Library Policies

A. Library Users

  •  Enrolled student of LNU who presents library borrower’s card;
  •  A Faculty , employee, administrator, university official who presents a valid LNU ID;

B. Library Borrower’s Card (LBC)

  •  Used to borrow library resources in all sections/branches of the library; non-transferrable

C. Points to Remember in Borrowing Books

  • Take note of the limit on the number of books you can borrow.
  • Return the overdue books before borrowing again.
  • Borrow books for overnight used only depending upon the demand of the book(s) needed.

D. Overnight Lending Hours

Monday to Friday 4:00pm – 6:00pm
Saturdays 10:00am – 3:00pm

E. Receipt of Non-LNU Library User

  • The librarian inquires for the referral letter of the visiting user. After verification, he/sherequires the user to register on the Visiting User’s Logbook.
  • The librarian endorses the user to the head of the library for issuance of Visiting User’s Form (VUF) and securing signature that affirms approval for library usage.
  • The library informs the user to present the VUF before the entry to every library section.
  • The Referral letter is filed in the library usage file.

F. LIBRARY RULES AND REGULATIONS

  1. Students / faculty and visitors are requested to sign in their names in a particular logbook upon entering the library.
  2. Silence must be observed while inside the library to avoid distraction.
  3. Eating, littering, sleeping, smoking and playing inside the library are absolutely prohibited.
  4. Vandalism is strictly prohibited.
  5. Students are obliged to use their own library cards in borrowing books, newspapers, journals, magazines and other library materials.
  6. Courtesy must be practiced in the library especially when borrowing and returningbooks and other materials.
  7. Books, newspapers, furniture and other library materials should be returned to the proper place and section.
  8. Books and other library materials can be borrowed for one (1) night only.
  9. Reference materials like encyclopedia, dictionaries, etc. are strictly for library use only.
  10. Students who fail to observe library rules and regulations will be referred to the disciplinary council for sanction.

G. AUDIO VISUAL CENTER REGULATIONS

  1. All students are expected to fill out a form for the use of equipment and audio visual room.
  2. Students are allowed to make their request inside the office. However, for big groups, only the leader makes the requests.
  3. Permission to borrow materials and use of a projection room will only be allowed for official activities of the school.
  4. School ID is needed in order to avail of the audio visual collection.
  5. Returning of materials and equipment borrowed should be done on or before the time or date due specified. Failure to follow would mean imposition of fine or suspension of borrowing..
  6. No student will be allowed to enter the working area, recording/editing room unless authorized by the people concerned.
  7. Eating, playing, smoking and vandalism are absolutely prohibited.

F. INTERNET WORKSTATION AREA REGULATIONS

The University’s Computers are valuable pieces of equipment and such as it is important that they are not abused. Internet administrators / Student assistants are employed to supervise their use, but a high standard of service and facilities will only possible if all users, staff and student, act responsibly.

Disciplinary action may be taken against user who violates any of these rules /regulations.

  1. It is the policy of the University that computing and networking facilities are intended for use for teaching, learning, research and administration in support of the University’s mission. Although recognizing the increasing importance of these facilities to the activities of staff and students, the University reserves the right to limit, restrict, or extend access to them.
  2. Unless otherwise stated, duplication of any software supplied by the University constitutes a breach of Copyright regulations.
  3. Illegal or swapped software, including DOS, may not work on the University’s computer. Programs can harbor viruses, which infect computers, consequently destroying your files and those of subsequent users. Public domain virus detection software is available from the University’s ITTSG department. Machine faults sometimes occur and any failure should be reported to Internet Administrator or Student assistants.
  4. A computer technician is on standby for technical assistance during normal working hours.
  5. computing and networking facilities, and reserves any other rights necessary to protect them.
  6. DON’T play competitive recreational games.
  7. DON’T eat or drink in the laboratory.
  8. DON’T smoke in the laboratory.
  9. DON’T litter in the laboratory.
  10. DON’T make unnecessary noise in the laboratory.
  11. DON’T give passwords or any security codes to
  12. DON’T change software set-ups and displays.
  13. DON’T access prohibited sites such as pornographic
  14. DON’T leave your chairs unarranged.
  15. The University reserves the right to limit permanently restrict any user’s usage of the computing and networking facilities; to copy, remove, or otherwise alter any information or system that may undermine the authorized use of the computing and networking facilities; and to do so with or without notice to the user in order to protect the integrity of the computing and networking facilities against unauthorized or improper use, and to protect authorized users from the effect of unauthorized or improper usage.
  16. To avail for Internet Access Codes, students are required to present their IDENTIFICATION CARD (ID) and Enrollment Load/Registration Form (Stamped by Library and ID Section) to the Internet Administrator or Student Assistant on desk.
  17. Every student duly enrolled has maximum Internet account of 2 HOURS per day. Internet accounts which were not availed during the present semester are not carried on the next semester.
  18. Please observe one (1) student/computer scheme.
  19. Limited recreational game playing that is not part of an authorized and assigned research or instructional activity is tolerated. University computing and network services are not to be used for extensive or competitive recreational game playing. Recreational game players occupying a seat in a public computing facility must give up that computing position when others who need to use the facility for academic or research purposes are waiting.
  20. At any time and without prior notice, University management reserves the right to examine e-mail, personal file directions and other information stored on University Computers. This examination assures compliance with internal policies, supports the performance of internal investigations, and assists with the management of University information systems.