Valle Verde Library


  • Library telephones are for staff use only.
  • Silence your cellular phones, beepers and other electronic signaling devices when entering the library. In the library classroom, the librarian may ask you to put all your electronic devices away. If you have any kind of emergency, please notify the librarian. Texting is not allowed in the library classroom.
  • Patrons are asked to maintain a quiet atmosphere in the library. Speak softly. Violators will be asked to leave the library.


  • Children under 17 MUST be accompanied by an adult, and must be supervised at all times. *
  • Library staff may reprimand disruptive children.
  • If the disruptive behavior continues, a staff member will inform parents that their child is disturbing others.
  • If parents refuse or are unable to control the child, a staff member may ask the family to leave.
  • If the family refuses to leave, a staff member will summon the campus police.
  • If children under 17 are left unattended in the library, a staff member will summon the campus police or will escort the children to the police department.
  • At its discretion, the library may exclude from use or revoke borrowing privileges for anyone known to have violated any rule in this policy.

*Exceptions are students taking credit hours at EPCC, such as dual credit students and early college students. (Continuing Education students under 17 must be accompanied by an adult.)


  • Students, faculty and staff need an EPCC I.D. card with the current semester's sticker.  If the current validated I.D. card is not available, the student must show his/her class schedule and a current picture I.D 
  • Residents of El Paso County may apply for a community user card. Minimum age for a community user is 17. The appropriate application form must be completed with proof of residence such as current driver's license, telephone deposit receipt, utility receipt, city or county tax receipt, and private/public school or university I.D. The community user card is valid for one calendar year from date of issue. Only the authorized card holder may use the card.
  • Materials such as periodicals, reference books, reserve items and laptops are to be used in the library. They do NOT check out. Copies may be made for research or instructional use within the restrictions of copyright legislation.

Authorized checkout periods

  • Students, faculty and staff may check out books for 3 weeks and Audio/Visual (A/V) materials (limit of 4) for 1 week.
  • Community users may only have 2 items checked out at one time; books for 3 weeks and AV materials for 1 week.
  • Loan periods for reserve materials are specified by the instructor with options for library use only and overnight.
  • The fine for overdue material is 25 cents per day per material. Students and community users who have a total fine of $1.50 or more must pay the fine before any additional material can be checked out.
  • Lost items must be paid in full plus a $10.00 processing fee per item.
  • Materials may be transferred upon request from another EPCC library.


Back to top

Collection Development Policy

Learn More

 Community User Card Policy


APPROVED: May 11, 1983 NUMBER: (Formerly 1.06.02)

REVISED: December 6, 2012

 OBJECTIVE: To provide the process for the issuance of community user identification cards to the residents of El Paso County enabling them to borrow materials or to use the technology in the Libraries.



I. Application Procedure

A. Community user identification cards will be issued at any EPCC Library to eligible residents of El Paso County who are at least 17-years-old and do not owe the College any money.

B. The patron shall complete an application form and show a valid picture identification showing proof of age and residency. Items for this purpose may include a Texas driver’s license or Texas ID or Military ID card, or a current picture ID along with a utility receipt, or a city or county tax receipt.

C. The card is valid for one (1) year from the date of issue, at which time it may be renewed.

D. There shall be a $1.00 charge for lost or damaged cards

II. Community User Privileges

A. Community user identification card holders shall adhere to all circulation regulations set forth for EPCC students, faculty, and staff and all operating procedures governing non-student usage of library technology.

B. The authorized card holder must present the valid identification card along with a current picture ID to check out materials or to use computer technology resources.

C. EPCC students, faculty and staff shall be given priority to library materials or computer technology resource use. The library reserves the right to recall materials on loan to a community user identification card holder, and to restrict and/or limit the use of library computer technology resources.

D. Circulation privileges shall be limited to a total of two (2) items at a time. Each campus library reserves the right to develop and implement additional circulation procedures based on EPCC student demand and need.

