Iliff's library provides technology resources to support the scholarly research and educational purposes of the Iliff community. Such academic work takes precedence over all other uses of the technology.
Our resources are available for use by all patrons; however, priority in seating is given to our primary clientele, particularly during peak times. Our primary clientele includes Iliff faculty, staff, students, trustees, and others as authorized.
Use of Computer Work Stations
We support the scholarly research and educational goals of the Iliff School of Theology. The following represents a guide to acceptable use of computer workstations and electronic resources. It is not intended to identify all acceptable uses, but to indicate those uses which are clearly consistent with the purposes of these resources.
Acceptable uses include:
- Accessing the online catalogs of the Ira J. Taylor Collection and other libraries
- Accessing online, web-based, or CD-ROM databases for which the Library has obtained site licenses
- Accessing Internet resources for educational research
- Using Iliff and/or DU e-mail
- Using Iliff supported software, including the Microsoft Office Suite (Word, Excel, Power Point, and Access)
- Accessing web-based course materials and discussions
The following list characterizes unacceptable use. It is not intended to identify all unacceptable uses, but to indicate the types of uses which are clearly inconsistent with the purposes of these resources.
Unacceptable uses include:
- Failing to comply with United States or Colorado law, including copyright laws and licensing agreements, or engaging in any other illegal activity
- Failing to comply with the policies listed in the current Iliff School of Theology Handbook, including the Standards of Community Conduct, Policy on Protection Against Sexual Misconduct, and Policy on Academic Integrity
- Violating the computer security or network integrity, including attempts to bypass network security, obtain passwords, share passwords with others, or the unauthorized use of passwords
- Behaving in ways that are disruptive, abusive, offensive, or insensitive to the rights of others, or that obstruct others in their use of our resources
- Engaging in commercial activities other than Iliff School of Theology business
- Deliberately altering any files or modifying the configuration of any equipment
- Damaging or destroying equipment
- Connecting unauthorized equipment to the network
- Removing any part of the workstations
- Attempting to fix or repair hardware and/or software problems
- Downloading and/or installing files or software to hard drives
- Using printing resources excessively
Conditions of Use
By using our computer and/or electronic resources, you are agreeing to accept personal responsibility for considerate, ethical, and responsible behavior in your use of the available resources.
Questions as to what is or is not an acceptable use should be directed to firstname.lastname@example.org. We may at any time make a determination as to whether or not a particular use is or is not consistent with the purposes of the Library’s Policy on the Use of Library Technology Resources, and is therefore acceptable or unacceptable.
The consequences of failing to comply with this policy will be determined by the staff of the library and weighted according to the severity of the infraction(s).
The library is not responsible for the loss or corruption of data, and assumes no responsibility for damages, direct or indirect, arising from the use of its technology and network facilities.
The library is not responsible for files saved on computer hard drives. Staff regularly delete these files.
The library supports open access to the Internet for research purposes but cannot be responsible for intentional or inadvertent viewing of particular sites by patrons.
Patrons may not reserve computer workstations in advance, nor may they leave personal materials at a workstation in order to reserve it while they are gone for an extended period of time.
We reserve the right to establish time limits or change policies as needed. Any questions regarding this policy or computing resources should be directed to email@example.com.