Skip Navigation
Library
Member, Texas Tech University System The Princeton Review - 373 Best Colleges, 2011 Edition

Policy no. 9 - Appropriate Use of Electronic Information Resources

Date of last revision: 10 April 2006

The appropriate use of the Library’s electronic information resources (hardware and software) is in support of research, instructional, administrative, and other intellectual pursuits consistent with the Library’s and Angelo State University’s mission and objectives. Users are expected to follow all University policies related to computer resources. The Library assumes no responsibility for damages, direct or indirect, arising from the use of the Library’s electronic information resources (hardware and software). The Library does provide access to the Internet, government document resources, and limited database applications to the general public and a selected number of computers in the Reference Area.

  1. Computers Reserved for ASU Community Use.
    1. Primary Users
      1. Members of the Angelo State University Community (students, faculty, and staff) are authorized to use the Library’s computers. These computers may also be used by visiting groups in conjunction with library instruction sessions.
      2. Due to limited resource, users must not make unreasonable use of the services and equipment provided.
    2. Priority Use
      1. Access to information resources provided by the Library, general application software, Internet access, and other networked or locally mounted information resources.
      2. University related functions such as registration, checking student records, etc.
    3. Unacceptable Use (1)
      1. Violation of U. S. copyright laws and licensing agreements.
      2. Modifying profiles and images on University computers by removing, relocating, modifying, or damaging University owned hardware, software, or data display and desktop configurations.
      3. Intentional downloading or uploading of computer viruses.
      4. Use must not be disruptive or of a nature that other users in the vicinity find to be harassing or disruptive. Be aware that “a person commits an offense if he intentionally or knowingly displays or distributes an obscene photograph, drawing, or similar visual representation or other obscene material and is reckless about whether a person is present who will be offended or alarmed by the display or disruption.” (V.T.C.A., penal code § 43.22 (a)) Report any incidents of harassment using university computing resources and facilities. It may be harassment if (A) the behavior is unwelcome; (B) the behavior interferes with your ability, or the ability of others to work or study; and (C) the behavior creates an intimidating, hostile, or offensive environment.
      5. Attempted evasion of system and network security measures.
      6. Infringement of the security or privacy of either University or non-university computer systems and/or other individuals.
    4. Additional Restrictions.
      1. The Library and Information Technology representatives reserve the right to regularly delete files from system and network hard drives.
      2. The Library reserves the right to impose time limitations on the use of the computers in the Library.
      3. The Library reserves the right to have some computers set for accessing only the on-line catalog (RamCat). These computers are primarily located away from the Reference Desk area.
    5. Enforcement.
      1. Library staff members have the right to enforce this policy; obtain University Police aid for assistance in the enforcement of Library and University policies and procedures, state and federal laws, and Regent’s Rules and Regulations; and to deny access for violations of provisions. University policies will govern loss of privileges.
      2. Any user objecting to the provisions or enforcement of this policy may follow the established University appeals process
  2. Public Access Computers.
    1. Users
      Because the Library is a depository for Texas state documents and U.S. government publications, these computers are open for use by the general public. They are also available for use by the general public for Internet access.
    2. Priority Use
      1. The Library provides access to electronic state and federal government information made available through both the Texas State Publications Depository Program and the Federal Depository Library Program.
      2. Access to tangible and Internet accessible electronic-only depository titles is free to any library user with no fees, age restrictions, or residency requirements.
      3. Accessing federal and state government depository information on the Internet would fall under the definition of “library research.”
    3. Unacceptable Use (1)
      1. Violation of U.S. copyright laws and licensing agreements.
      2. Modifying profiles and images on University computers by removing, relocating, modifying, or damaging University owned hardware, software, or data display and desktop configurations.
      3. Intentional downloading or uploading of computer viruses.
      4. Use must not be disruptive or of a nature that other users in the vicinity find to be harassing or disruptive. Be aware that “a person commits an offense if he intentionally or knowingly displays or distributes an obscene photograph, drawing, or similar visual representation or other obscene material and is reckless about whether a person is present who will be offended or alarmed by the display or disruption.” (V.T.C.A., penal code § 43.22 (a)) Report any incidents of harassment using university computing resources and facilities. It may be harassment if (A) the behavior is unwelcome; (B) the behavior interferes with your ability, or the ability of others to work or study; and (C) the behavior creates an intimidating, hostile, or offensive environment.
      5. Attempted evasion of system and network security measures.
      6. Infringement of the security or privacy of either University or non-university computer systems and/or other individuals.
    4. Additional Restrictions
      1. The Library and Information Technology representatives reserve the right to regularly delete files from system and network hard drives.
      2. The Library reserves the right to impose time limitations on the use of the computers in the Library.
    5. Enforcement
      1. Library staff members have the right to enforce this policy; obtain University Police aid for assistance in the enforcement of Library and University policies and procedures, state and federal laws, and Regent’s Rules and Regulations; and to deny access for violations of provisions.
      2. Any user objecting to the provisions or enforcement of this policy may follow the established University appeals process.

_______________________________

1. For additional information concerning unacceptable use of University networked resources and hardware, please see Angelo State University’s OP 44.00: Information Technology Operating and Security Policy

Back