link to University of Utah Home link to Marriott Library Home
Off Campus Access - Log In

Library Policies

Patron Responsibilities

Marriott Library users play an important role in creating a positive quality of life and experience in the library. Please help us make the library an enjoyable and productive place for all users.

In order to protect your right of access, promote your safety, and protect library resources and facilities, the library prohibits activities that present health or security risks, damage library resources, disrupt the normal flow of library operations or are illegal.  

  • Personal belongings should not be left unattended at any time.
  • Bicycles are not allowed inside the building.
  • Scooters, roller blades and skateboards must not be used inside the building or at entrances. (ADA exceptions).
  • Parents are responsible for their children's safety and behavior.
  • Children under 12 should be supervised at all times.
  • Suspicious, lascivious or threatening behavior and accidents should be reported to library staff immediately.
  • Library users should refrain from behaviors or actions that could endanger their safety or the safety of others.
  • Theft, vandalism, graffiti, and other intentional damage to library property and collections are criminal activities punishable by law.
  • Food & Drinks are allowed on levels 1, 2 & 3. Drinks are allowed in firm, covered containers on levels 1, 2, 3, and 5. Food and beverages are prohibited in Special Collections on level 4.
  • Library equipment and collections should be used with care. Library staff should be alerted to missing items in collections and other materials.
  • Patrons are responsible for checking out books for longterm use.
  • Service animals assisting persons with disabilities are allowed in the library, but not pets.
  • Smoking and the use of chewing tobacco are prohibited.
  • Show respect and courtesy for other library users and library staff.
  • Return borrowed materials on time, unmarked, and undamaged.
  • Refrain from unreasonable disruptive behavior that affects others' use and enjoyment of the library.
  • Respect designated "Quiet" and "Group Study" areas.
  • Be aware that some material available on the Web could be offensive to other library users; be considerate of those around you when viewing Web sites in public computer areas.
  • Respect posted time limits and use restrictions on computers in public areas.
  • Cell phone conversations should be conducted outside of quiet areas or in areas such as lobbies where no one will be disturbed. Please be thoughtful of the volume of your conversations whether in person or on a cell phone.

Library staff and administration reserve the right to enforce these guidelines consistent with the University of Utah Code of Student Rights and Responsibilities. Campus Police will be called when necessary.

Reviewed by Library Policy Advisory Committee and University Legal Counsel, February 2000 and revised fall semester 2001.

Reapproved by the Marriott Library Outreach and User Services Council - February 29, 2012

Reapproved by Marriott Library Executive Council – March 1, 2012

Patrons' Needs are the Focus of Each Person's Efforts

Uphold the principles of intellectual and academic freedom.

Faculty and students must be allowed open discourse and access to resources in order to achieve understanding, learning, and the advancement of knowledge. We will strive to build diverse collections, protect the privacy of library users in their pursuit of information, and ensure the confidentiality of their library activities and records.

A good guide for this is to treat others in the ways we would like to be treated. By concentrating on the needs of users and coworkers and genuinely caring about their well-being, we demonstrate that we hold other human beings in high regard. Our collaborations should not harm anyone's self-esteem, but rather engender a positive personal interaction.

Users have repeatedly told us that the quality and success of their library experiences depend on their interactions with librarians and staff. By being poised and ready to interact with users, establishing initial eye contact, and greeting people with an open facial expression and body language, you convey readiness and willingness to provide service. Each one of us represents the Marriott Library and the University of Utah in our work.

Service is affected by how well people are trained to do their jobs and how much they know about the workings of their department and the library as a whole. Ongoing training should prepare the staff to do their work effectively. It should also include fundamentals about our library and the campus, such as where collections are located, how call numbers work, how to use the catalog, and what services we offer. Each person should understand the service implications of his or her work.

Careful listening is an essential component of effective communication and problem-solving. With co-workers and library users, try to understand the other person's perspective and what is really being said. By asking questions and restating what you've heard, you have a better chance of getting to the real meaning of a person's communication with you.

Libraries ensure free speech, individual enrichment, learning, and expansion of knowledge. Our users should feel comfortable asking any question. While we will not always be able to fulfill every question or need, we should not in any way judge the worthiness of a question or its subject matter. When necessary, we should explain limitations of staffing or resources that make it impossible to completely satisfy a user need.

