legal use, and conditions of use.

A. Ethical Use.

Users of the Library's electronic information systems shall use them in an ethical manner. Unethical use includes:

- violating the security of any computer system, - obtaining or employing, without authorization, computer access codes, passwords, or identification numbers assigned to others, - removing, damaging, or destroying computer hardware and/or peripheral equipment and accessories, - using the Library's electronic information system in ways that unnecessarily impede the information gathering activities of others, such as by monopolizing one or more computer workstations, - using the Library's electronic information systems in ways that create a hostile environment for others, and - violating the privacy of other users.

B. Legal Use.

Users of the Library's electronic information systems shall use them for legal purposes. Any activity that is illegal under local, state, federal or international is a violation of Library, GCC, and MCCD policy. Ignorance of a law is not an excuse for violating it. Illegal purposes include, but may not be limited to, using the systems to:

- harass, threaten, or stalk other persons, - libel or slander other persons, - violate Arizona law (ARS 13-2316) by damaging, destroying, or altering without authorization any computer or electronic equipment, software, or data belonging to the Library, other persons, or other organizations, - violate the terms of the licenses under which the Library offers the use of software and data, - infringe copyrights of materials, - disrupt or monitor, without authorization, electronic communications, - knowingly uploading or downloading child pornography (federal offense), - operate or engage in scams or pyramid schemes, - violate federal computer security statutes (US Code 18, sec. 1030, as amended Oct., 1996) which includes theft of information from computers belonging to financial institutions or federal agencies, unauthorized access to government computers, intentional or reckless damage to systems, trafficking in stolen passwords, extortion threats to damage computers.

C. Conditions of Use.

To ensure that use of the Library's electronic information systems is consistent with its mission and that of GCC and the MCCD, and with ethical and legal standards set forth above, the following conditions of use shall apply:

- users shall have access to the Library's electronic information systems on a first-come, first-serve basis, - users shall limit their use of the Library's electronic information systems if other users are waiting for access to those systems according to Library policies on time and station use, - users shall not attempt to upload, install, set up, run, or execute any program or software not authorized by the Library on any of the Library's electronic information systems, - in accordance with US law (US Code Title 17) users shall not reproduce or distribute copyrighted materials without the permission of the copyright holder. Users may not copy or distribute electronic materials (including electronic mail, text, images, programs or data) without the explicit permission of the copyright holder, - users displaying or accessing explicit sexual material may be violation of (ARS 13-3507 and addendum 4) - users should be sensitive to others and use more private terminals if displaying or accessing material that may be regarded as offensive.

IV. Sanctions.

Users who violate the Library's ethical or legal use policies, or who refuse to comply with the conditions of use, will be asked to stop their activities and refrain from such activity in the future. Violators will be reported to Student Services for appropriate disciplinary action. Users who use the Library's electronic resources to commit illegal acts may also be subject to prosecution by local, state, or federal authorities.

V. Responsibilities of the Library.

A. Confidentiality of Use.

Transaction logs and other information that can be used to identify a user with specific data, files, or programs, or other electronic materials are considered by the Library to be confidential and shall not be divulged to anyone other than the user, except as otherwise provided herein.

All users are advised that such records shall not be made available to any agency of local, state, or federal government except pursuant to such process, order, or subpoena as may be authorized under the authority of and pursuant to, local, state, or federal law relating to criminal, civil, or administrative procedures or legislative investigatory power.

B. Staff Assistance.

Library staff will be pleased to assist users in accessing electronic information resources as service demands permit. Each user is, however, ultimately responsible for conducting his or her own search. Staff cannot provide in-depth individual training in the use of the Internet or of personal computers. Patrons who need in-depth instruction and training are encouraged to enroll in courses in the use of computers and the Internet, which are offered by the college.

C. Notice.

The Library shall provide notice of the provisions of this policy and shall make available both electronic and paper copies of this notice.

D Important notes.

Computer Policy -- "Courtesy Logins"

Use of the computer workstations in the Computer Commons and the Library Classroom (L-138) is limited to GCC students and employees with an activated MEID account. There are no courtesy logins. Students may inquire at HT1 about temporary or courtesy login policy.

A GCC student ID card is required to print from computer labs. ID cards can be obtained at the Enrollment Center.

Internet Disclaimer

The Internet is a global electronic information network that is not regulated by any local, state, federal, or international authority. Materials found on the Internet may contain information that is controversial, offensive, disturbing, erroneous, or illegal. The Library Media Center (LMC) disclaims any warranty of the accuracy, authoritativeness, timeliness, or usefulness of the materials, and shall have no liability for any direct, indirect, or consequential damages related to use of these materials.

Access to the Internet at GCC Libraries is for academic research purposes.

Users who access the Internet at the Library Media Center are required to conduct themselves in an ethical and legal manner, and to act in accord with the LMC Computer Use Policy, the MCCCD Technology Resource Standards, the current edition of the GCC Student Handbook and all local, state, federal, and international laws.

Access to, or use of, the Internet by minor children is solely the responsibility of the parent or legal guardian.

Pornography Statement

 In keeping with the American Library Association (ALA) Code of Ethics, GCC librarians "protect each library user's right to privacy and confidentiality with respect to information sought or received and resources consulted, borrowed, acquired or transmitted." Therefore, it is not the Library's practice to monitor the content being viewed on computer workstations.

The Maricopa Community College District has established Technology Resource Standards that prohibit certain behaviors. The viewing of pornography may fall within two of these standards:

Therefore, library staff may ask a library user to cease viewing pornography, especially in cases where a complaint has been made. If the library user fails to comply with this request, campus security may be contacted.

The librarian will contact Security, who will call the Police, if someone is viewing child pornography.

Arizona Revised Statutes: 13-3507. Public display of explicit sexual materials; classification; definitions

A. It is unlawful for any person knowingly to place explicit sexual material upon public display, or knowingly to fail to take prompt action to remove such a display from property in his possession or under his control after learning of its existence.

B. A person who violates any provision of this section is guilty of a class 6 felony.

C. For the purposes of this section:

1. "Explicit sexual material" means any drawing, photograph, film negative, motion picture, figure, object, novelty device, recording, transcription or any book, leaflet, pamphlet, magazine, booklet or other item, the cover or contents of which depicts human genitalia or depicts or verbally describes nudity, sexual activity, sexual conduct, sexual excitement or sadomasochistic abuse in a way which is harmful to minors. Explicit sexual material does not include any depiction or description which, taken in context, possesses serious educational value for minors or which possesses serious literary, artistic, political or scientific value.

2. "Public display" means the placing of material on or in a billboard, viewing screen, theater marquee, newsstand, display rack, vending machine, window, showcase, display case or similar place so that material within the definition of paragraph 1 of this subsection is easily visible or readily accessible from a public thoroughfare, from the property of others, or in any place where minors are invited as part of the general public.

  • activities that would constitute a violation of any policy of Maricopa's Governing Board, including (but not limited to) Maricopa's non-discrimination policy and its policy against sexual harassment;
  • transmitting, storing, or receiving data, or otherwise using computing resources in a manner that would constitute a violation of state or federal law, including (but not limited to) obscenity, defamation, threats, harassment, and theft.

E. Acknowledgements.

The Library gratefully acknowledges those individuals, libraries and agencies from which it received advice in the preparation of this policy and from which it adapted the language used in it, particularly Joe Schallan of the Glendale Public Library, the Glendale Public Library, the Student Services Department of Glendale Community College, and Legal Services of the Maricopa Community College District.

Last Updated: Jan 17, 2024 Views: 100 FAQ Views