Computer Use Policy for Visitors

The UAMS Library is a health sciences library. Computer use is restricted to UAMS faculty, students, and staff, and to visitors seeking health or biomedical information.

See Public Libraries listed below for other types of computer and information needs.

Computer and Internet Use

  • Visitors must sign in before being logged onto a computer. By signing in visitors acknowledge that they have read, understand, and agree to this policy for computer use.
  • Computer use is on a first-come, first-serve basis. A visitor will only be logged onto a computer once a day. After an hour, a visitor may be required to log off the computer if another visitor is waiting for a computer.
  • Students enrolled in academic programs at another institution should use that institution’s library as their primary library. Due to limited resources, including staff time, the UAMS Library provides very limited assistance for non-UAMS students.
  • The UAMS Library does not allow the use of course management tools (e.g. WebCT or Blackboard) by visitors.
  • Noisy or disruptive visitors will be asked to leave the Library.

Unacceptable Use

Visitors may not use Library computers for illegal or inappropriate activities or for activities outside the scope of health and biomedical research, including:

  • Misrepresenting oneself on the Internet or engaging in fraud.
  • Viewing, downloading, or disseminating pornography.
  • Participating in chat rooms or forums.
  • Playing games.
  • Issuing threats.
  • Violating copyright laws or licensing agreements.
  • Hacking, altering, deleting, or damaging computer software, hardware, system network, programs or data.


All persons under the age of 16 must be accompanied by a parent. A photo ID is required to verify date-of-birth. All public-access computers in the Library have full access to the Internet and there are no content filters to prevent children from accessing inappropriate materials.


The UAMS Library staff will take appropriate action if policies are abused. This may include revoking computer access privileges, revoking library access privileges, and contacting the UAMS Police.

Public Libraries

Public libraries provide computers for Internet access, e-mail, and use of Microsoft products. See Central Arkansas Library System Serving Pulaski and Perry Counties for detailed information.