Skip page navigation

image of libraries

Executive Summary

Guidelines for Appropriate Use of Computer & Network Resources

All network and computer use in the library

  • Library/Information Technology personnel are authorized to monitor suspected violations and to examine items stored on any library medium by individuals suspected of violating this policy. This includes routine monitoring of network traffic for unusual behavior such as virus-like activity or extreme use of bandwidth from, for example, file-sharing.
  • You must comply with applicable federal, state, and local laws, as well as Consortium rules. These include but are not limited to policies regarding intellectual property, copyright, and sexual harassment.
  • You must not attempt to gain access to, circumvent, or crack systems you are not authorized to use. Attempting to bypass existing security measures both digital (e.g. passwords) and physical (e.g. cable locks) is forbidden and considered vandalism under California Penal Code Section 594.
  • Violations of these policies can result in loss of network, computer, or library privileges and violators may be referred to their home campus for disciplinary action.

Use of library-owned computer resources

  • Library-owned network and computer equipment are provided to support the educational mission of The Claremont Colleges and are therefore to be used for academic purposes only. Recreational or commercial use of library computers or network resources is not allowed. Non-academic uses such as personal e-mail should not be used if there are other people waiting for the computer, and kept to a minimum at all times.
  • "Library-owned equipment" includes computers in the stacks and Search Center, printers and other peripherals, networks, access points, Internet connection, and bandwidth.
  • Priority for the use of computer resources is given to students, faculty, and staff of The Claremont Colleges. Some resources are exclusively for the use of students, faculty, and staff.
  • Assume that files and information stored on public computers or sent via e-mail are neither private nor confidential. Do not send anything via e-mail that you wouldn't want to see on the front page of the New York Times. Passwords, user accounts, and other systems may be in place to increase the security and privacy of your files but cannot be guaranteed by the library.
  • Personal files left on library workstations will be deleted daily. Store your files on a USB drive, floppy disk, or e-mail them to yourself.
  • Only software installed by the library is allowed. Do not download or install software on any library computer.

Using your personal laptop in the library

  • Keep in mind that library-owned resources, including networks, access points, and bandwidth, are intended for academic purposes, not for personal profit or recreation.
  • Use of games, online shopping, ebay, file-sharing, or programs that consume a lot of bandwidth is discouraged. Excessive use of bandwidth, especially for non-academic purposes, could result in loss of network privileges.
  • Intentional propagation of viruses, worms, spyware, or other malware is forbidden and may result in disciplinary action.
  • You are responsible for securing your own machines against viruses and other attacks to reduce the risk of damage to your data and harm to other network computers. Prudent internet use includes maintaining an up-to-date anti-virus program, up-to-date patches for your operating system and applications, and periodic spyware scans. Use of automatic update features is recommended.
  • If your machine becomes compromised or infected your network access will be disabled until the problem is solved.

Last updated: 7/28/2011 6:11:30 PM

$Revision: 8811 $ $Author: samk $ $Date: 2011-07-28 17:33:27 -0700 (Thu, 28 Jul 2011) $