top of page
AFSVC Logo_Libraries_PNG_Vertical Full Color.png

Ahren's Memorial


Mon - Thu: 9 a.m. - 7 p.m.
Friday: 9 a.m. - 5 p.m.
Saturday: 10 a.m. - 4 p.m.
CLOSED on all AETC Family Days

Ph: (575) 572-3939   | Email:

Privacy Act Statement

AUTHORITY:  Chapter 31 Title 44 USC Section 3101.


PRINCIPAL PURPOSE:   To provide patron locator information for contacting library patrons.


ACCESS:   The information is loaded and stored within the SirsiDynix Library Information System.


ROUTINE USES:  To provide patron contact for reserve book notices, reference services and overdue notices to patron and/or unit commander.  Disclosure is voluntary:  Without this information, library materials may not be removed from the library.


I understand that the library does not accept responsibility for my child’s choice of materials from either adult or children’s collections (books, videos, music, etc).  I will notify the library of any changes of address or organizations, as well as loss of my card.

(If you do not understand and/or agree with this Privacy Act Statement you cannot proceed further.)

This is a Department of Defense computer system. This computer system, including all related equipment, networks and network devices (specifically including Internet access), are provided only for authorized U.S. Government use. DoD computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability, and operational security. Monitoring includes active attacks by authorized DoD entities to test or verify the security of this system. During monitoring, information may be examined, recorded, copied, and used for authorized purposes. All information, including personal information, placed on or sent over this system may be monitored. Use of this DoD computer system, authorized or unauthorized, constitutes consent to monitoring of this system. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal, or other adverse action. Use of this system constitutes consent to monitoring for these purposes.

bottom of page