Computer Use Policy

The law library provides computers to members of the law school community. These computers are available for other library patrons subject to this use policy.

All computer use must be in compliance with the Acceptable Use of CU Boulder's IT Resources policy, including compliance with the following rules:

Use resources efficiently and effectively

While some personal use of IT resources is permitted, such personal use must never interfere with academic, research, or administrative needs.

Deliberate attempts to harm, degrade, or negligently disrupt the performance of any CU Boulder IT resources or use CU Boulder's resources to harm other IT resources is not acceptable (e.g. don’t create or spread viruses, damage equipment, software, or data, disrupt services, or engage in IP spoofing). Contact the IT Security Office prior to running vulnerability or penetration testing tools.

Don't Harass

Don’t annoy, intimidate, threaten, or offend another person(s) by: conveying obscene language, pictures, and/or other materials; making threats of bodily or psychological harm; contacting another person repeatedly with the intent to annoy or bother; and/or contact a person who has expressed a desire for electronic communication to cease.

Comply with intellectual property law

Don’t violate copyright law by illegally copying, distributing, downloading and/or uploading information using computing or network resources. Even innocent, unintentional infringement violates copyright law.

Additionally, law library patrons must comply with the following policies:

  • Installing any software or hardware devices on Libraries computers is prohibited, except USB thumb drives for saving content;
  • Disassembling computers or disconnecting network or power cables from computer or wall is prohibited.
  • Any charges accrued using online resources are the responsibility of individual users.
  • The law library does not encrypt data sent or received through its Internet services so the connection should not be considered secure.
  • Priority of use for computing resources is given to students, faculty, and staff. Priority is also given to users of government depository information. Users not affiliated with the campus may be asked to discontinue using computers during peak periods in order to meet the needs of primary clientele.
  • Security personnel within the Libraries or campus police are authorized to ask for identification when they suspect that a user is not complying with these restrictions on the use of computers or when a user fails to comply with a request to discontinue use of a computer within the Libraries. Security personnel or campus police are also authorized to pursue further action in accordance with University policies.

If law library staff determines that your usage of the computers violates these policies, you may be asked to stop using the computer and to leave the library.