Guidelines for Appropriate Use of Computer & Network Resources
All network and computer use in the library
- Library/Information Technology personnel are authorized to
monitor suspected violations and to examine items stored on any library
medium by individuals suspected of violating this policy.
This includes routine monitoring of network traffic for unusual behavior
such as virus-like activity or extreme use of bandwidth from, for example,
- You must comply with applicable federal, state, and local laws, as well
These include but are not limited to policies regarding
intellectual property, copyright, and sexual harassment. The use of most
electronic resources is governed by license agreements for the purposes
of research, teaching and private study. Authorized users include current
Claremont Colleges faculty, students, and staff and on-site users of
The Claremont Colleges Library. Systematic downloading of articles or
other information, sharing of articles or other information with
individuals at other institutions, making content available on openly
accessible servers / web sites, and using such articles or information
for commercial purposes are expressly prohibited. Misuse could result in
termination of the license and loss of the use of this material by the
entire Claremont Colleges' community. In addition, users should be aware
that publishers may monitor use of electronic resources to ensure that
the terms of their license agreements are enforced.
- You must not attempt to gain access to, circumvent, or crack systems
you are not
authorized to use. Attempting to bypass existing security measures
both digital (e.g. passwords) and physical
(e.g. cable locks) is
forbidden and considered vandalism under
California Penal Code Section 594.
- Violations of these policies can result in
loss of network, computer, or library privileges
violators may be referred to their home campus
for disciplinary action.
Use of library-owned computer resources
- Library-owned network and computer equipment are provided to
support the educational
mission of The Claremont Colleges and are therefore
to be used
for academic purposes only. Recreational or commercial use of library
computers or network resources is not allowed.
Non-academic uses such as personal e-mail
should not be used if there are other people
waiting for the computer, and kept to a minimum at all times.
- "Library-owned equipment"
includes computers in the stacks and Search Center,
printers and other peripherals, networks, access points, Internet connection, and bandwidth.
- Priority for the use of computer resources is given to students,
faculty, and staff of The Claremont Colleges. Some resources
are exclusively for the use of students, faculty, and staff.
- Assume that files and information stored on public computers or
sent via e-mail
are neither private nor confidential. Do not send anything via e-mail
that you wouldn't want to see on the front page of the New York Times.
Passwords, user accounts, and other systems may be in place to
security and privacy of your files but cannot be guaranteed by the
- Personal files left on library workstations will be deleted daily.
Store your files on a
drive, floppy disk, or
e-mail them to yourself.
- Only software installed by the library is allowed. Do not download
or install software on any library computer.
Using your personal laptop in the library
- Keep in mind that library-owned resources, including
networks, access points, and bandwidth, are intended
for academic purposes, not for personal profit or recreation.
- Use of games, online shopping, ebay, file-sharing, or
programs that consume a lot of
bandwidth is discouraged. Excessive use of bandwidth, especially for
could result in loss of network privileges.
- Intentional propagation of viruses, worms, spyware, or other malware is
forbidden and may result in disciplinary action.
- You are responsible for securing your own machines against viruses
and other attacks to reduce the risk of damage to your data and harm
to other network computers.
Prudent internet use
includes maintaining an up-to-date anti-virus program,
up-to-date patches for your operating system and applications,
and periodic spyware scans.
Use of automatic update features is recommended.
- If your machine becomes compromised or infected your network access
will be disabled until the problem is solved.
11/6/2014 6:42:15 PM
$Revision: 14711 $ $Author: margareth $ $Date: 2014-11-04 15:18:47 -0800 (Tue, 04 Nov 2014) $