Skip to main content

Library Policies

Overview

Meeting the information needs of library users is integral to the Mission of the UT Health San Antonio Libraries. The library staff endeavor to develop collections, resources, and services to meet these needs. It is within this context that the UT Health Libraries offer access to the Internet and other electronic resources. Any health-related information searching is a legitimate use of these resources.

Policies

  • Priority use of computers is given to UT Health SA affiliates, area health professionals, and users seeking medical information. Health Science Center faculty, staff, and students must log in with their UT Health SA login credentials.
  • A limited number of guest computers are available to the general public. Persons not affiliated with the UT Health must sign-in at the Circulation Desk to use a computer, and are limited to a maximum of one hour each day. University sponsored e-mail programs are allowed and supported. Other web based e-mail programs may be utilized, but library staff may not be able to assist with problems.
  • Library computers may not be used for illegal, unauthorized, unethical, or commercial purposes. Please see the UT Health Code of Ethics and Standards of Conduct (HOP 10.1.2) and the Texas Penal Code, Chapter 33. Computer Crimes (http://www.statutes.legis.state.tx.us/Docs/PE/htm/PE.33.htm).
  • Authorized users of commercially licensed digital products such as electronic journals, books, and databases include UT Health SA faculty, staff, and students and Guests of the UT Health Libraries. Remote access to these digital resources is allowed only to UT Health SA faculty, staff, and students.
  • Faculty, staff and students with UT Health may connect to the HSCwave WiFi network at any library location.  HSC Guest WiFi is available for other library users. Laptop users may connect to the Internet at designated laptop workstations with Ethernet cables.
  • Computer peripherals (other than USB drives or mobile devices) may not be physically attached to library computers except in designated locations.
  • The decision to load personal software is made by library staff on a case by case basis. Personal software may be loaded with the assistance of UT Health Team Dynamics staff.
  • Library computer users are discouraged from storing personal files and documents on the library's computers. Computer users should save their work frequently to a USB drive, to a writable optical disc (i.e. CD/DVD), to a Cloud storage service, or email documents to themselves.
  • All user data is erased from the library's public computers at least once a day and whenever a computer is rebooted.
  • Viewing of pornographic material may constitute a Class C misdemeanor under Texas Penal Code §43.22 (http://www.statutes.legis.state.tx.us/Docs/PE/htm/PE.43.htm#43.22) and may also violate the University’s policies on sexual harassment as stated in Section 4.2.2 of the Handbook of Operating Procedures (http://www.uthscsa.edu/hop2000/4.2.2.pdf). Users of computers at the library should be aware of the public nature of shared spaces and should take care not to display images or play sounds that could create an atmosphere of harassment for others. In addition, the university’s Internet Use Policy (http://uthscsa.edu/hop2000/5.2.8.pdf) states that “Accessing, posting, or sharing any racist, sexist, threatening, obscene, or otherwise objectionable material (i.e., visual, textual, or auditory entity) is strictly prohibited.”
  • Children under the age of 15 must be accompanied by a supervising adult at all times. An adult must sit at the same computer workstation with the child.
  • Accessing electronic resources provided by the UT Health SA Libraries, such as electronic journals, e-books, and databases.
  • Use of Internet resources for academic, personal and/or professional study, communication, and/or networking.
  • Accessing the campus wired or wireless network anywhere in the library. Users with a UTHSCSA username and password may connect to the HSCwave wireless network using the instructions at http://ims.uthscsa.edu/computer_networking/network_wireless.aspx .
  • Syncing mobile devices.
  • Any viewing, listening, downloading or copying of material that constitutes copyright infringement, including making unlicensed copies of copyrighted CDs or DVDs.
  • Installation or use of unauthorized peer-to-peer software. See the UT Health Peer-to-Peer Access Policy HOP 5.8.11 (http://www.uthscsa.edu/hop2000/5.8.11.pdf).
  • Viewing of material considered to be pornographic.
  • The institution reserves the right to audit and review access logs for any given user if it is suspected institutional assets were used in an inappropriate way.

The Internet contains a wealth of valuable information resources. However, users should be aware that some information may be inaccurate, outdated or offensive. Library users are advised to exercise judgment and discrimination when evaluating the usefulness and reliability of material found on the Internet. UT Health SA is not responsible for the content, security or reliability of web sites outside the uthscsa.edu domain.

  • Refer to the Guide to Print and Copy Services for information on printing/copying/scanning at the Briscoe Library.
  • In some cases, users can download information to a USB drive instead of printing. Many library databases allow users to e-mail search results instead of printing. License agreements for some electronic journals, books, and other documents stipulate that users may not send a digital copy of an article or other document to other users.

The UT Health SA Libraries reserve the right to take appropriate action to ensure compliance with this policy. Library staff have the right to determine appropriateness of workstation use and can, at any time, require the patron to leave the workstation.

Computer Use Policy Violations

 If observed or if a library staff member receives a complaint, library staff are authorized to make the patron aware of the Computer Use Policy. If the patron persists with the unacceptable activity, then library staff are authorized to contact UT Police for further assistance.

Suspicious or Illegal Activities on Library Computers

  • Examples of illegal activities include accessing child pornography or terrorism related activities.
  • Library staff should contact University Police if they have reason to believe that illegal activity is taking place as result of a user’s inappropriate use of the library’s computer resources. I t is preferable that the illegal activity be directly observed by a law enforcement officer.
  • Staff may not provide a web browser history to UT Police unless directed to do so by the UT Health SA Legal Office.
Loading ...