Computers & Technology

Information and technology are natural partners. This union is especially true in academic law libraries in which so many resources are available online.

Internet Access

When you visit the law library, you are encouraged to bring your laptop computer. We provide wireless Internet access so you can keep in touch with your world while you are researching in our world. For more information about how to access the guest wireless system go to the UCB Guest Wireless page on the OIT website.

Public Computers

The law library provides eight computers for public use.  They run Microsoft Windows, have Internet access and provide Microsoft Office document viewers, though not the full programs themselves.  These computers are available for researchers.  You can check your email and access your documents on the cloud.  These computers provide USB ports for your USB storage devices.

Printing, Copying and Scanning

The law library provides printers, copiers and scanners for public use.  Printing and copying costs $0.10 per page. Two of the printers also serve as scanners. You can scan documents into the PDF file format and have them emailed to you. There is no charge for this service. However, you do need to purchase a Campus Cash card to access the printers. More Information

 

Computer Use Policy

The law library provides computers to members of the law school community. These computers are available for other library patrons subject to this use policy.

All computer use must be in compliance with the Acceptable Use of CU Boulder's IT Resources policy, including compliance with the following rules:

  • Use resources efficiently and effectively
  • While some personal use of IT resources is permitted, such personal use must never interfere with academic, research, or administrative needs.
  • Deliberate attempts to harm, degrade, or negligently disrupt the performance of any CU Boulder IT resources or use CU Boulder's resources to harm other IT resources is not acceptable (e.g. don’t create or spread viruses, damage equipment, software, or data, disrupt services, or engage in IP spoofing). Contact the IT Security Office prior to running vulnerability or penetration testing tools.
  • Don't Harass
  • Don’t annoy, intimidate, threaten, or offend another person(s) by: conveying obscene language, pictures, and/or other materials; making threats of bodily or psychological harm; contacting another person repeatedly with the intent to annoy or bother; and/or contact a person who has expressed a desire for electronic communication to cease.
  • Comply with intellectual property law
  • Don’t violate copyright law by illegally copying, distributing, downloading and/or uploading information using computing or network resources. Even innocent, unintentional infringement violates copyright law.

Additionally, law library patrons must comply with the following policies:

  • Installing any software or hardware devices on Libraries computers is prohibited, except USB thumb drives for saving content;
  • Disassembling computers or disconnecting network or power cables from computer or wall is prohibited.
  • Any charges accrued using online resources are the responsibility of individual users.
  • The law library does not encrypt data sent or received through its Internet services so the connection should not be considered secure.
  • Priority of use for computing resources is given to students, faculty, and staff. Priority is also given to users of government depository information. Users not affiliated with the campus may be asked to discontinue using computers during peak periods in order to meet the needs of primary clientele.
  • Security personnel within the Libraries or campus police are authorized to ask for identification when they suspect that a user is not complying with these restrictions on the use of computers or when a user fails to comply with a request to discontinue use of a computer within the Libraries. Security personnel or campus police are also authorized to pursue further action in accordance with University policies.

If law library staff determines that your usage of the computers violates these policies, you may be asked to stop using the computer and to leave the library.

 

Public Computer UsageNotice of Assumed Risk 

Users access Library computers and associated software at their own risk. The Library is not responsible for equipment malfunction, damage to disks, loss of data, transmission of data (secure or otherwise), data saved on a library computer or for personal computers, laptops, or other devices such as smartphones. 

The University of Colorado Boulder’s wireless network is not secure. Information sent from your wireless device could be captured within or near the Library. The Library assumes no responsibility for your equipment, or any alterations or loss of configurations, security, or data (captured or otherwise) resulting from connection to the Library's wireless network. If you need to use university WiFi but are concerned about data privacy, we recommend using a third-party VPN to encrypt your traffic. 

Tags: