Computer Use Policy, UC Berkeley Library
Introduction
User Responsibility
Appropriate Access and Use
Examples, Inappropriate Use
Disclaimer
Related Information
Introduction
Beginning in November 2005, all UCB students, faculty, and staff
who logon with their CalNet ID will get unrestricted access to the
Internet. Visitors can logon for basic access, as indicated on the
welcome screen when one opens the Web browser. Basic access includes
library catalogs, article databases and other licensed library resources,
and all websites in the .edu, .gov, and .org domains. Selected .com
sites are enabled. It does not require an ID or password.
The Internet consists of information on a wide range of topics
provided by millions of individuals, organizations, and businesses
around the world. Material is not always accurate, complete, up-to-date,
or philosophically acceptable to all individuals.
The University Computer Use Policy and the Library Code of Conduct
Policy provide a basis for this policy which is intended to address
appropriate computer use, outline inappropriate use and provide
staff with implementation strategies for enforcement. In administering
access to the Internet, the library unquestionably supports open
access to the Internet for research purposes, upholds the principles
of the First Amendment and the individual's right to privacy, and
at the same time bears responsibility for providing individuals
an environment free of sexual harassment in which to work and study.
Additionally, the Library bears responsibility for effective management
of University and Library resources. This policy governs use of
Library public access computers, including but not limited to those
used to access the Internet, and should be reviewed periodically
to ensure that it fosters the academic mission while supporting
administrative needs.
User Responsibility
The purpose of providing Internet access is to further the research
and instructional mission of the University. Library staff offer
assistance and instruction in the use of the Internet as a research
and information resource. The Library does not monitor or control
Internet content and cannot be held accountable for any information
accessed through the Internet. Staff do not censor access or protect
users from information that they may find offensive. However, users
are expected to be aware of applicable University regulations governing
display of sexually suggestive materials in the workplace as well
as in public areas of the library. students.berkeley.edu/uga/sexualhar.stm
The Internet contains some material of a controversial nature.
Users are responsible for choosing sites accessed and for using
the resources in an appropriate manner. Parents, legal guardians,
or care providers are responsible for their children's use of the
Internet and for intentional or inadvertent viewing or reading of
other user's screens. The Library bears no responsibility for Internet
content. Users are responsible for scrutinizing information on the
Internet for reliability and point of view.
Appropriate Access and Use
The broad primary purpose of the computer network is to obtain
information. More specifically, public access computers are provided
primarily for Library-related activities, i.e., to access Library
catalogs, databases, websites, and to connect to Library-licensed
digital resources and to Library-related links.
UC students, faculty, staff, and individuals using depository material
have priority in use of Library resources.
Print and downloading capabilities are provided on selected computers.
There is a fee for printing.
Users are expected to observe relevant copyright laws and regulations.
copyright.universityofcalifornia.edu/
Examples of Inappropriate Use
Monopolizing computer resources, i.e., an individual using more
than one computer at a time or spending an inordinate amount of
time on a computer. When others are waiting, users are expected
to observe posted time limits.
Attempting to bypass system restrictions or tampering with system
files or applications. Unauthorized access to system files. Attempting
to disrupt the integrity of the system. security.berkeley.edu/policy/usepolicy.html
Violating federal or state laws. Violating Library and University
regulations or policies:
- Transmitting, disseminating, printing or downloading sexually
explicit images of children.
- Behaving in an abusive or harassing manner in language or images.
Unauthorized copying of copyright-protected materials.
Deliberately wasting or overloading computer resources.
Disclaimer
Library websites developed by staff include selected links to Internet
sites. Choosing to link to a website does not imply editorial or
other control over linked-to websites and is not an endorsement
of the website. The Library cannot warrant that its website, the
server(s) that make it available, or any links from its site to
other websites are free of viruses or other harmful components.
UC Office of the President Electronic Communications Policy www.ucop.edu/ucophome/policies/ec/.
Links To Related Information:
Copyright © 2013
The Regents of the University of California. All rights reserved.
Last updated
01/23/13
. Server manager: contact
|