Testing Phase
Thank you for testing our new website! Many areas are still under construction.
Use the arrow button in the lower left corner to return to the current LVA website.
Provide your feedback on the new website.
Thank you for testing our new website! Many areas are still under construction.
Use the arrow button in the lower left corner to return to the current LVA website.
Provide your feedback on the new website.
The Library of Virginia's public computers are primarily intended for researchers. Please be aware that staff can provide only limited computer instruction.
Computers are situated in public areas and individuals are expected to use the Internet in a manner that respects the Library environment. Behavior by adults or children that is disruptive and not conducive to an atmosphere suitable for study, reading, and research is not allowed.
Filtering software blocks websites with adult content as well as all games, social media, and streaming audio and video. Access to blocked content for research purposes is addressed on a case-by-case basis.
A maximum of two individuals may be seated at a computer terminal.
It is inappropriate to view or print sexually graphic and/or explicit materials at public workstations. Failure to comply will result in loss of computer privileges.
Users are prohibited from any activity that violates local, state, or federal laws, including copyright laws. The Code of Virginia prohibits the use of library computers to: access child pornography (Va. Code section 18.2-374.1:1); communicate threats (Va. Code section 18.2-60); inappropriately display material harmful to juveniles (Va. Code section 18.2-391); produce, publish, sell or possess obscene items (Va. Code section 18.2-374, 18.2-374.1); or, to facilitate certain offenses involving children (Va. Code section 18.2-374.3). Violations of law will be reported to the appropriate law enforcement authorities.
The Library reserves the right to limit or revoke Library privileges, including computer privileges and access to its computer and network resources. Misuse or unauthorized use of Library computers and information resources may result in revocation of Library privileges. Users may not attempt to gain unauthorized access to the Library's network or computer systems or to any other network or computer system. Users may not attempt to change or modify hardware or software configurations or install software on the Library's workstations. Users may not attempt to damage computer equipment or software or cause degradation of system performance. Users will not have access to file transfer protocol (FTP) or Internet relay chat (IRC) 002E. The Library is not responsible for damages that may occur to a user's equipment or data due to conditions beyond the Library's control such as power surges, computer viruses, etc.