{"id":2184,"date":"2021-05-07T09:50:42","date_gmt":"2021-05-07T13:50:42","guid":{"rendered":"http:\/\/10.10.7.254\/?page_id=2184"},"modified":"2022-08-10T11:50:31","modified_gmt":"2022-08-10T15:50:31","slug":"using-technology","status":"publish","type":"page","link":"https:\/\/libraries.mercer.edu\/index.php\/university-libraries\/mercer-university-libraries-policies\/using-technology\/","title":{"rendered":"Using Technology"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2184\" class=\"elementor elementor-2184\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd2c110 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd2c110\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-028628a\" data-id=\"028628a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cf2298 elementor-widget elementor-widget-spacer\" data-id=\"7cf2298\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80d06df elementor-widget elementor-widget-heading\" data-id=\"80d06df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Using Technology<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4adcea7 elementor-widget elementor-widget-heading\" data-id=\"4adcea7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">University Libraries Computing Equipment Usage Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8862e6 elementor-widget elementor-widget-heading\" data-id=\"a8862e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"> Philosophy<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b43b94 elementor-widget elementor-widget-text-editor\" data-id=\"5b43b94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n \t<li>The University Libraries exist to serve the pedagogical needs of Mercer University, and this extends to the computing resources housed within each library. These uses include access to scholarly information resources, research, and other educational purposes.<\/li>\n \t<li>We expect our users to:\n<ul>\n \t<li>Respect other users as well as any licensing or contractual agreements.<\/li>\n \t<li>Use the equipment with respect and avoid damaging it.<\/li>\n \t<li>Comply with the Mercer University IT Access and Use Policy:\u00a0<a href=\"http:\/\/it.mercer.edu\/faculty\/policy\/it_access_and_use_policy.htm\">http:\/\/it.mercer.edu\/faculty\/policy\/it_access_and_use_policy.htm<\/a><\/li>\n \t<li>Comply with the Mercer University Honor Code: <a href=\"http:\/\/provost.mercer.edu\/honor\/\"> http:\/\/provost.mercer.edu\/honor\/<\/a>\n<\/li>\n \t<li>Abide by any posted time limits.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e18dc8b elementor-widget elementor-widget-heading\" data-id=\"e18dc8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priorities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102bf7e elementor-widget elementor-widget-text-editor\" data-id=\"102bf7e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The University Libraries house a limited number of computing resources, and because of that, we must prioritize usage for purposes that are more closely aligned to the institutional mission.<\/p>\n<ul>\n<li>Current Mercer University affiliates have priority. These affiliates include current faculty, students, and staff.<\/li>\n<li>Other users, if allowed, may be asked to yield equipment to current affiliates at any time, at our discretion.<\/li>\n<li>We may ask any user to show valid identification at our discretion.<\/li>\n<li>Some computers have special capabilities or purposes, and users may be asked to move to other equipment so that another user might make use of this specialized equipment. Examples include our scanning equipment and specialized accessibility workstations.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bbdd94 elementor-widget elementor-widget-text-editor\" data-id=\"0bbdd94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\">Adopted by Mercer University Libraries Management 11\/12\/2013<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-614660b elementor-widget elementor-widget-button\" data-id=\"614660b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/wp-content\/uploads\/2022\/03\/Computing-Equipment-Usage-Policy.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file-pdf\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View as a PDF<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-475efb4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"475efb4\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23b3c72 elementor-widget elementor-widget-text-editor\" data-id=\"23b3c72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Policies and procedures for the use of University-owned and operated information technology resources are outlined in the\u00a0<a href=\"http:\/\/it.mercer.edu\/faculty\/hardware_software\/it_access_and_use_policy.htm\">Information Technology (IT) Access and Use Policy<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Using Technology University Libraries Computing Equipment Usage Policy Philosophy The University Libraries exist to serve the pedagogical needs of Mercer University, and this extends to the computing resources housed within each library. These uses include access to scholarly information resources, research, and other educational purposes. We expect our users to: Respect other users as well [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":737,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Christian Pham","author_link":"https:\/\/libraries.mercer.edu\/index.php\/author\/cspham\/"},"uagb_comment_info":0,"uagb_excerpt":"Using Technology University Libraries Computing Equipment Usage Policy Philosophy The University Libraries exist to serve the pedagogical needs of Mercer University, and this extends to the computing resources housed within each library. These uses include access to scholarly information resources, research, and other educational purposes. We expect our users to: Respect other users as well&hellip;","_links":{"self":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/2184"}],"collection":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/comments?post=2184"}],"version-history":[{"count":0,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/2184\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/pages\/737"}],"wp:attachment":[{"href":"https:\/\/libraries.mercer.edu\/index.php\/wp-json\/wp\/v2\/media?parent=2184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}