Laptop, netbook & iPad Lending Guidelines for Borrowing and Use
- Only Binghamton University students, faculty and staff with valid ID cards may borrow laptops, netbooks & iPads.
- The borrower is required to sign a Laptop, netbook & iPad Loan Agreement each time a device is borrowed, accepting all financial responsibility for any loss or damage to a device or peripherals. The condition of each device will be noted each time a device is checked in or checked out.
- Please report any problems to a library staff member.
- Mobile devices circulate from the Circulation desk in Bartle Library and the
Information Services Desk in the Science Library. Mobile devices must be used in
- Mobile devices are available on a first come, first served basis. They may not be reserved in advance.
- Mobile devices may be renewed once in person unless another borrower is waiting for a device. Phone or email renewals will not be accepted.
- Mobile device loan period is three hours, or until one-half hour before service desk closes. All devices MUST be returned 30 minutes prior to the desk closing. Overdue fines are $.25 per minute.
- Borrowers who do not return mobile devices will have a hold placed on their Library and Registrar record. Mobile devices not returned after 24 hours will be considered lost/stolen and full replacement cost ($2200) will be charged. Damages to the device will be assessed on an individual basis and charged in the same manner as an unreturned device.
- Borrowers are required to abide by the Binghamton University Computer Use Policies and Procedures,
Proper Care and Use
- Laptops, netbooks and iPads are delicate electronic devices and require certain care to insure proper operation.
- Laptops and netbooks should be turned off and placed in its folded position any time it is moved.
- Mobile devices are made available for the pursuit of scholarly activities and research. You may not install your own software or change system settings.
- The mobile devices may not be used to interfere with or disrupt other users, services or equipment.
- Disruptions include, but are not limited to, harassment, distribution of unsolicited advertising, propagation of computer viruses, or attempts to make unauthorized entry to other computers.