E. Community card users are not eligible for Interlibrary Loan (ILL), or document delivery.

III. Loss or damages to El Paso Community College resources or equipment.

A. The replacement cost plus a $10.00 processing fee shall be paid promptly by the card holder for each lost/damaged library item(s) per EPCC Procedure, Processing of Library Fines and Lost or Damaged Material Charges.

B. The card holder shall be financially responsible for the replacement cost of any EPCC computer technology resources that are lost or are damaged deliberately through misuse.

C. Failure to settle the account shall result in the revocation of the community user identification card. Reapplication may be made after the account is settled. Delinquent accounts are forwarded to the College’s Accounts Receivable Department for collection.

IV. Revocation of Privileges

A. Failure to comply with established policies and procedures may result in the immediate revocation of all user card privileges. Reapplication may be accepted within a year from loss of privileges.

B. EPCC reserves the right to restrict and/or decline privileges to individuals who continually abuse or violate established procedures.  

V. All other Facilities


The use of other facilities by groups or community must follow EPCC Procedure, Use of Campus Facilities, Furniture, Fields and Other Assets for District and Non-District Activities.


 Computer Use

EPCC Students:

Use is OPEN access for E.P.C.C. students. This means first come, first served.


Community User:

Community users under age 17 are NOT allowed to use the computers unless they are accompanied by a parent or a guardian at all times. The computer will be assigned to the parent or guardian. Community users MUST request a computer, if one is available, at the front desk by showing a valid user card and a picture I.D. Our students have PRIORITY of access.

  1. Guidelines
    • Community users MUST request a computer, if available, at the Computers Counter. E.P.C.C. students have priority of access. You may be asked to surrender your computer if a student needs it. Community users are advised to check for computer available at times more computers are often available:  After 5pm Monday - Thursday or on the weekends.
    • Users must be familiar with the application they are running. The Library will only provide assistance in handling minor problems such as logging in, paper jams, or program selection.
    • Please do not save to the C: drive; use a flash (USB) drive for saving documents.
    • The Library cannot guarantee a virus-free environment and will not be responsible for loss of documents.
    • Priority access will be given to El Paso Community College students, faculty and staff.
    • Handicapped students have priority of use on computers #46, 78,79, 80.
    • Computers reserved for class instruction have priority of use over any other.
    • No more than 2 clusters of computers can be reserved at one time. Only Faculty can reserve computers.
    • All work and printing must be completed 30 minutes before closing.
    • No use of personal or class software.
    • The library does not allow the download of personal or class software onto the library's computers. Please make arrangements with computer labs [B120, A1721] to view/use your software.
    • No assistance available for software use.

  2. Procedures for Responsible Computing at El Paso Community College
    • In support of its mission of teaching, research, and public service, El Paso Community College provides access to computing and information resources for students, faculty, staff and community users, within institutional priorities and financial capabilities.
    • All who use the College's computing and information resources must act responsibly. Every user is responsible for the integrity of these resources.
    • All users of College-owned or College-leased computing systems must respect the rights of other computing users, respect the integrity of the physical facilities and controls, and respect all pertinent license and contractual agreements.
    • It is the policy of El Paso Community College that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations, and the highest standard of ethics.

  3. Misuse of Computing and Information Resource Privileges
    Examples may include but not be limited to:
    • Accessing computers, computer software, computer data or information, or networks without proper authorization, regardless of whether the computer, software, data, information, or network in question is owned by the College. (That is, if you abuse the networks to which the College belongs or the computers at other sites connected to those networks, the College will treat this matter as an abuse of your El Paso County Community College computing privileges.)
    • Using computing facilities, computer accounts, or computer data for purposes other than those for which they were intended or authorized encroaching on others' use of the College's computers (e.g., disrupting others' computer use by game playing; by sending excessive messages, either locally or off-campus [including, but not limited to electronic chain letters.]
    • Printing excessive copies of documents, files, data, or programs.
    • Modifying system facilities, operating systems, or disk partitions.
    • Attempting to crash or tie up a College computer.
    • Damaging or vandalizing College computing facilities, equipment, software, or computer files).