The library's users and employees have a variety of backgrounds including differences in culture, race, lifestyle, religion, experience, education level, and learning style. We need to provide an atmosphere that ensures opportunities and eliminates barriers for academic achievement, workplace participation, and service to users. We are all expected to set aside personal biases and prejudices to effectively work with users and each other.

The individuality and diversity of the library's users make it impossible to handle each patron encounter in the same way. The key to undertaking a successful resolution for each patron encounter is to skillfully negotiate what the patron needs and to translate that need into providing the appropriate library response. Take into consideration the individual asking the question. Don't rely on a standard response, but customize to meet the individual person and circumstances. Be willing to consult with colleagues if unsure on the correct way to meet the patron's request. While it is our aim to teach users to become self-sufficient in using the library, sometimes the best solution is to provide them with the information they need rather than instructing them on how to do it.

The efforts of an entire library staff are needed to satisfy an individual user's needs. Just as the quality of service of any member of a unit reflects on the unit as a whole, the work of each unit in the library reflects on the library as a whole. By helping a library co-worker meet a user's need, you are contributing to the overall mission, vision, and values of the library. This can happen through accurate and efficient technical processing and shelving on a routine basis; and it can happen in response to specific requests at public service desks. In each case, we support the campus community by supporting each other. By working together, we all succeed.

Everyone should constructively challenge procedures, policies, and other barriers to information access, services, and use of facilities. The organizational need for such things as maintenance, processing, and statistics gathering should not unduly impede access to collections, information or information technology. To this end, we strive to enhance user access, improve operational procedures, minimize periods of limited or no access, and when limitations are necessary, explain the limiting condition with kindness and grace.

Libraries, because of their complexity, are prone to have numerous and varied problems that can impact service to users. These problems exist when there is a difference between the way things are and the way someone wants them to be. By gathering information about the problem and analyzing it while focusing on its resolution, positive steps can be taken to resolve mistakes and problems and avoid repetition in the future.

Needs of users can frequently "fall between the cracks" in a large organization. By asking our library users if they received the information or assistance they needed, you can ensure that their experiences in the library are successful. Following through on a user-related issue and getting it resolved can help everyone improve the quality of the service we provide. Do not blindly refer patrons to another library service point unless you are certain that they are able to provide the proper solution to the patron's need. Call ahead and confirm with that library unit if you are unsure about making a referral.

The library is an essential part of a student's experience at the university. Students look to library staff to help them with their research and course work. Our job is to assist the students in their education by teaching research skills and helping them discover the resources that are available to them. Every interaction with a student is an opportunity to teach something new about the library and what we have to offer. We want students to become effective library users who recognize libraries as resources to support life long learning. In addition to the intellectual interactions with students, the layout of the physical library building plays a part in creating a teaching and learning environment. We strive to ensure that library labs, classrooms, carrels, group and individual study areas, quiet spaces, and places where discussion is encouraged meet diverse user needs.

University of Utah

Student Computing Facilities

Acceptable Use Policy

I. INTRODUCTION

The University of Utah Student Computing Labs are intended to be used for educational purposes and the legitimate business of the University in a manner consistent with the public trust.

This policy establishes guidelines for appropriate use of student-fee funded Student Computing Facilities.

II. REFERENCES

University of Utah Policy and Procedures:

1-15: Information Resources Policy 
2-32: Discrimination and Sexual Harassment 
2-6A: Sexual Harassment and Consensual Relationships 
8-10: Code of Student Rights and Responsibilities 
8-12: Code of Faculty Rights and Responsibilities 
2-9: Staff Disciplinary Actions and Dismissal

III. ACCESS TO STUDENT COMPUTING LABS

A. Student computing labs are funded primarily from student computing fees and are for the use of University of Utah students, faculty and staff. Others may use these labs as participants in University sponsored activities. Labs may develop procedures to issue temporary passes to participants in University sponsored activities.

B. Individuals using the facilities may be asked to verify their University status by showing a University ID or by logging into computer systems. Individuals not authorized to use the facility may be required to leave.

C. Computer Accounts are assigned to control access to some computing resources.

1. Users are responsible for all uses of the Computer Account. User IDs and passwords must not be shared with other users. Users must log out at the end of each session.

