Technology Lending

COVID-19 Update

Due to COVID-19, technology lending is temporarily unavailable.

Available Devices

  • Laptops (includes case, mouse, powercord)*
  • Phone Chargers
  • Headphones (available with microphone)
  • Projectors*
  • DVD player*
  • Calculators (financial and scientific/graphing)
  • Presentation remotes
  • Power strips

*Not available at UDC Library.

Patron Responsibilities and Loan Period

  • Patrons responsible for physical care of all loaned technology
  • Technology loan period is three hours, or until thirty minutes before the service desk closes.
  • All devices MUST be returned prior to the desk closing. Overdue fines are $.25 per minute.

Laptop Lending

Laptops may be borrowed by anyone who possesses a valid Binghamton University ID at either the Bartle Library Reader Services Desk or the Science Library Reader Services Desk. See complete program guidelines.

Printing from Library Laptops 

Although printing is not available directly from library laptops, printing is available in the Information Commons in Bartle, Science and University Downtown Center (UDC) Libraries. Log on to a print station using your PODS account to retrieve your printed pages.

Saving Your Work

IMPORTANT! Material saved on the hard drive or desktop will be lost when the device shuts down or loses power for any reason. Save your work early and often. If you wish to save your work to a permanent location, you may do so by:

  • Saving to your personal USB flash memory drive (laptops and netbooks only)
  • Saving to your H: drive server space
  • E-mailing your work as an attachment
  • Using an online service such as Dropbox, Google Drive, iCloud, etc.

Laptop Lending Agreement 


  • By borrowing this library-owned device, you accept responsibility for its security.
  • You will be responsible for the replacement fee (which may be up to $2200.00) if the laptop is lost or stolen while checked out to you.
  • You agree that you are responsible for the security of any peripherals (mouse, power cord, carrying case) checked out along with the device. Replacement fees for each peripheral vary.

Laptop Lending Guidelines for Borrowing and Use

  • Only Binghamton University students, faculty and staff with valid ID cards may borrow laptops.
  • The borrower is required to sign a Laptop Loan Agreement each time a device is borrowed, accepting all financial responsibility for any loss or damage to a device or peripherals. The condition of each device will be noted each time a device is checked in or checked out.
  • Please report any problems to a library staff member.

Loan Policies

  • Laptops circulate from the Reader Services Desk in Bartle Library and the Reader Services Desk in the Science Library.  
  • Laptops are available on a first come, first served basis. They may not be reserved in advance.
  • Laptops may be renewed once in person unless another borrower is waiting for a device. Phone or email renewals will not be accepted.
  • Laptop loan period is three hours, or until one-half hour before service desk closes. All devices MUST be returned 30 minutes prior to the desk closing. Overdue fines are $.25 per minute.
  • Borrowers who do not return laptops will have a hold placed on their Library and Registrar record. Laptops not returned after 24 hours will be considered lost/stolen and full replacement cost ($2200) will be charged. Damages to the device will be assessed on an individual basis and charged in the same manner as an unreturned device.
  • Borrowers are required to abide by the Binghamton University Computer Use Policies and Procedures

Proper Care and Use

  • Laptops are delicate electronic devices and require certain care to insure proper operation.
  • Laptops should be turned off and placed in its folded position any time it is moved.
  • Laptops are made available for the pursuit of scholarly activities and research. You may not install your own software or change system settings.
  • The laptops may not be used to interfere with or disrupt other users, services or equipment.Disruptions include, but are not limited to, harassment, distribution of unsolicited advertising, propagation of computer viruses, or attempts to make unauthorized entry to other computers.