Have questions about your research?
We can help!
Computers are made available to UCLA Library users for purposes of research, instruction, and public service.
The Library reserves the right to designate specific uses for individual computers. When there is high demand for using computers, time limits may be enforced; those not engaged in research or course-related activities may be asked to relinquish their computer to those needing use for research purposes.
The use of these computers is governed by UC and UCLA policies including:
- UC Sexual Harassment and Sexual Violence Policy
- Conduct in the UCLA Libraries
- UCLA Library User Rights and Responsibilities
- UCLA Principles of Community
The following examples are intended to clarify the interpretation of unacceptable use of UCLA Library computers.
Examples of unacceptable use include, but are not limited to:
- Certain conduct by users may prevent the library from being freely and readily accessible to our students and employees—our main mission on the campus. Viewing and printing material from the Internet that a reasonable person would consider objectionable such as sexually explicit or violently explicit pictures, movies, and/or videos may create a hostile environment for other library users and employees. In keeping with the spirit of the UCLA Principles of Community, we expect library patrons to be sensitive to this matter. All should respect privacy and diversity, and be considerate about viewing material that would render the library unusable to other users—especially our student population and the employees who work in the libraries. Failure to comply with Library policies can result in penalties up to and including patrons being banned from the Library.
- Any use that violates copyrights, patent protections, or license agreements. Specific examples of violations include unauthorized copying of software, downloading and using pirated software, systematically downloading or printing entire journal issues or volumes or large portions of electronic resources.
- Attempts to gain unauthorized access to information systems or violate the privacy of others. Prohibited activities include running programs that attempt to calculate or guess passwords, or that are designed to trick other users into disclosing their passwords, or intercepting or monitoring network communications that are not intended for you.
- Viewing material that violates federal, state, or local laws or regulations, including those regarding accessing, viewing, printing, and distributing child pornography.
- Tampering with library computers, including attempting to install unauthorized software, disconnecting library computers, or connecting private computers to the library’s network lines.
Thank you for your cooperation and consideration.