Go to top of page

Rights for access and use

Access

Flexible access is important and is essential service for users who may not be able to physically visit our libraries. Access should at a minimum include:

  • access to products for individual 'walk-in' Users of Members
  • remote access for registered users of Members

Registered members and conditions of access

Registration as a member of a NSLA library requires proof of identity and address/residence. Once registered the member is given a library card or account. Registration procedures are strictly implemented and are routinely audited.

Before a user can gain access to eResources they must first agree to the terms and conditions of access. The conditions of access specify that use must be for research and study purposes only and not for business, commercial or work related purposes. The conditions of access also direct users to read any copyright or terms of use statements appearing within the eResource and act in accordance with instructions. Where no statement restricting copying is evident, users are obliged to comply with the Copyright Act 1968 (Cth).

Use

Any Licence entered into by the Members must recognise and should not restrict or abrogate the rights of the Members or their User community permitted under Australian copyright law, or comparable fair dealing provisions of the jurisdiction of the licence.

Remote Access

Remote access for registered library members is an essential service for users who may not be able to physically visit our libraries. Consortium members have well established protocols in place to provide remote access to our members. Once a user has a card and they wish to access eresources offsite they need to login with their card details.  Consortium members use a combination of IP authentication and EZ Proxy to establish and authenticate the user’s credentials.

Remote access in detail

 

1. Website visit

A clients browser visits our e-resources management system (ezproxy), discoverable via a catalogue record, or the eresources page.

2. Library card check

The ezproxy software requires that the user have valid  credentials, either locally configured or verified against an external Integrated Library Management System (ILMS).

3. HTTP request

Ezproxy makes a standard HTTP request to the subscribed database, which is permitted by the provider as it originates from an IP address included in our subscription details.

4. Standard response

The resource provider responds with the appropriate search results, documents or other data.

5. Altered HTML response

The data returned by the provider is scanned by the ezproxy and is altered. Any links to example.com are changed to become example.com.rp.nla.gov.au. This provides a seamless experience to the end user, and ensures that any links followed will be routed via the ezproxy software.

Notes

  • The diagram and the explanation are to aid conceptual understanding, and are not a technical descriptionof the authentication process.
  • Ezproxy is used very broadly in Libraries, and is available from the OCLC.