Skip navigation

Public Workstation Use Policy

Introduction | Policies

Last Updated: 11/29/05


Central Michigan University Libraries' Public Workstation Use Policy is intended to address appropriate computer use, outline inappropriate use, and provide Library Staff with strategies for policy enforcement. For information about the CMU Information Technology policies, see their Computing and Networking ​Poli​cies page.


  1. Library public computers are provided to support Central Michigan University's educational, instructional, and research-related activities. Non-academic activities are considered recreational. Commercial gain is strictly prohibited. Academic use is given preference and non-conforming users maybe asked to vacate the computer workstation.
  2. Users cannot be guaranteed privacy. Since the computers are located in public areas, other users or Library Staff members may observe what is on the computer screen.
  3. Internet users in the CMU library building should be aware and respectful of the desire of others not to be inadvertently exposed to material and images they find offensive.
  4. Respect the privacy of other computer users. This includes not attempting to gain unauthorized access to other user's personal files, account, or search history, not representing oneself as another individual, not altering passwords, and not standing over or watching others as they use the computers.
  5. Users must observe applicable restrictions as defined by the law and may not use Library workstations for illegal activities.
  6. The use of the Internet by minors is the responsibility of the parent or legal guardian. The Libraries cannot monitor or supervise a minor's behavior.
  7. Users must observe copyright laws and abide by Central Michigan University's and the Libraries' software licensing agreements (database leases).
  8. Users must be aware of identity theft. CMU Libraries will not be held responsible for users inputting personal data or credit card information since the Internet is not always a secured environment.
  9. Users must respect the integrity of the Libraries' patron workstations. Users must not tamper with or reconfigure the original computer software. Users must not install, download, or develop software that will hack, infiltrate, alter, or damage the original system configuration. Users must not deface or damage computer hardware. Any such attempt to reconfigure the software or hardware setup will result in the loss of privileges, possible university disciplinary or legal action, and replacement cost of CMU's property.
  10. Users must not be abusive or disruptive to other users. Use of obscene or threatening behavior and/or language will result in the loss of privileges.
  11. The Libraries accept no responsibility for damages arising from the use of computers or network services. Damage media or attached personal hardware is the sole responsibility of the user. Library computers are refreshed nightly and users must save data to their own usb device or online service. ​
  12. The CMU Libraries do not have control over the information accessed on workstations within the library building and cannot be held responsible for content or resources other than those they have developed, such as the CMU Libraries' Web pages. Users must be aware that information found on the Internet may not be accurate, up-to-date, or complete.​