  4. Violations of these procedures may result in administrative and/or criminal actions
    Such administrative action may include, but not be limited to:
    • Inspecting any files or programs in question.
    • Suspending or restricting the computing privileges of the violator.
    • It should be understood that nothing in these guidelines precludes enforcement under the laws and regulations of the State of Texas, any municipality or county therein, and/or the United States of America.

  5. Wireless Network- Acceptable Use as of 1-03-06
    • Unauthorized use of the system is prohibited.
    • Usage may be subject to security testing and monitoring.
    • Use of E.P.C.C. computing resources must be in accordance with EPCC procedures for acceptable use of information technology resources and information security.
    • You have no expectation of privacy except as otherwise provided by applicable privacy laws.
    • By continuing to use the system you indicate your awareness of and consent to these terms and conditions of use.

 District Wide Library Policies

 Elevators Keys

The elevator used to access the second level of the library is a LULA: Limited use/limited access. State inspectors require us to control access to this elevator since it was not designed for heavy or constant use.

  • The elevator only opens with a staff key. Ask at the Circulation Desk or Reference desk if you need to use the elevator on the first level of the library.
  • Once you are on the second level of the library and want to use the elevator to come down, please press the big red button next to the elevator door. A light will flash on the first level letting library staff know to send the elevator up to you.

 Food & Drinks

  • Food and beverages pose a threat to library materials and furnishings. There is a wooden shelf to the left of the library security gates. You may leave your food and beverages there. Bottles that screw shut tightly are allowed in the library.

 Law Collection

Rooms C 208-211 contain the Library’s print law collection. These rooms are only available for patrons doing legal research.  Rooms C208-11 are kept locked unless in use.  Patrons must go to the Check Out or the Reference Desk and ask that the rooms be opened. Official class schedule or, for community patrons, a photo ID may be required.

The collection is primarily for teaching purposes and books may not be up-to-date.  Law books in the special collection do not check-out.

Personal information

Personal information in Internet locator services, organizational manuals, etc. is available in the Library. The library conforms to the guidelines recommended by the Federal Government's Information Infrastructure Task Force in its publication,
Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information

Section III. A. Principles for Individuals Who Provide Personal Information/Awareness Principle states, (Information providers) ... should obtain, relevant information about:

  1. Why the information is being collected
  2. What the information is expected to be used for
  3. What steps will be taken to protect its confidentiality, integrity and quality
  4. The consequences of providing or withholding information
  5. Any rights of redress

Section II. B Notice Principle states: The Information users who collect personal information ... should provide adequate, relevant information about:

  1. Why they are collecting the information
  2. What the information is expected to be used for
  3. What steps will be taken to protect its confidentiality, integrity, and quality
  4. The consequences of providing or withholding information
  5. Any rights of redress

Section II. B. also states that these guidelines apply "specifically... to information public record."

  • The library also follows these guidelines as they relate to hard copy materials. The library does not have the resources or ability to responsibly follow these guidelines as they apply to personal information. Therefore, it does not provide personal information from the materials in its collections. The library will furnish organizational information concerning individuals, as regards business, as well as municipal, county, state and federal government addresses. Organizational address information can include: Spelling verification, job title(s), street address, telephone number, e-mail, fax, Internet URL and/or other location/status information.
  • However, the library is not an address information service. Public service staff will decide, at their discretion, how much time can be expended and information can be provided for each (telephone, e-mail or fax) request. Librarians will assist patrons who are in the Library in the use of available materials and services which provide personal information. It is not the duty of Library staff to provide personal information from these materials.

The library assumes no responsibility for the accuracy, veracity, timeliness, or completeness of personal, or any other information it provides. It is the patron’s responsibility to evaluate and utilize it as appropriate.

