Laptop Lending Guidelines for Borrowing and Use
- Only Binghamton University students, faculty and staff with valid ID cards may borrow laptops.
- The borrower is required to sign a Laptop Loan Agreement each time a device is borrowed, accepting all financial responsibility for any loss or damage to a device or peripherals. The condition of each device will be noted each time a device is checked in or checked out.
- Please report any problems to a library staff member.
- Laptops circulate from the Reader Services Desk in Bartle Library and the Information Services Desk in the Science Library.
- Laptops are available on a first come, first served basis. They may not be reserved in advance.
- Laptops may be renewed once in person unless another borrower is waiting for a device. Phone or email renewals will not be accepted.
- Laptop loan period is three hours, or until one-half hour before service desk closes. All devices MUST be returned 30 minutes prior to the desk closing. Overdue fines are $.25 per minute.
- Borrowers who do not return laptops will have a hold placed on their Library and Registrar record. Laptops not returned after 24 hours will be considered lost/stolen and full replacement cost ($2200) will be charged. Damages to the device will be assessed on an individual basis and charged in the same manner as an unreturned device.
- Borrowers are required to abide by the Binghamton University Computer Use Policies and Procedures
Proper Care and Use
- Laptops are delicate electronic devices and require certain care to insure proper operation.
- Laptops should be turned off and placed in its folded position any time it is moved.
- Laptops are made available for the pursuit of scholarly activities and research. You may not install your own software or change system settings.
- The laptops may not be used to interfere with or disrupt other users, services or equipment.
- Disruptions include, but are not limited to, harassment, distribution of unsolicited advertising, propagation of computer viruses, or attempts to make unauthorized entry to other computers.