Book Challenge Form

If you have any questions or concerns about library materials and feel that they may be inappropriate, feel free to fill out a “Request for Reconsideration of Library Materials” form. These forms are available at the reference desks or on the library website.
[ back to top ]

Cell phones

May only be used in the foyer of the library, while in the library cell phone ringer should be turned off.
[ back to top ]

Computer Programs

Library-approved programs are those pre-installed programs which are readily accessible from the standard desktop environment (the Start menu or desktop icons). All other computer applications are unauthorized. No alterations, customization or other changes to Library-approved programs, including the desktop, are allowed. Downloading any form of software is prohibited. Text documents may only be downloaded from research or Internet databases to a personal 3-½" floppy disk or to your individual home directory on the network.
[ back to top ]

Copyright

Patrons must stay within compliance of U.S. copyright law when using text or multimedia data (including pictures, sounds, etc.) obtained in the Library, whether in electronic form, including the Internet, or in another form. Questions about copyright issues should be directed to a member of the Library staff.
[ back to top ]

Devotional

The Library will close on Tuesdays from 1:50 P.M. to 3:00 P.M. for Devotional attendance.
[ back to top ]

Email

Email is accessible from any Research Workstation. Access is granted to campus email accounts only. By accessing a campus email account, you agree to the following: Not to share your password; not to send chain mail or any inappropriate material, including messages of a harassing or salacious nature; not to use your account for commercial purposes; to keep all email within the Code of Honor. The Library reserves the right to monitor email to verify compliance with these policies.
[ back to top ]

Food in the Library

Please do so only in the Café McKay, located in the west wing of the first floor, behind the reference area. Please remember that eating is not allowed in any of the study rooms or while using the computers.


[ back to top ]

Filming videos

Filming of any sort is not allowed in the library unless authorized by Bro. Kern, the Library Director.

[ back to top ]

Group study rooms


Group study rooms are available for groups of two or more students who need a quiet place to study. White board markers are available for checkout from the Circulation Desk. No food or drink is allowed in the group study rooms. Honor Code standards of dress and behavior apply.


[ back to top ]

Help Desk

The Student Help Desk is located in the Library. It is staffed with students who will receive, log, and answer software-related questions. Questions which the Help Desk students are unable to answer will be forwarded to a full-time employee for review and response. The Help Desk will also be responsible for maintaining a frequently asked questions page on the intranet.
[ back to top ]

Internet

The Library uses a research-directed Web browser, which is designed first and foremost to serve as a research tool for class work and other activities that support the mission statements of the Library and the institution. This browser focuses research to selected Internet sites and their associated links. When a legitimate research need is identified which requires more extensive Internet access, and is approved by a Library employee, such access can be granted on a limited basis. Regardless of the form of Internet access, usage must be research-oriented. Activities such as chatting forums, Web-based email, games, Netmeeting, and other non-research or recreational activities are not allowed.
[ back to top ]

Log on

Your user name and password is extremely important. Your user name is required to logon to a computer, to use email, and print your documents. The computers available for your use will be turned on and positioned at a point waiting for you to enter your user name and password. Your user name can be found at this location by clicking here or typing in the following address: http://web.byui.edu/services/netid/infopage.asp
[ back to top ]

Your password is your PIN number.

The only exception to this procedure is the Reference Workstations located in the Library. They are already logged on ready for use. Please do not log off of them.
[ back to top ]

Log off

Logging off the computer is required. It is the only way that the workstation is known to be available for the next student to use. If you fail to log off your workstation three times, your access to the computer workstation in the Library will be restricted. Please do not log off the Reference Workstations, however.
[ back to top ]


Mission Statement

The computers in the Library are specifically pre-installed with software providing a consistent working environment for all users. They are set up either as a "Reference Workstation" or a "Research Workstation." The Reference Workstation provides access to electronic research tools. The Research Workstation provides access to writing tools and electronic mail, in addition to the electronic research tools. Library computer services have been designed to support the academic needs of campus students and faculty. Computer games, recreational Internet use, and other non-research related activities are not supported.
[ back to top ]

Printing

A system to control printing costs is used in the Library and some other location on campus. A fee of $.04 per page is charged for all black and white printers. A fee of $.25 per page is charged for the color printer. You can put money on your I-card at the Circulation Desk in the Library. The system works by using your user name to identify your printed document. You can release your documents to a printer by entering your user name and password at a print station, located next to each printer, and then selecting the document you want to print and clicking the Print button. All of your unreleased print documents are held in the print server for 24 hours before they are deleted.
[ back to top ]

Problems

If you encounter any type of problem with the computer equipment, or if you observe violations of this policy, please notify a Library worker immediately. You are not to fix computer problems.
[ back to top ]



Security

Violations of computer use policies will be viewed as computer fraud as defined in the campus computer policies, and will be treated as such. They will be reported to Campus Security, and may result in legal charges and/or dismissal from the institution. Logging in to any computer as an unauthorized user (using lab accounts, personal accounts, and the like) violates these policies. Other security violations include: attempting to gain unauthorized access to any computer program, system, or network; installing any form of software; changing any installed software (including the desktop), hardware, or other computer equipment.
[ back to top ]

STC

The Student Technology Center (STC) is located in the Library. It has been established to provide access to higher tech equipment such as scanners, CD burners, Zip drives, and a digital camera. A student specialist is assigned to the STC during regular Library hours. The high usage of this facility necessitates advanced scheduling. The STC specialist can assist you in scheduling a convenient time.
[ back to top ]

Time Limits

The Library reserves the right to limit use of computer equipment to one hour when other patrons are waiting. Patrons may be asked at any time to relinquish use of any given computer. The Library also reserves the right to limit or restrict access to computer programs and/or equipment.
[ back to top ]

Tutoring

The Student Help Desk will conduct tutoring session on the software available on the Research Workstations. These will be 30- to 60-minute sessions stressing the basics. These sessions are taught at various times during the semester. The Student Help Desk can assist you in signing up to participate in any of these sessions.