MCTC​ ​Library​ ​Public/Community​ ​User​ ​Computer​ ​Access​ ​Policy As​ ​of​ ​January​ ​1,​ ​2010,​ ​MCTC​ ​Library​ ​discontinued​ ​public​ ​access​ ​to​ ​research​ ​computers.​ ​With​ ​the exception​ ​of​ ​those​ ​designated​ ​for​ ​catalog​ ​access,​ ​all​ ​library​ ​computers​ ​currently require​ ​a​ ​valid MCTC​ ​ID​ ​and​ ​password​ ​to​ ​log​ ​in. There​ ​are​ ​a​ ​number​ ​of​ ​reasons​ ​for​ ​this​ ​decision,​ ​and​ ​we​ ​tried​ ​to​ ​take​ ​into​ ​account​ ​the​ ​needs​ ​of​ ​all our​ ​community​ ​members:​ ​students,​ ​staff,​ ​faculty,​ ​administration,​ ​and​ ​neighbors​ ​in​ ​making​ ​this decision. ​ ​The​ ​reasons​ ​are​ ​as​ ​follows: 1)​ ​Higher​ ​levels​ ​of​ ​enrollment​ ​have​ ​resulted​ ​in​ ​an increased​ ​demand​ ​on​ ​reference​ ​and​ ​circulation staff​ ​and​ ​greater​ ​use​ ​of​ ​library​ ​computers,​ ​and​ ​additional​ ​resources​ ​to​ ​deal​ ​with​ ​this​ ​have​ ​not​ ​been forthcoming. MCTC​ ​has​ ​had​ ​double-digit​ ​increases​ ​in​ ​enrollment​ ​for​ ​several​ ​years​ ​in​ ​a​ ​row,​ ​yet​ ​the​ ​library​ ​has not​ ​added​ ​any​ ​operations​ ​staff​ ​to​ ​keep​ ​up​ ​with​ ​the​ ​increased​ ​demand. ​ ​We​ ​have​ ​been​ ​seeing​ ​both the​ ​in-library​ ​computer​ ​lab​ ​and​ ​the​ ​research​ ​computer​ ​area​ ​completely​ ​filled​ ​up,​ ​for​ ​significant portions​ ​of​ ​the​ ​day,​ ​even​ ​after​ ​we​ ​added​ ​8​ ​more​ ​PCs​ ​to​ ​the​ ​research​ ​area. ​ ​Our​ ​first​ ​responsibility​ ​is to​ ​the​ ​students​ ​currently​ ​enrolled​ ​in​ ​classes​ ​here​ ​at​ ​MCTC​ ​and​ ​as​ ​such​ ​we​ ​decided​ ​it​ ​was necessary​ ​to​ ​reserve​ ​all​ ​available​ ​computers​ ​and​ ​staff​ ​time​ ​for​ ​current​ ​students. We​ ​do​ ​welcome​ ​all​ ​Minnesota​ ​residents​ ​to​ ​our​ ​library,​ ​and​ ​our​ ​print​ ​resources​ ​may​ ​be​ ​used​ ​within the​ ​library​ ​by​ ​all. ​ ​We​ ​have​ ​reserved​ ​one​ ​PC​ ​to​ ​make​ ​the​ ​online​ ​library​ ​catalog​ ​available​ ​to everyone,​ ​with​ ​no​ ​need​ ​to​ ​log​ ​in. 2)​ ​Alternative​ ​locations​ ​with​ ​open​ ​computer​ ​access​ ​are​ ​now​ ​more​ ​widely​ ​available​ ​than​ ​in​ ​the​ ​past. We​ ​had​ ​maintained​ ​limited​ ​public​ ​access​ ​through​ ​the​ ​time​ ​period​ ​of​ ​construction​ ​of​ ​the​ ​(downtown) Minneapolis​ ​Public​ ​Library,​ ​Central​ ​location. ​ ​The​ ​public​ ​library​ ​provides​ ​computer​ ​access​ ​to​ ​all,​ ​and the​ ​central​ ​location​ ​is​ ​now​ ​open​ ​all​ ​days​ ​of​ ​the​ ​week. ​ ​There​ ​are​ ​also​ ​2​ ​smaller​ ​branch​ ​locations relatively​ ​close​ ​by,​ ​also​ ​providing​ ​computer​ ​access,​ ​Tuesdays​ ​through​ ​Saturdays. ​ ​Through​ ​the ELM​ ​program,​ ​the​ ​public​ ​libraries​ ​offer​ ​many​ ​of​ ​the​ ​research​ ​databases​ ​that​ ​we​ ​offer​ ​here​ ​at​ ​MCTC, and​ ​reference​ ​services​ ​are​ ​also​ ​available​ ​at​ ​these​ ​locations. 3)​ ​While​ ​other​ ​academic​ ​institutions​ ​may​ ​and​ ​do​ ​offer​ ​computer​ ​access​ ​to​ ​non-affiliated​ ​members​ ​of the​ ​public,​ ​usage​ ​guidelines​ ​vary,​ ​as​ ​do​ ​allowable​ ​uses. ​ ​There​ ​is​ ​not​ ​a​ ​uniform​ ​guideline​ ​or​ ​law​ ​to determine​ ​how​ ​much,​ ​if​ ​any,​ ​computer​ ​access​ ​must​ ​be​ ​provided​ ​to​ ​members​ ​of​ ​the​ ​public​ ​who​ ​are not​ ​affiliated​ ​with​ ​the​ ​college​ ​or​ ​university. Some​ ​colleges​ ​allow​ ​open​ ​use​ ​of​ ​research​ ​databases,​ ​via​ ​the​ ​internet,​ ​but​ ​do​ ​not​ ​allow​ ​use​ ​of e-mail​ ​or​ ​word​ ​processing​ ​on​ ​library​ ​computers. ​ ​The​ ​U​ ​of​ ​MN​ ​has​ ​open​ ​access​ ​computers​ ​that provide​ ​"​access​ ​to​ ​MNCAT​ ​(our​ ​online​ ​catalog),​ ​licensed​ ​databases,​ ​and​ ​most​ ​World​ ​Wide​ ​Web sites​ ​including​ ​federal​ ​and​ ​state​ ​government​ ​sites.​ ​Blocklists​ ​have​ ​been​ ​installed​ ​on​ ​open​ ​access computers​ ​...​ ​to​ ​prohibit​ ​access​ ​to​ ​free​ ​e-mail,​ ​chat​ ​and​ ​gaming​ ​sites.​ ​Any​ ​patron​ ​may​ ​use​ ​the​ ​open access​ ​computers​ ​without​ ​supplying​ ​identification.​ " ​ ​However,​ ​"​ ​Only​ ​current​ ​students,​ ​staff​ ​and faculty​ ​have​ ​open​ ​access​ ​to​ ​the​ ​full​ ​Internet.​ ​The​ ​authentication​ ​and​ ​blocking​ ​procedures​ ​are primarily​ ​security​ ​measures​ ​intended​ ​to​ ​prevent​ ​abuse​ ​of​ ​the​ ​Libraries'​ ​computers."

