Computer Use Policy

Computer Use Guidelines

  • The Libraries' computers are primarily for educational or research purposes
  • UTA students, faculty, and staff have priority.
  • The Libraries reserves the right to reclaim computers being used for personal or recreational purposes for those who need to access research resources and complete course assignments.
  • Installation of software is prohibited on the Libraries’ public computers. Software may be installed on the laptop lending computers.
  • Sound is disruptive; please use headphones, which can be checked out at the Service Desk, and keep the volume low.
  • Please be considerate of other library users.
  • Save your work often use cloud storage or a USB drive. Work is not saved when you log off.
  • The Libraries are not responsible for any damage to personal devices when used with the Libraries’ computers.

Personal Devices

  • The library is not responsible for damage to personal devices. Please connect to room displays using the Solstice Pod URL; instructions are found in the lower-left corner of the display.

Copyright

  • The copyright law of the United States (Title 17 U.S. Code) governs the making of photocopies or other reproductions of copyrighted material. The person using the Libraries’ equipment is liable for any infringement.

Internet Use Guidelines

Violations of Use

Access to the computers and/or Internet in the UTA Libraries is a privilege granted to users, and the Libraries reserves the right to suspend or amend this privilege if a user:

  • Violates Texas obscenity laws.
  • Violates UTA's Computer Usage Policy.
  • Harasses others, including but not limited to, sexual harassment.
  • Intentionally damages or destroys equipment, software, or data belonging to the Library or to other users, including adding, altering or deleting files on Library workstations or other Library computer equipment.
  • Copies/scans materials protected by copyright law beyond the bounds of fair use.
  • Violates software or database license agreements.
  • Violates or attempts to violate computer systems or network integrity, including attempts to bypass network security functions, obtain restricted passwords, or alter the configuration of library workstations in any way.
  • Uses the Internet for any illegal activity.