2. Knowingly using a Computer Account assigned to another person is a violation of University policy.

IV. USE OF STUDENT COMPUTING LABS

A. Appropriate use of computing resources, which are supported by student fees, include academic study, instruction, and independent study or research. University related work by departments and recognized student and campus organizations of the University are acceptable.

B. Inappropriate uses include interfering with the work of others, wasting resources, using the resource for private economic purposes, gambling, and any activities that involve the violation of state or federal laws and University policies and procedures. During peak times when computer workstations are in demand, recreational use such as playing games may be disallowed.

C. The University of Utah endorses and promotes intellectual and academic freedom principles and encourages access to information. While users generally have the right to read and view materials of their choice, this right is balanced by the rights of others to work in a setting free of intimidation, harassment, or hostility. Child pornography and obscenity are illegal. Activities that create a hostile and/or intimidating environment for others are prohibited under University of Utah Policy and Procedure 2-6A and 2-32.

V. ACADEMIC ENVIRONMENT

A. Users are expected to respect the rights of other users to create an environment suitable to academic pursuits. The following activities are prohibited.

1. Activities that disrupt the work of others, including but not limited to unnecessary noise.

2. Activities that encroach on others' legitimate expectations of privacy.

B. Users are expected to behave in ways that enhance the environment for others and promote the reliable operation of laboratory computer systems.

1. Eating or drinking in the labs is prohibited.

2. Users must cooperate with the staff of the computing facility and behave in a respectful manner to them.

3. Users must not abuse laboratory computer systems or other equipment.

4. Users should report problems with computer lab equipment.

C. Parents are responsible for their minor children's behavior, safety, and the content of information resources viewed or accessed by them in University facilities. Children who are not University of Utah students or participants in University sponsored activities must not be allowed to use lab systems or interfere with the work of others. Children must not be left unattended in lab facilities.

VI. COPYRIGHT PROTECTION

Users must not make or use illegal copies of copyrighted or patented materials, information, or software, or to store such copies on University systems, or to transmit such information and software over University Networks.

Almost all forms of original expression that are fixed in a tangible medium are subject to copyright protection, even if no formal copyright notice is attached. Written text, video, recorded sound, digital images, and computer software are some examples of works that are usually copyrighted.

For more information regarding copyrights please refer to the following site: http://www.lib.utah.edu/research/copyright.php

VII. USE OF STUDENT COMPUTING LAB HARDWARE AND SOFTWARE

A. Some lab systems are configured for specific applications such as image scanning, video editing, teleconferencing, or similar purposes. Users who require the specific resources provided by these systems have priority.

B. Users are required to use the lab computer in a manner that does not have a detrimental impact on the stability and functionality of the systems or networks. The following activities are specifically prohibited.

1. Changing system or software configurations

2. Installing any software without prior permission from lab staff.

3. Disconnecting hardware, installing hardware, or changing hardware configurations.

4. Engaging in any activity intended to compromise system security, compromise the privacy of other users, or obstruct the work of others. This includes but is not limited to port scanning, network sniffing, keystroke logging, using remote control software, password cracking, and similar activities.

5. Using lab systems to attack, interfere with the proper operation of, or compromise the security of other computer or network systems.

6. Using lab systems to send forged e-mail, send bulk mail, send unsolicited commercial e-mail, or to fraudulently misrepresent the user's identity in any communication.

7. Using lab systems to initiate any communication intended to intimidate, coerce, harass, or threaten others.

8. Using lab systems to distribute or develop viruses, worms, or similar software.

9. Illegally sharing copyrighted materials with others.

10. Installing any server software such as FTP, telnet/ssh, Web, SMTP, file sharing, and game servers. This includes but is not limited to "peer to peer" file sharing software such as KaZaA, Gnutella, or similar programs.

11. Some labs permit attachment of FireWire and USB devices such as cameras and camcorders for course-related work. Other labs impose more restrictive rules. Check with laboratory staff for specific information regarding these uses.

C. Laptops may only be connected to network jacks specifically provided for this purpose. Disconnecting lab systems to connect laptop computers is prohibited. Connecting laptops to unused network jacks is also prohibited. All use of laptops in University computing facilities is governed by University policies and state and federal law.

