This page uses javascript to help render elements, if you have problems please enable javascript.
 
You are now inside the main content area
 
 
 
left col

California State University, Fullerton

Use of Public Computer Equipment in the Pollak Library

right col
 
left col
right col
 
left col
  1. The Student Genius Center (SGC) guest account provides one-day access to computer resources for Pollak Library’s affiliated patrons who do not have a campus login. These affiliated patrons are students at other academic institutions and to our alumni, the affiliated groups. 
  2. Individuals may use public computer equipment in the Pollak Library for scholarly research and educational purposes only. All other uses are not permitted, including:
    1. Distributing unsolicited advertising or mass mailings
    2. Disrupting or interfering with network users, services or equipment through the propagation of worms, viruses or similar devices
    3. Sending intimidating, harassing, threatening or forged electronic communications
    4. Using public computer equipment for commercial purposes or financial gain
    5. Installing software not approved by the University
    6. Attempting to bypass system restrictions or tampering with system files, applications or security
    7. Making unauthorized alterations to computer settings or configurations
    8. Copying copyright-protected materials without authorization
  3. Although the University does not routinely inspect or monitor computer activity, it may do so at its sole discretion. Browsers may record Internet activity, thus making it  possible for other users to identify the results of previous searches. Computer screens are visible to more than just the user. For these reasons, users should not assume or expect that their activity is private or confidential.
  4. Use of public computer equipment is a privilege. Users are expected to comply with the Library’s Code of Conduct and all other applicable laws, regulations, policies, contracts and licenses, including those that address obscenity, child pornography, personal conduct, file sharing and copyright use. Users must use their correct name and/or valid identification card whenever prompted. A valid must clearly show your name and photo and have an expiration data that has not expired. Temporary IDs, photocopies or images shown via a smart phone, or IDs that are tearing or broken are not acceptable.
  5. The University is responsible for providing a work and academic environment free of harassment. Users must be sensitive to the fact that some on-screen images, text or  sounds may create an atmosphere of harassment for others. Any display of images, text or sound that may be reasonably interpreted as offensive is prohibited. The University may take any steps it deems necessary to maintain that environment conducive to study and research for all Library patrons.
  6. Parents, legal guardians, or care givers are responsible for their children’s use of the Internet and for intentional or inadvertent viewing or reading of other users’ screens.
  7. The Internet contains material that is not timely, legal or accurate, and which some may find offensive, disturbing or controversial. The University disclaims any responsibility or liability for any conduct, content, materials, goods and services available on or through the Internet.
  8. Members of the public must relinquish computers upon library staff request if needed by University faculty, staff or students. Unattended public computers are available for use by any patron. The Library may take additional steps to regulate computer use, such as setting limits on use of computer resources.
  9. When saving information, users must copy information to a disk or other storage device. The University is not responsible for the loss of property or damage to storage devices, data hardware or software.
  10. Conduct that violates these guidelines subjects users to restriction or elimination of access and appropriate disciplinary and/or legal action. Nothing in these guidelines precludes enforcement under any applicable federal, state or local law. The University may, when reasonably necessary to protect the integrity, security or functionality of University computing resources, restrict or suspend access while an alleged violation is investigated.
right col
 
left col
right col