Laptop Lending Guidelines for Borrowing and Use

  • Only Binghamton University students, faculty and staff with valid ID cards may borrow laptops.
  • The borrower is required to sign a Laptop Loan Agreement each time a device is borrowed, accepting all financial responsibility for any loss or damage to a device or peripherals. The condition of each device will be noted each time a device is checked in or checked out.
  • Please report any problems to a library staff member.

Loan Policies

  • Laptops circulate from the Reader Services Desk in Bartle Library and the Information Services Desk in the Science Library.  
  • Laptops are available on a first come, first served basis. They may not be reserved in advance.
  • Laptops may be renewed once in person unless another borrower is waiting for a device. Phone or email renewals will not be accepted.
  • Laptop loan period is three hours, or until one-half hour before service desk closes. All devices MUST be returned 30 minutes prior to the desk closing. Overdue fines are $.25 per minute.
  • Borrowers who do not return laptops will have a hold placed on their Library and Registrar record. Laptops not returned after 24 hours will be considered lost/stolen and full replacement cost ($2200) will be charged. Damages to the device will be assessed on an individual basis and charged in the same manner as an unreturned device.
  • Borrowers are required to abide by the Binghamton University Computer Use Policies and Procedures

Proper Care and Use

  • Laptops are delicate electronic devices and require certain care to insure proper operation.
  • Laptops should be turned off and placed in its folded position any time it is moved.
  • Laptops are made available for the pursuit of scholarly activities and research. You may not install your own software or change system settings.
  • The laptops may not be used to interfere with or disrupt other users, services or equipment.
  • Disruptions include, but are not limited to, harassment, distribution of unsolicited advertising, propagation of computer viruses, or attempts to make unauthorized entry to other computers.

Last Updated: 10/5/17