Computer Use Policy
The Ira. J. Taylor Library provides computer resources to support the scholarly research and educational purposes of the Iliff community. Such academic work takes precedence over all other uses of the computers.
The Library’s computer resources are available for use by all patrons; however, priority in seating is given to our primary clientele, particularly during peak times. The Library’s primary clientele includes Iliff faculty, staff, students, trustees, and others as authorized by the Library Director.
The acquisition of electronic resources by the Library will conform to the criteria and guidelines established in the Library’s Collection Development Policy; the Library Director makes the final decision on the acquisition or cancellation of a Library resource or database. For a copy of the Collection Development Policy, see the Library Director.
Use of Computer Work Stations
The Library supports the scholarly research and educational goals of the Iliff School of Theology. The following represents a guide to acceptable use of Library computer workstations and electronic resources. It is not intended to identify all acceptable uses, but to indicate those uses which are clearly consistent with the purposes of these resources at the Library.
Acceptable uses include:
- Accessing the online catalogs of Taylor Library and other libraries
- Accessing online, web-based, or CD-ROM databases that the Library has either purchased or for which the Library has obtained site licenses
- Accessing Internet resources for educational research
- Using Iliff and/or DU e-mail
- Using Iliff supported software, including the Microsoft Office Suite (Word, Excel, Power Point, and Access)
- Accessing web-based course materials and discussions
The following list characterizes unacceptable use. It is not intended to identify all unacceptable uses, but to indicate the types of uses which are clearly inconsistent with the purposes of these resources at the Library.
Unacceptable uses include:
- Failing to comply with United States or Colorado law, including copyright laws and licensing agreements, or engaging in any other illegal activity
- Failing to comply with the policies listed in the current Iliff School of Theology Handbook, including the Standards of Community Conduct, Policy on Protection Against Sexual Misconduct, and Policy on Academic Integrity
- Violating the Library computer security or network integrity, including attempts to bypass network security, obtain passwords, share passwords with others, or the unauthorized use of passwords
- Behaving in ways that are disruptive, abusive, offensive, or insensitive to the rights of others, or that obstruct others in their use of Library resources
- Engaging in commercial activities other than Iliff School of Theology business
- Deliberately altering any files or modifying the configuration of any Library PC or peripheral
- Damaging or destroying equipment
- Connecting unauthorized equipment to the Library network
- Removing any part of the Library computer workstations
- Attempting to fix or repair hardware and/or software problems
- Downloading and/or installing files or software to hard drives
- Using printing resources excessively
Conditions of Use
By using the Library’s computer and/or electronic resources, you are agreeing to accept personal responsibility for considerate, ethical, and responsible behavior in your use of the available resources.
Questions as to what is or is not an acceptable use should be directed to the Library Director or the Reference Librarian. The Library Director or the Reference Librarian may at any time make a determination as to whether or not a particular use is or is not consistent with the purposes of the Library’s Policy on the Use of Library Computer Resources, and is therefore acceptable or unacceptable.
The consequences of failing to comply with this policy will be determined by the Library Director and weighted according to the severity of the infraction(s).
The Library is not responsible for the loss or corruption of data, and assumes no responsibility for damages, direct or indirect, arising from the use of its computer and network facilities.
The Library is not responsible for files saved on computer hard drives. Staff will regularly delete these files.
The Library supports open access to the Internet for research purposes but cannot be responsible for intentional or inadvertent viewing of particular sites by patrons.
Patrons may not reserve computer workstations in advance, nor may they leave personal materials at a workstation in order to reserve it while they are gone for an extended period of time.
The Library reserves the right to establish time limits or change policies as needed. Any questions regarding this policy or Library computing resources should be directed to the Librarian.