MCTC Library Public/Community User Computer ... Accounts

exception of those designated for catalog access, all library computers ... to the students currently enrolled in classes here at MCTC and as such we decided it was ... We have reserved one PC to make the online library catalog available to.

42KB Sizes 3 Downloads 170 Views

Recommend Documents

News Brief - 500 Million User Accounts Hacked in Yahoo Breach.pdf ...
News Brief - 500 Million User Accounts Hacked in Yahoo Breach.pdf. News Brief - 500 Million User Accounts Hacked in Yahoo Breach.pdf. Open. Extract.

Wiley​​Online​​Library - Sign in Accounts
The​​more​​terms listed​​the​​more​​results​​you​​get. Example:​ ​​information​​OR​​literacy​​OR​​media. Last​​updated​​7/11/2016 ...

user verification: matching the uploaders of videos across accounts
‡International Computer Science Institute ... Linking online personas is an often discussed .... scoring threshold to the level for the EER, and simply tally-.

user verification: matching the uploaders of videos across accounts
MediaEval [10] Placing Task's Flickr video set, which is la- beled with the uploader's ... from posted text across different social networking sites, link- ing users by ...

Library Use and Access Services Policy Accounts
Computer & Internet Use. Patrons ... MCTC instructors own the items in the Library course reserve collection. If a patron has ... Since course reserves are provided by the faculty of their own volition, not all course materials will be present in the

PDF Read Business Accounts (Accounting & Finance) Online Library
PDF Read Business Accounts (Accounting &. Finance) Online Library. Books detail. New q ... beginner, yet suitable for A level and degree courses, this comprehensive text is supported by free online resources. ... Operations Management.

Floating Point Verilog RTL Library User Guide - Pulse Logic
Differences detected while comparing Verilog simulation results against C/C++ ... THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR ... OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER ...

LANDIS-II Climate Library v1.0 User Guide.pdf
Feb 27, 2015 - from PRISM (baseline or historic climate data) and the USGS Geo. Data Portal (climate change data). The output data will be aggregated.

Trust, Transparency & Control in Inferred User ... - ACM Digital Library
Apr 26, 2014 - Abstract. This paper explores the importance of transparency and control to users in the context of inferred user interests. More specifically, we illustrate the association between various levels of control the users have on their inf

User Experience at Google – Focus on the user ... - ACM Digital Library
Apr 10, 2008 - The first statement of Google's Corporate Philosophy is. “Follow the user and all ... design, user research, web development, technical writing ...

Online Microsurveys for User Experience Research - ACM Digital Library
May 1, 2014 - experience research. We focus specifically on Google. Consumer Surveys (GCS) and analyze a combination of log data and GCSs run by the ...

10.2.1.7 Lab - Securing Accounts Data and the Computer in ...
10.2.1.7 Lab - Securing Accounts Data and the Computer in Windows 7.pdf. 10.2.1.7 Lab - Securing Accounts Data and the Computer in Windows 7.pdf. Open.

man-154\sony-computer-keyboard-user-manual.pdf
man-154\sony-computer-keyboard-user-manual.pdf. man-154\sony-computer-keyboard-user-manual.pdf. Open. Extract. Open with. Sign In. Main menu.

man-124\lg-computer-monitor-user-manual.pdf
It is things that will certainly. make you ... Merely prepare few time and internet connections to get guides. ... PDF Ebook : GE Computer Monitor User Manual. 2.

Achieving distributed user access control in ... - Computer Science
design a scheme to counteract the access control system. Besides, we also addresses node duplication attacks and. DoS attacks by inundating authentication messages to the network. It is our belief that our general data access model and realistic adve