Laptop, netbook & iPad Lending Guidelines for Borrowing and Use

  • Only Binghamton University students, faculty and staff with valid ID cards may borrow laptops, netbooks & iPads.
  • The borrower is required to sign a Laptop, netbook & iPad Loan Agreement each time a device is borrowed, accepting all financial responsibility for any loss or damage to a device or peripherals. The condition of each device will be noted each time a device is checked in or checked out.
  • Please report any problems to a library staff member.

Loan Policies

  • Mobile devices circulate from the Circulation desk in Bartle Library and the Information Services Desk in the Science Library.  Mobile devices must be used in the library.
  • Mobile devices are available on a first come, first served basis. They may not be reserved in advance.
  • Mobile devices may be renewed once in person unless another borrower is waiting for a device. Phone or email renewals will not be accepted.
  • Mobile device loan period is three hours, or until one-half hour before service desk closes. All devices MUST be returned 30 minutes prior to the desk closing. Overdue fines are $.25 per minute.
  • Borrowers who do not return mobile devices will have a hold placed on their Library and Registrar record. Mobile devices not returned after 24 hours will be considered lost/stolen and full replacement cost ($2200) will be charged. Damages to the device will be assessed on an individual basis and charged in the same manner as an unreturned device.
  • Borrowers are required to abide by the Binghamton University Computer Use Policies and Procedures

Proper Care and Use

  • Laptops, netbooks and iPads are delicate electronic devices and require certain care to insure proper operation.
  • Laptops and netbooks should be turned off and placed in its folded position any time it is moved.
  • Mobile devices are made available for the pursuit of scholarly activities and research. You may not install your own software or change system settings.
  • The mobile devices may not be used to interfere with or disrupt other users, services or equipment.
  • Disruptions include, but are not limited to, harassment, distribution of unsolicited advertising, propagation of computer viruses, or attempts to make unauthorized entry to other computers.

Last Updated: 8/19/13