Back to top


Adapted from: Intellectual Freedom Committee “Guidelines for Developing a Library Privacy Policy. American Library Association. August 2003 & 5 May 2004

  1. Introduction
    Privacy is essential to the exercise of free speech, free thought, and free association. In this library the right to privacy is the right to open inquiry without having the subject of one's interest examined or scrutinized by others. Confidentiality exists when a library is in possession of Personally Identifiable Information (PII) about users and keeps that information private on their behalf. This library's privacy and confidentiality policies are in compliance with applicable federal, state, and local laws.
  2. El Paso Community College, Valle Verde Library Commitment to Our Users Rights of Privacy and Confidentiality
    This privacy policy explains your privacy and confidentiality rights, the steps this library takes to respect and protect your privacy when you use library resources, and how we deal with personally identifiable information that we may collect from our users.
    1. Notice & Openness
      We affirm that our library users have the right of "notice" to be informed about the policies governing the amount and retention of personally identifiable information, and about why that information is necessary for the provision of library services. We post publicly and acknowledge openly the privacy and information-gathering policies of this library. Whenever policies change, notice of those changes is disseminated to our users.
      In all cases we avoid creating unnecessary records, we avoid retaining records not needed for the fulfillment of the mission of the library, and we do not engage in practices that might place information on public view.
      Information we may gather and retain about current and valid library users include but is not limited to the following:
      • User Registration Information
      • Circulation Information
      • Electronic Access Information
      • Information Required to Provide Library Services
    2. Choice & Consent
      This policy explains our information practices and the choices you can make about the way the library collects and uses your information. We will not collect or retain your private and personally identifiable information without your consent; registering for a library card or using services that require PII constitutes consent. Further, we will keep your PII confidential and will not sell, license or disclose personal information to any third party without your consent, except for information required by EPCC, unless we are compelled to do so under the law or to comply with a court order.
      If you wish to receive borrowing privileges, we must obtain certain information about you in order to provide you with a library account. When visiting our library's Web site and using our electronic services, you may choose to provide your name, e-mail address, library card barcode, phone number or home address.
      We never use or share the personally identifiable information provided to us online in ways unrelated to the ones described above unless we are compelled to do so under the law or to comply with a court order. If you are affiliated with our college, the library automatically receives personally identifiable information to create and update your library account from the Registrar's Office or Human Resources.
    3. Access by Users
      Individuals who use library services that require the function and process of personally identifiable information are entitled to view and/or update their information in person. You will be asked to provide verification such as an ID number and identification card to ensure verification of identity. The purpose of accessing and updating your personally identifiable information is to ensure that library operations can function properly. Such functions may include notification of overdue items, recalls, reminders, etc. The library can explain the process of accessing or updating your information so that all personally identifiable information is accurate and up to date.
    4. Data Integrity & Security
      • Data Integrity: The data we collect and maintain at the library must be accurate and secure. We take reasonable steps to assure data integrity, including: using only reputable sources of data; providing our users access to their own personally identifiable data; updating data whenever possible; destroying untimely data or converting it to anonymous form.
      • Data Retention: We protect personally identifiable information from unauthorized disclosure once it is no longer needed to manage library services. Information that is regularly purged or shredded includes personally identifiable information on library resource use and material circulation history.
      • Tracking Users: We remove links between patron records and materials borrowed when items are returned, unless there is an overdue or damage fine/charge, and we delete records as soon as the original purpose for data collection has been satisfied.  We permit in-house access to information in all formats without creating a data trail, with the exception of Reserves and other materials housed in the Circulation/Reserves area.
        Our library has invested in appropriate technology to protect the security of any personally identifiable information while it is in the library's custody, and we ensure that aggregate, summary data is stripped of personally identifiable information. We regularly remove cookies, Web history, cached files, or other computer and Internet use records and other software code that is placed on our computers or networks.
      • Third Party Security: We ensure that our library's contracts, licenses, and offsite computer service arrangements reflect our policies and legal obligations concerning user privacy and confidentiality. Should a third party require access to our users' personally identifiable information, our agreements address appropriate restrictions on the use, aggregation, dissemination, and sale of that information. When connecting to licensed databases outside the library, we release only information that authenticates users as "members of our community." Nevertheless, be advised that there may be limits to library privacy protection when accessing remote sites.
      • Cookies: Users of networked computers will need to enable cookies in order to access a number of resources available through the library. A cookie is a small file sent to the browser by a Web site each time that site is visited. Cookies are stored on the user's computer and can potentially transmit personal information. Cookies are often used to remember information about preferences and pages visited. You can refuse to accept cookies, can disable cookies, and remove cookies from your hard drive. Our Library servers use cookies solely to verify that a person is an authorized user in order to allow remote access to licensed library databases.  Cookies sent by our Library servers will disappear when the user's computer browser is closed. We will not share cookies information with external third parties.
      • Security Measures: Our security measures involve both managerial and technical policies and procedures to protect against loss and the unauthorized access, destruction, use, or disclosure of the data. Our managerial measures include internal organizational procedures that limit access to data and ensure that those individuals with access do not utilize the data for unauthorized purposes. Our technical security measures to prevent unauthorized access include encryption in the transmission of data; limits on access through use of passwords; and storage of data on secure servers or computers.
        We permit only authorized library staff with assigned confidential passwords to access personal data stored in the Library's computer system for the purpose of performing library work. We will not disclose any personal data we collect from you to any other party except where required by law, by EPCC, or to fulfill an individual user's service request. The Library does not sell or lease users' personal information to companies, universities, or individuals.
  3. Enforcement & Redress
    Our library will not share data on individuals with third parties unless needed by E.P.C.C. or required by law. We conduct regular privacy audits in order to ensure that library programs and services are enforcing our privacy policy. Library users who have questions, concerns, or complaints about the library's handing of their privacy and confidentiality rights should file written comments with the Head Librarian. We will respond in a timely manner and may conduct a privacy investigation or review of policy and procedures.
    We authorize only the Head Librarian to receive or comply with requests from law enforcement officers for PII; we confer with our administrators and legal counsel before determining the proper response. We will not make library records available to any agency of state, federal, or local government unless a subpoena, warrant, court order or other investigatory document is issued by a court of competent jurisdiction that shows good cause and is in proper form. We have trained all library staff and volunteers to refer any law enforcement inquiries to the Head Librarian.

