Library Internet Procedure
workstations are offered as part of the Library's
mission of providing bibliographic instruction, curriculum-related
research support, and technology-based public service
to RCC's students, faculty, and staff. All existing
laws (federal and state) and District regulations
and Board Policies apply, including not only those
laws and regulations that are specific to computers
and networks, but also those that may apply generally
to personal conduct. The District is not responsible
for the accuracy or quality of the information obtained.
The District will not be responsible for financial
obligations resulting from the unauthorized use of
faculty, staff and currently registered students
have first priority for using RCC Internet workstations.
Community Borrowers will be asked to relinquish any
Internet workstation needed by a member of the RCC
faculty, staff or student body.
workstations are available on a first-come, first-serve
basis. If all workstations are in use, a patron may
place a hold and the first available workstation
will be assigned to him/her. (Community Borrowers
will not be able to place holds on Internet workstations).
All patrons must present a valid RCC Library Card
at the Circulation Desk in order to use an Internet
workstation for a maximum of one hour. If, at the
end of the hour, the patron wishes to continue to
use the Internet workstation, the patron can request
an additional hour of use at the Circulation Desk.
An additional hour of use will be granted if no one
has placed a hold on an Internet workstation.
individual under the age of 16 will be allowed to
use the Internet workstations, unless a legal parent
or guardian accompanies him/her. If an underage person
is found using an Internet workstation unsupervised,
s/he will have to relinquish the workstation, and
the person to whom the workstation was assigned will
lose the privilege of Internet access at any of the
RCC Libraries for one year.
patron using the RCC Internet workstations inappropriately
will be asked to relinquish the Internet workstation
and will lose the privilege of Internet access at
any of the RCC Libraries for one year. In an effort
to protect the public from being exposed to objectionable
material, the library will provide non-public Internet
access for faculty engaged in research that could
result in objectionable images being displayed on
the monitor screen. Any student engaged in such research
should contact her/his instructor, who can then work
with the Public Services Librarian to provide non-public
Time constraints do not permit staff to offer one-on-one
examples of inappropriate uses of the Internet are
listed on the other side of this sheet.
USES OF THE INTERNET:
use of the Internet will result in the loss of RCC
Library Internet privileges for one year. You will
be held accountable for your conduct under Board
Policies 3060, 4060 and 6060. Any actions, which
deter other users from doing their work, or which
would otherwise be deemed malicious by the Library,
will result in the loss of access to the RCC Library
Internet for one year, and possible District disciplinary
action or civil or criminal action.
of these workstations for personal gain constitutes
theft under California law and will be prosecuted
by the District.
of inappropriate use may include, but are not limited
of these workstations for: games; FTP; newsgroups/listservs;
of any District facilities in a manner that violates
copyrights, patent protections, or license agreements;
of any District facilities for personal gain or
profit, or for any type of commercial use;
to gain unauthorized access to any information
facility, whether successful or not. This includes
running programs that attempt to calculate or guess
passwords, or that are designed and crafted to
trick other users into disclosing their passwords.
It also includes electronic eavesdropping of communications
violation of state law as described in the Penal
action that invades the privacy of individuals
or entities that are the creators, authors, users,
or subjects of information resources;
on electronic bulletin boards materials that violate
existing laws or the District's codes of conduct;
the campus network to gain unauthorized access
to any computer systems;
performing an act which will interfere with the
normal operation of computers, terminals, peripherals,
running or installing on any computer system or
network, or giving to another user, a program intended
to damage or to place excessive load on a computer
system or network. This includes but is not limited
to programs known as computer viruses, Trojan horses,
to circumvent data protection systems or uncover
security loop holes;
to monitor or tamper with another user's electronic
communications, or reading, copying, changing,
or deleting another user's files or software without
the explicit agreement of the owner;
accessing web pages that display materials, which
could create a hostile and/or uncomfortable environment
for patrons at nearby public Internet workstations.
Special accommodations can be made for non-public
use of the Internet for research that could be
found offensive. Contact the Public Services Librarian.