The purpose of this policy is to define appropriate use and access of information through the computers housed in the Church History Library as well as when using the Library’s wireless connections. This policy applies to all who come into the library, including public, employees, and missionaries.
The Church History Library is a private facility of The Church of Jesus Christ of Latter-day Saints. This facility provides public access to computers and the internet to aid the patron in obtaining useful information to support their research endeavors. These services are to be used in harmony with the standards of the Church.
The Library cannot guarantee the privacy of electronic and physical personal information stored, processed, and transmitted in association with this facility. It is the responsibility of individuals to safeguard any personal or sensitive information, including printed materials, personal computers, removable media, and information placed on or around the library’s computers.
- The Church endeavors to filter out inappropriate content to help protect users from accidentally accessing unsuitable content.
- Library staff may physically and electronically monitor use of the computers and other resources to discourage, detect, and stop misuse.
- Policy will be clearly posted, and a signed agreement will be acquired from those given Church wireless privileges.
- Violations of this policy will be strictly enforced.
Patrons may use the library’s computers for personal e-mail, but must agree to use e-mail primarily for research purposes. An example of an appropriate use of e-mail would be to contact friends, family members, or other researchers or institutions for information pertaining to their research. Temple Square missionaries are permitted to use the computers for personal email as defined by the mission rules. Examples of prohibited emailing include, but are not limited to: sexually explicit content, violent content or hate mail, profanity, content that violates copyright or trademark laws, unsolicited commercial e-mail, spam, or any otherwise illegal content.
- The Internet will be used for research purposes related to the use of the Church History Library. Internet searches other than this will be kept to a minimum.
- Access to inappropriate sites, including sites with pornography, violent content, hate group propaganda or otherwise illegal behavior will not be tolerated.
- Deliberately attempting to access inappropriate content is a security violation as well as a violation of this policy.
- Only software loaded by the Church History Library is allowed on the Library’s computers.
- Users may not download or install additional software on the Library’s computers.
Personal Laptops/removable devices
- Personal laptops may be used in the Church History Library, but are subject to the terms of this policy.
- Personal laptops will not be connected to any devices, cables, or phone lines belonging to the facility, except to designated tabletop network ports.
- Using personal laptops to access inappropriate content in the Church History Library is prohibited and will result in immediate dismissal from the facility.
- The Library is not responsible for any user’s equipment malfunction, loss of data, damage to personal disks, interruptions to electronic transactions of any kind or other related computer or network issues.
- Users may not use the computer system for illegal purposes. Prohibited uses include but are not limited to: unauthorized copying or use of copyrighted software, attempting to use or view another person’s computer files or data without permission, and attempting to crash, degrade performance, introduce viruses, or the like, or gain unauthorized access to computer systems or networks.
- Other inappropriate uses include but are not limited to using the Church History Library’s terminals for private economic purposes, recreational use such as playing games, or social networking such as blogging.
Staff or security may stop anyone who violates this policy. The Church History Library reserves the right to revoke privileges, including denying access to the facility from anyone who violates this policy.