You have a responsibility to occupy the library in a manner that promotes a safe, secure, open, and supportive
environment. Please help us make the library an enjoyable and productive place for all of us.
In order to protect your right of access, promote your safety, and protect library resources and facilities, the
library prohibits activities that present health or security risks, damage library resources and/or property, disrupt
library operations, or are illegal. Any behavior that is disruptive to library use is prohibited.
For your safety and security:
- You are expected to behave in a manner that ensures your safety and that of others.
- Personal belongings should not be left unattended at any time.
- Parents are responsible for their children's safety and behavior.
- Suspicious or threatening behavior and accidents should be reported to library staff immediately.
- Bicycles are not allowed inside the building.
- Roller blades, skateboards and/or scooters should not be used inside the building.
For protection of the library resources, facilities, and equipment:
- Library equipment should be used with care.
- Library staff should be alerted to missing items in collections.
- Service animals assisting persons with disabilities are welcome.
- Covered drinks and snacks are permitted. Please clean up after yourself and report spills to staff.
- Smoking and the use of chewing tobacco are prohibited.
- Theft, vandalism, graffiti, and other intentional damage to library property and collections are criminal activities punishable by law.
In consideration of others:
- Show respect and courtesy for other library users and staff.
- Refrain from disruptive behavior that affects others' use and enjoyment of the library.
- Be considerate of those around you when using computers in public areas. Avoid viewing websites and content that other patrons may find offensive.
- Respect posted time limits and use restrictions on computers in the library.
- Cell phone conversations should be conducted in appropriate conversational areas.
Library staff and administration reserve the right to enforce these guidelines consistent with the Utah Administrative Rules and
University of Utah policy including the Code of Student Rights and Responsibilities. Campus Police will be called when necessary.
Reviewed by the University of Utah Office of General Counsel and approved by the Spencer S. Eccles Health Sciences Library
Leadership Team, July 2012.
We are committed to providing the highest quality service. We are here to assist any person who seeks our services,
and to provide instruction and access to information through the wealth of print and electronic resources.
As a user-centered library, we treat people with dignity and respect. All questions are valid and answered to the
best of our ability.
In order to accomplish this:
- We acknowledge and address the person respectfully and in a timely manner.
- We respond to information requests positively and proactively.
- We strive to be honest, fair and non-judgmental in responding to requests.
- We respect the need for confidentiality.
- We offer creative solutions to unique service requests.
- We acknowledge stated problems and work towards a solution.
- We utilize our colleagues' skills and knowledge to provide excellent service to the best of our ability.
University of Utah
Student Computing Facilities
Acceptable Use Policy
The University of Utah Student Computing Labs are intended to be used for educational purposes and the legitimate business
of the University in a manner consistent with the public trust.
This policy establishes guidelines for appropriate use of student-fee funded Student Computing Facilities.
University of Utah Policy and Procedures:
III. ACCESS TO STUDENT COMPUTING LABS
- Student computing labs are funded primarily from student computing fees and are for the use of University of Utah students, faculty and staff. Others may use these labs as participants in University sponsored activities. Labs may develop procedures to issue temporary passes to participants in University sponsored activities.
- Individuals using the facilities may be asked to verify their University status by showing a University ID or by logging into computer systems. Individuals not authorized to use the facility may be required to leave.
- Computer Accounts are assigned to control access to some computing resources.
- Users are responsible for all uses of the Computer Account. User IDs and passwords must not be shared with other users. Users must log out at the end of each session.
- Knowingly using a Computer Account assigned to another person is a violation of University policy.
IV. USE OF STUDENT COMPUTING LABS
- Appropriate use of computing resources, which are supported by student fees, include academic study, instruction, and independent study or research. University related work by departments and recognized student and campus organizations of the University are acceptable.
- Inappropriate uses include interfering with the work of others, wasting resources, using the resource for private economic purposes, gambling, and any activities that involve the violation of state or federal laws and University policies and procedures. During peak times when computer workstations are in demand, recreational use such as playing games may be disallowed.
- The University of Utah endorses and promotes intellectual and academic freedom principles and encourages access to information. While users generally have the right to read and view materials of their choice, this right is balanced by the rights of others to work in a setting free of intimidation, harassment, or hostility. Child pornography and obscenity are illegal. Activities that create a hostile and/or intimidating environment for others are prohibited under University of Utah Policy and Procedure 2-6A and 2-32.
V. ACADEMIC ENVIRONMENT
- Users are expected to respect the rights of other users to create an environment suitable to academic pursuits. The following activities are prohibited.
- Activities that disrupt the work of others, including but not limited to unnecessary noise.
- Activities that encroach on others' legitimate expectations of privacy.
- Users are expected to behave in ways that enhance the environment for others and promote the reliable operation of laboratory computer systems.
- Eating or drinking in the labs is prohibited.
- Users must cooperate with the staff of the computing facility and behave in a respectful manner to them.
- Users must not abuse laboratory computer systems or other equipment.
