Go back

Library Computer Use Policy

Woodward Library offers computer access to electronic resources that include research databases, software programs such as Microsoft Office and others, email, and the Internet. Access is a privilege, not a right, and requires responsibility on the part of the user.

The Internet offers access to all kinds of information. Not all of these information sources are accurate, comprehensive, up-to-date, legal, ethical, or philosophically acceptable to all people. Some information may be offensive, controversial, erroneous, or illegal. It is the responsibility of the user to use online resources and information in a manner that is appropriate. Woodward Library staff cannot monitor or control the content of materials found on the Internet.

Acceptable Use

All electronic activity on the Library computers will be in accordance with acceptable use standards (see APSU Policy 4:029 Acceptable Use of Information Technology Resources). Failure to abide by these standards may result in the loss of Internet, computer, and other privileges. Computer users are expected to strictly follow the general use guidelines listed below.

  1. Respect for others using Library computers.
  2. Compliance with copyright law and licensing for individual data and programs.
  3. Consideration for the security and functioning of computers, computer networks, and systems.

Unacceptable Use

Library computer resources may be used only for legal purposes in accordance with the standards outlined above and in the APSU Policy 4:029. Examples of unacceptable use of library computers are listed below. This list in not exhaustive and only serves to show examples of behaviors not allowed

  1. Uses for any purposes that violate applicable federal, state, or local laws including copyright laws.
  2. Interfering with or disrupting other computer users, services, or equipment.
  3. Attempting to gain or gaining unauthorized entry to other computing, information, or communications sources or devices (hacking).
  4. Malicious, threatening, harassing, or obscene behavior or language.
  5. Accessing, uploading, downloading, transmitting, or distributing pornographic, obscene, or sexually explicit language or material.
  6. Unplugging a library network cable.
  7. Plugging a non-library computer into a library network connection.
  8. Logging into a library computer with another person's credentials.
  9. Allowing someone else to login to a library computer with your credentials or logging-in another person with your credentials.
  10. Misrepresentation of oneself or the Library.
  11. Activities that could cause congestion and disruption of networks and systems.
  12. Unsolicited advertising.

User Responsibilities

  1. Users are responsible for the ethical use of library computers, including both honesty in their academic pursuits and respect for others who share these resources.
  2. Access to library computers is on a first-come, first-served basis. Users may have to wait in line for a computer during busy times. APSU students have priority over non-APSU users for computer use. Academic computer use has priority over non-academic computer use. APSU students engaged in non-academic pursuits may be asked to relinquish their computers to students who need to do academic work for classes.
  3. Some library computers may have specialized software (Course Compass) installed on them to assist with specific classes. Students who need these resources have priority on those machines.
  4. Users are expected to exercise good judgment when submitting printing tasks and take proper care of the computers, printers and all other equipment found in the Library.
  5. Users are expected to be conservative in their use of paper and to exercise discretion when printing documents to prevent waste of expensive printing materials.
  6. Users should print only materials needed for academic purposes.
  7. Users are responsible for data safety and protecting their work. Users should save their work to every time they add data. A limited number of flash drives are available for check-out (3 day limit) at the Access Services Desk.
  8. Users should notify library staff if the computer, printer, or other equipment has failed to respond correctly or if there is a problem.
  9. Those using library computers should work quietly. Loud conversations and disruptive behavior disturb others who are trying to do academic work.
  10. Users may not encroach on others' use of computing resources. Such activities include, but are not limited to, sending harassing messages, introducing viruses or anything else which damages software or hardware, and misrepresenting one's identity in electronic communication.
  11. Persons who are disruptive while using library computers will be asked to leave immediately. Campus security may be summoned if a disruptive user refuses to leave the Library. Repeated incidents of disruptive or harassing behavior will result in loss of library computer use privileges.
  12. The Library Information Commons is primarily a self-service facility. Users are responsible for learning the skills necessary to use the computer applications. Computer assistants are available for basic assistance.
  13. Users are welcome to use their personal laptops, tablets and mobile devices in the Library; however, users may connect these devices only to the wireless network. Library staff may help users with personal devices, mainly to connect to the wireless network, to print documents to public printers, and to access electronic resources provided by the Library or the University. Please note that the Library takes no responsibility for failure of personal devices or data loss.