Skip to main content Skip to local navigation
Home » Ask & Services » Printing & Computing » Computing & Network Access » Policy on Library Computer Use

Policy on Library Computer Use

What you can do on Library computers

The library public workstations are designed to provide York University students, faculty and staff with access to library catalogues, databases and other information resources to help them meet the objectives of their studies, research or job-related tasks.

This policy sets out appropriate use of library public workstations to: ensure the maximum library-related use of limited numbers of public workstations; prevent damage to library computing resources; ensure compliance by library patrons with. York University Policy on Computing and Information Technology Facilities.

Table of contents:

1. Library Activities

The following are appropriate library workstation activities:

  1. Searching public catalogues, databases and files mounted by York University Libraries.
  2. Searching public catalogues, databases and files of other institutions using the mechanisms provided by York University Libraries.
  3. Searching the Internet for study, research and teaching.
  4. Capturing search results to disk, printer, e-mail, etc.
  5. Using online request forms available through the catalogue.

2. Restricted Activities

The following are non-library activities for which other university computing facilities should be used:

  1. Use of word processing, spreadsheets, and other local workstation applications not explicitly listed on library menus.
  2. Posting to newsgroups, listservers and other networked resources not explicitly listed on library menus.
  3. Use of library workstations to access or complete online assignments.

3. Prohibited Activities

  1. Use of public workstations which violates University Policy on Computing and Information Technology Facilities such as alter systems, software and/or data without authorization, copy, destroy or remove, or disclose software and/or data without authorization, interfere with the processing of a system, such as deliberately overextending the resources of a system,misrepresent themselves as another user, disclose confidential passwords, access codes, account numbers or other authorization assigned to them, change another person's password without authorization, use the University facilities and resources for unauthorized purposes, including unauthorized commercial purposes.
  2. Tampering with or changing the workstation, components, or default setup.
  3. Use of library computers to send hatefull or obscene messages and/or images.

4. Sanctions

Library users in violation of this policy will be asked to refrain from the restricted activity. Failure to comply will result in removal from the library. Sanctions may be appealed to the University Librarian. Library users who violate University Policy on Computing and Information Technology Facilities are subject to disciplinary action as described in that policy.