- Users should report problems with computer lab equipment.
- Parents are responsible for their minor children's behavior, safety, and the content of information resources viewed or accessed by them in University facilities. Children who are not University of Utah students or participants in University sponsored activities must not be allowed to use lab systems or interfere with the work of others. Children must not be left unattended in lab facilities.
VI. COPYRIGHT PROTECTION
Users must not make or use illegal copies of copyrighted or patented materials, information, or software, or to store such
copies on University systems, or to transmit such information and software over University Networks.
Almost all forms of original expression that are fixed in a tangible medium are subject to copyright protection, even if no
formal copyright notice is attached. Written text, video, recorded sound, digital images, and computer software are some examples
of works that are usually copyrighted.
For more information regarding copyrights please refer to the following site: http://www.lib.utah.edu/research/copyright.php
VII. USE OF STUDENT COMPUTING LAB HARDWARE AND SOFTWARE
- Some lab systems are configured for specific applications such as image scanning, video editing, teleconferencing, or similar purposes. Users who require the specific resources provided by these systems have priority.
- Users are required to use the lab computer in a manner that does not have a detrimental impact on the stability and functionality of the systems or networks. The following activities are specifically prohibited.
- Changing system or software configurations.
- Installing any software without prior permission from lab staff.
- Disconnecting hardware, installing hardware, or changing hardware configurations.
- Engaging in any activity intended to compromise system security, compromise the privacy of other users, or obstruct the work of others. This includes but is not limited to port scanning, network sniffing, keystroke logging, using remote control software, password cracking, and similar activities.
- Using lab systems to attack, interfere with the proper operation of, or compromise the security of other computer or network systems.
- Using lab systems to send forged e-mail, send bulk mail, send unsolicited commercial e-mail, or to fraudulently misrepresent the user's identity in any communication.
- Using lab systems to initiate any communication intended to intimidate, coerce, harass, or threaten others.
- Using lab systems to distribute or develop viruses, worms, or similar software.
- Illegally sharing copyrighted materials with others.
- Installing any server software such as FTP, telnet/ssh, Web, SMTP, file sharing, and game servers. This includes but is not limited to "peer to peer" file sharing software such as KaZaA, Gnutella, or similar programs.
- Some labs permit attachment of FireWire and USB devices such as cameras and camcorders for course-related work. Other labs impose more restrictive rules. Check with laboratory staff for specific information regarding these uses.
- Laptops may only be connected to network jacks specifically provided for this purpose. Disconnecting lab systems to connect laptop computers is prohibited. Connecting laptops to unused network jacks is also prohibited. All use of laptops in University computing facilities is governed by University policies and state and federal law.
VIII. POLICY ENFORCEMENT
A violation of the provisions of this policy may result in the withdrawal of access and may subject the user to disciplinary action
or academic sanctions consistent with University policies and procedures.
All criminal activities will be referred to University Police, State and/or Federal agencies.
Reviewed by University of Utah Office of Legal Counsel July, 2002.
The Spencer S. Eccles Health Sciences Library (Eccles Library) supports the teaching, research, and learning mission of the
University of Utah.
The University of Utah makes available information resources that may be used by University students, faculty, staff, and others.
The University of Utah Information Resources Policy (Policy 4-002) states that these resources are intended to be used for educational
purposes and the legitimate business of the University and in a manner consistent with the public trust. Appropriate use of these
resources includes instruction, independent study, continuing education, authorized research, independent research, and the official
work of the offices, departments, and recognized student and campus organizations of the University.
Inappropriate uses include interfering with the work of others, wasting resources, using the resources for private economic purposes,
gambling, and any activities that include the violation of state or federal laws and University policies and procedures. Obscenity and
child pornography are prohibited by law.
The Eccles Library endorses and promotes the principles of intellectual and academic freedom and does not restrict access to information.
These important freedoms come with important responsibilities. Users of library computer workstations should be aware that some information
resources, including sites on the Web, could be offensive to other library users. Be considerate of those around you when viewing materials
in public computer areas. While you generally have the right to look at whatever you choose to view, this right is balanced by the rights
of others to work in a setting free of intimidation, harassment or hostility.
Users must be considerate in their use of shared resources and refrain from monopolizing equipment. During peak times when computer
workstations are in demand, recreational use such as playing games will be disallowed. When people are waiting for access to a computer,
reasonable time limits will be imposed.
The privacy rights of other library users should be respected. Parents are responsible for determining whether content of electronic
resources is appropriate for children and youth, for controlling their use of these resources, and for their children's safety and
behavior in the library. Use must be in compliance with state and federal laws and University of Utah policies and procedures.
Violation of the provisions of this policy may result in the withdrawal of access and may subject the user to disciplinary action
or academic sanctions consistent with University policies and procedures. Users who are not faculty, staff or students may have
their access to information resources revoked if they violate this policy.
Reviewed by the University of Utah Office of General Counsel and approved by the Spencer S. Eccles Health Sciences Library Leadership
Team, July 2012.