    1. Back to top

     Proper Library Behavior

    In order to create an optimum environment for study, research and learning, Library patrons are asked to adhere to the following regulations:

    1. Noise. All of the areas of the Library are considered quiet study areas. Electronic devices such as radios, cellular phones, beepers, etc. should not be used in the Library. Cellular telephone conversations should be conducted outside the library. The Library understands verbal interaction is necessary to conduct certain group activities, as well as conducting business at the circulation and other public service desk, however, Library patrons should be considerate of other students, faculty and staff who are reading and studying by keeping voice and other sound levels as low as possible.
    2. Food and beverages. Food and beverages pose a threat to library materials and furnishings. Food and beverages can be left on a wooden shelf near the library entrance.  Bottle with top that screw on tightly may be brought into the library.
    3. Use of furniture. Library furniture is for the exclusive use of patrons who are reading or studying.
    4. Library materials. After using materials, please place them in the book trucks located on each floor. Items may also be left on the tables. Do not try to re-shelve materials or leave them where they can be damaged: on the floor, stacked too high, on the copy machines, etc.  Avoid monopolizing library print indexes and other reference materials if other patrons need to use them.
    5. Waste paper and trash. Patrons should clean up after themselves by placing waste paper and other trash in the waste receptacles located throughout the Library.
    6. While on the library, patrons are not allowed to
    • smoke
    • eat or drink
    • solicit (try to sell merchandise or services.)
    • stand on work surfaces such as tables, counters, desks, etc.
    • play music at a level audible to other persons.
    • physically, verbally or with gesture threaten, abuse, or assault another person.
    • be drunk or disorderly


    Staff may call the campus police if any person committing any of these offenses or engaged in inappropriate behavior refuses to abide by the library policy.

    At its discretion, the Library may exclude from use or revoke borrowing privileges for anyone known to have violated any rule in this policy.

    Back to top