About

Public Computer Use Policy

The University of Hawaii at Manoa Library develops collections, resources, and services that meet the educational, instructional, and research needs of the University community. To meet those needs, the Library provides computer equipment for the purpose of accessing information resources in electronic format. The Library Public Computer Use Policy is part of the Library’s overall policy structure and should be interpreted in conjunction with other existing policies and procedures. This policy refers to computers in public (non-staff) areas.

USAGE

UHM Library computers and related equipment are to be used only to access information resources for educational, instructional and research needs. The use of Library computer equipment for other purposes is prohibited. Users must respect the rights of other users and abide by all University and Library policy, licensing, and contractual agreements. Users must not use equipment in an unsafe or harmful manner and should not damage equipment and facilities. Users must comply with the University of Hawaii Policy on Acceptable Use of University Computer and Information Resources.

The following is considered unauthorized computer use and is prohibited:

  • Knowingly or carelessly performing an act that will interfere with the normal operation of computers, peripherals, or networks;
  • Attempting to circumvent data protection schemes or uncover security loopholes;
  • Using the network to gain unauthorized access to any computer systems;
  • Masking the identity of an account or machine, which includes, but is not limited to, sending mail anonymously;
  • Attempting to monitor or tamper with electronic communications of other users, or reading, copying, changing, or deleting files or software of other users;
  • Installing or uploading of software programs or graphics;
  • Using a computer account that you are not authorized to use.

It is also University policy that:

  • Displaying of sexually explicit images or sounds where others can see or hear them may create a hostile environment and could constitute sexual harassment according to University policies on sexual harassment. Library staff may intervene and direct users to cease this activity;
  • University resources are intended to be used for institutional purposes and may not be used for private gain;
  • Users must observe all laws relating to copyright, trademark, export and intellectual property rights.

PRIORITY USERS

University of Hawaii faculty, students, staff and other officially affiliated UH users have priority for accessing electronic resources and using library computer equipment. Non-affiliated users are limited to a single hour per day of Library computer use. Non-affiliated users may be asked to relinquish computers to UH faculty, staff, or students at any time. Any user may be asked to show valid UH identification. Exceptions to the above will be made for users accessing official U.S. government information available through the Federal Depository Library Program.

NOTE: An affiliated UH user is an individual who has received a temporary (e.g. visiting scholar) or long-term (e.g. employee, faculty, research associate) University of Hawaii user name and password which enables access to UH service such as UH Webmail or UH User Account Management  with the same name/password. If you cannot login to any UH service, you may check the status of your username by filling out an online form or by contacting the ITS Help Desk Telephone: Oahu – (808) 956-8883; Toll Free from Hawaii Neighbor Islands – (800) 558-2669; Email: help@hawaii.edu.

DOWNLOADING

Computers requiring user authentication have USB ports. Downloading from Library computers is allowed to the desktop, but files will be erased after logging off.

DESIGNATED COMPUTERS

Some Library computers are designated for specific purposes. Specific rules are posted adjacent to computers so designated.

POLICY VIOLATIONS

It is the policy of the University to deny access to any member of the user community who violates this policy or who uses the University’s technology resources to violate other duly established policies or laws.

Amended: Monica Ghosh, Acting University Librarian and Interim Associate University Librarian

Date: June 19, 2017.

Back To Top