Frederick Douglass Library Laptop Use Policy | University of Maryland Eastern Shore Marketing Retarget Pixel

Frederick Douglass Library Laptop Use Policy

  • Students must read, understand and agree to abide by this policy before checking out a Library Laptop.  Abuse of this privilege may result in suspension of laptop or Library privileges. 

    1. Library Laptops are available to UMES students for 3 hour periods within the Library only.  No overnight use.
    2. Only UMES students are eligible to check out Library Laptops.  Students must have a UMES ID card, and be previously registered with the Library.  New registrations cannot check out a laptop the same day that they register.
    3. Laptops must be returned one hour before closing (i.e. 11 p.m. when the Library is open until 12 a.m.; 4 p.m. when the Library is open until 5 p.m.)  Laptops will not be checked out after 9:30 p.m.
    4. The Library does not provide computer or software assistance, disks, CD’s, printers, or anything other than the laptops and power cables.
    5. Students should be aware that anything saved to the laptop hard drive will be erased on a regular basis.
    6. Fines for non-return or late return are as follows:
      1. $10 overdue fine per half hour until the Library closes.
      2. $100 overdue fine per day after the first night.
      3. $1600 replacement fine if not returned within 1 week.

    7. *   Fines subject to change


      The student to whom the laptop is checked out is responsible if the laptop is lost, stolen or damaged.  The Library recommends that you do not allow others to use your ID to check out any Library materials.

    8. Please report non-working laptops and laptops with any objectionable material downloaded onto them.  If available, another laptop will be checked out to any student reporting such problems.
    9. Students may check out a laptop immediately upon return if there is no other student waiting.  The Library does not maintain a Wait List for laptops.
    10. Students must sign the Laptop card indicating their agreement with this policy.  Students and staff must initial the time checked out and checked in.  The time to be used is that of the digital clock at the Circulation Desk.
    11. Use of the laptop in any way that violates other Library rules, such as the noise policy, is considered a violation of this policy.
    As well as the Library Policy, students are expected to abide by the University Policy
    General Standards for Acceptable and Responsible Use

    These guidelines set forth standards for responsible and acceptable use of University computing resources.  They supplement existing University policies, agreements, and state and federal laws and regulations.  Computing resources include host computer systems, University-sponsored computers and workstations, communications networks, software, and files.  Violation of these standards constitutes unacceptable use of computing resources and may violate other University policies and/or state and federal law.  Suspected or known violations should be reported to the Office of the Vice President of Information Technology, the Vice President of Student Affairs, and/or the Chief of Police of the University of Maryland Eastern Shore.  Violators will be processed and adjudicated by the UMES Judicial System (for students), the UMES Grievance Committee (Faculty) and/or law enforcement agencies.  Violations may result in revocation of computing resource privileges, academic dishonesty, or Honor proceedings, as well as faculty, staff, or student disciplinary action or legal action.


    The maintenance, operation, and security of computing resources require responsible University personnel to monitor and access the system.  To the extent possible in the electronic environment and in a public setting, a user’s privacy will be preserved. Nevertheless, that privacy is subject to the Maryland Access to Public Records Act, other applicable state and federal laws, and the needs of the University to meet its administrative, business, and legal obligations.

    Users should be aware that e-mail messages
    • Might be preserved as computer files on centrally administered disks.  Therefore, it is possible for people other than the user to see the messages.
    • Sent by one user becomes the possession of the receiver and can easily be re-distributed by recipients.  In this sense, the e-mail messages are not private, and all messages that should not be preserved should be deleted.
    • University policy also allows system administrators to view any files, including e-mail messages, in the course of troubleshooting system problems.
    User Responsibilities

    The following provisions describe conduct prohibited under these standards and guidelines:

    1. Altering system software or hardware configurations without authorization, or disrupting or interfering with the delivery or administration of computer resources.
    2. Attempting to access or accessing another’s account, private files, or –email without the owner’s permission.
    3. Misrepresenting oneself as another individual in electronic communication.
    4. Installing, copying, distributing, or using software in violation of: copyright and/or software agreements; applicable state and federal laws or the principles described in ”Using Software:  A Guide to the Ethical and Legal Use of Software for Members of the Academic Community.”
    5. Using computing resources for commercial or profit-making purposes without written authorization from the University.
    6. Using computing resources to engage in conduct that interferes with other users’ use of shared computer resources and/or the activities of other users.
    7. Failing to adhere to individual departmental or unit lab and system policies, procedures, and protocols.
    8. Allowing access to computer resources by unauthorized users.
    9. Using computer resources for illegal activities.
    10. Not ensuring that one’s use does not generate an inordinate amount of traffic that adversely affects others.
    11. Attaching more than one computer to their data jack. Multiple machines or hubs are not permitted.