VIII. POLICY ENFORCEMENT

A violation of the provisions of this policy may result in the withdrawal of access and may subject the user to disciplinary action or academic sanctions consistent with University policies and procedures.

All criminal activities will be referred to University Police, State and/or Federal agencies.

Rev. 7/26/02

Reviewed by University of Utah Office of Legal Counsel July, 2002.

students using computers

The Marriott Library supports the teaching, research, and learning mission of the University of Utah by providing open access to the broadest possible range of ideas, opinions, and knowledge. The First Amendment of the U.S. Constitution, the American Library Association's Library Bill of Rights, and Freedom to Read Statement, and the university's principles of academic freedom provide the foundation for building research library collections, offering services, and promoting access to materials.

The University of Utah makes available information resources that may be used by University students, faculty, staff, and others. The University of Utah Information Resources Policy (PPM1-15) states that these resources are intended to be used for educational purposes and the legitimate business of the University and in a manner consistent with the public trust. Appropriate use of these resources includes instruction, independent study, continuing education, authorized research, independent research, and the official work of the offices, departments, and recognized student and campus organizations of the University.

Inappropriate uses include interfering with the work of others, wasting resources, using the resources for private economic purposes, gambling, and any activities that include the violation of state or federal laws and University policies and procedures. Obscenity and child pornography are prohibited by law.

The Marriott Library endorses and promotes the principles of intellectual and academic freedom and does not restrict access to information. These important freedoms come with important responsibilities. Users of library computer workstations should be aware that some information resources, including sites on the Web, could be offensive to other library users. Be considerate of those around you when viewing materials in public computer areas. While you generally have the right to look at whatever you choose to view, this right is balanced by the rights of others to work in a setting free of intimidation, harassment or hostility.

Users must be considerate in their use of shared resources and refrain from monopolizing equipment. During peak times when computer workstations are in demand, recreational use such as playing games will be disallowed. When people are waiting for access to a computer, reasonable time limits will be imposed.

The privacy rights of other library users should be respected. Parents are responsible for determining whether content of electronic resources is appropriate for children and youth, for controlling their use of these resources, and for their children's safety and behavior in the library. Use must be in compliance with state and federal laws and University of Utah policies and procedures. Violation of the provisions of this policy may result in the withdrawal of access and may subject the user to disciplinary action or academic sanctions consistent with University policies and procedures. Users who are not faculty, staff or students may have their access to information resources unilaterally revoked if they violate this policy.

References: Information Resources Policy, University of Utah Policy and Procedure Manual 1-15; Marriott Library User Responsibilities. Reviewed by the U of Utah Office of General Counsel, April 2004.

Guest Passes

Food & Drink Policy

  • Food & Drinks are allowed on levels 1, 2 & 3.
  • Food is NOT permitted in classrooms or spaces with technology however beverages in firm, covered containers are allowed.
  • Food and beverages are prohibited in Special Collections on level 4 and on level 5 unless coordinated with Facilities Management.
  • If you spill something, please notify a library employee immediately so that we can clean it up quickly.
  • Catering and electric appliances are prohibited in public spaces unless coordinated with Facilities Management.
  • Trash and recycling should be disposed of in the appropriate containers.
  • Wipes are provided on levels 1, 2 & 3 to clean tables.

Your cooperation will help the Marriott Library continue to offer broadened food zones and protect our furnishings and equipment for years to come.

Food & Drink Is Prohibited In The Following Spaces:

Level 1 
1008-Mac Classroom
1009-PC Classroom
1110-Mac Classroom
1120-PC Classroom
1160-PC Classroom
1704-Testing Center
1735-PC Classroom
1745- Mac Classroom
1750-Public Guest Pass Computers

Level 2 
2100-Knowledge Commons
2008-Fine Arts Classroom
2400-Fine Arts & Architecture Library
2750-Level 2 Public Computers

Level 4 
Special Collections

Level 5 
Library Atrium & Gallery

Approved by Marriott Advisory Council July 12, 2012 
Approved by Executive Council July 19, 2012

Contact

Library Administration
 801-585-9521

Related Links

Guest Passes

 

Ask the Library

  • 801-581-6273
  • Live Chat -    
  • Email
  • In-Person
  • Research Consultation

 Last Modified 4/22/14