LOCATION: Home > Services > General Library > Internet Procedure

RCC Library Internet Procedure

Internet workstations are offered as part of the Library's mission of providing bibliographic instruction, curriculum-related research support, and technology-based public service to RCC's students, faculty, and staff. All existing laws (federal and state) and District regulations and Board Policies apply, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct. The District is not responsible for the accuracy or quality of the information obtained. The District will not be responsible for financial obligations resulting from the unauthorized use of the system.

RCC faculty, staff and currently registered students have first priority for using RCC Internet workstations. Community Borrowers will be asked to relinquish any Internet workstation needed by a member of the RCC faculty, staff or student body.

Internet workstations are available on a first-come, first-serve basis. If all workstations are in use, a patron may place a hold and the first available workstation will be assigned to him/her. (Community Borrowers will not be able to place holds on Internet workstations). All patrons must present a valid RCC Library Card at the Circulation Desk in order to use an Internet workstation for a maximum of one hour. If, at the end of the hour, the patron wishes to continue to use the Internet workstation, the patron can request an additional hour of use at the Circulation Desk. An additional hour of use will be granted if no one has placed a hold on an Internet workstation.

No individual under the age of 16 will be allowed to use the Internet workstations, unless a legal parent or guardian accompanies him/her. If an underage person is found using an Internet workstation unsupervised, s/he will have to relinquish the workstation, and the person to whom the workstation was assigned will lose the privilege of Internet access at any of the RCC Libraries for one year.

Any patron using the RCC Internet workstations inappropriately will be asked to relinquish the Internet workstation and will lose the privilege of Internet access at any of the RCC Libraries for one year. In an effort to protect the public from being exposed to objectionable material, the library will provide non-public Internet access for faculty engaged in research that could result in objectionable images being displayed on the monitor screen. Any student engaged in such research should contact her/his instructor, who can then work with the Public Services Librarian to provide non-public Internet access.

NOTE: Time constraints do not permit staff to offer one-on-one Internet instruction.

Some examples of inappropriate uses of the Internet are listed on the other side of this sheet.


Inappropriate use of the Internet will result in the loss of RCC Library Internet privileges for one year. You will be held accountable for your conduct under Board Policies 3060, 4060 and 6060. Any actions, which deter other users from doing their work, or which would otherwise be deemed malicious by the Library, will result in the loss of access to the RCC Library Internet for one year, and possible District disciplinary action or civil or criminal action.

Use of these workstations for personal gain constitutes theft under California law and will be prosecuted by the District.

Examples of inappropriate use may include, but are not limited to:

  • Use of these workstations for: games; FTP; newsgroups/listservs; subscription services;
  • Use of any District facilities in a manner that violates copyrights, patent protections, or license agreements;
  • Use of any District facilities for personal gain or profit, or for any type of commercial use;
  • Attempts to gain unauthorized access to any information facility, whether successful or not. This includes running programs that attempt to calculate or guess passwords, or that are designed and crafted to trick other users into disclosing their passwords. It also includes electronic eavesdropping of communications facilities;
  • Any violation of state law as described in the Penal Code;
  • Any action that invades the privacy of individuals or entities that are the creators, authors, users, or subjects of information resources;
  • Posting on electronic bulletin boards materials that violate existing laws or the District's codes of conduct;
  • Using the campus network to gain unauthorized access to any computer systems;
  • Knowingly performing an act which will interfere with the normal operation of computers, terminals, peripherals, or networks;
  • Knowingly running or installing on any computer system or network, or giving to another user, a program intended to damage or to place excessive load on a computer system or network. This includes but is not limited to programs known as computer viruses, Trojan horses, and worms;
  • Attempting to circumvent data protection systems or uncover security loop holes;
  • Attempting to monitor or tamper with another user's electronic communications, or reading, copying, changing, or deleting another user's files or software without the explicit agreement of the owner;
  • Knowingly accessing web pages that display materials, which could create a hostile and/or uncomfortable environment for patrons at nearby public Internet workstations. Special accommodations can be made for non-public use of the Internet for research that could be found offensive. Contact the Public Services Librarian.