Texas Tech University

Information Technology

Phone:806-742-4897
Email: computersupport.law@ttu.edu

Location: Library 2nd floor Room 227
Office Hours:
Mon - Fri: 8AM - 5PM*
Sat - Sun: Closed

*Closed for Event Support
*Closed Holidays

Director for Information Technologies
Gregory Roberts

Information Technology Support
Beixin Ni (Team Leader)
Ryn Dunn
Michael Lambert

Programming and System Administration
Rebecca Espinoza (Team Leader)
Paul Aguilar

The Law School Technology resources, including Internet access, are available to all faculty/staff and students to support their educational and research needs. Each user shall be responsible for using Texas Tech University's (TTU's) computer services ethically and courteously. As owners of the computing systems, TTU and the School of Law have an obligation to ensure ethical use of the systems and maintain the right to monitor all academic accounts. All computer access must be consistent with TTU policies.

Most users act responsibly, but on those occasions when a user acts unethically or irresponsibly, disciplinary measures will be taken. The following list of ethical standards governs all users of TTU's computing facilities. Courteous use applies at all times, for all users, and for all systems.

Users may use only the computing resources they are authorized to use and only for the purposes specified when their accounts are issued or permission to use the resources (i.e., workstations) is granted. Disciplinary action will be taken against users who engage in activities including but not limited to the following:

  • Use of computing resources for unauthorized or nonacademic purposes.
  • Irresponsible use of accounts. Account holders shall be responsible and will be held accountable for ALL usage of their accounts. Keywords and passwords must be kept confidential to protect account holders and their files. Users shall not give, sell, loan, or in any way transfer their passwords to others.
  • Attempted or actual use of TTU's computing resources for personal or financial gain.
  • Unauthorized access or duplication of software or data belonging to others or to TTU. Reading another user's files, except by authorized System Management personnel in times of a security audit, is an invasion of privacy; using another's program or data without the author's permission is plagiarism. Each of the above is prohibited and shall constitute a violation of TTU policy.
  • Unauthorized transportation of software or data provided by TTU to another computer site constitutes theft.
  • Attempted or actual destruction or modification of the integrity of computer-based information, programs, records, or data belonging to TTU or other users.
  • Attempted or actual use of the computing facilities to interfere with the normal operation of TTU's computing systems; or, through such actions, causing a waste of such resources (people, capacity, computer).
  • Failure to respect the rights of other users. A user shall not hamper or deprive another of access to resources or encroach on another's use of computing facilities. Users shall consider the impact of their conduct on other users.
  • Violation of federal or state laws, violation of the TTU's computer-use policies or the University's "Code of Student Conduct."

Security is a serious issue. Your main concern will be protecting your network username and password. As a law student you will have access to many resources that are restricted to law student use, access to your personal information, and possibly sensitive information. Your print account is also tied to your username. Not protecting your login information is an open invitation for someone to print on your account. It is important you keep your laptop and home computer updated with the latest antivirus definitions and security patches. Here are some simple rules you can follow to help protect your system and files from a virus.

  • If it looks too good to be true, chances are it is. Be careful of what you download and stick to reputable Web sites.
  • If you get an email attachment from someone you don't know, don't open it. Delete it immediately, and empty your deleted items folder. Most emails that contain virus infected attachments have subject lines to entice you to open the attachment. (i.e. “You got to see this”, “You're our big winner”, “Your privacy may have been violated”, to mention a few common ones.)
  • Be suspicious of unusual emails from people you know. Their email address may have been “spoofed.”
  • You may also see attachments that are .zip files and password protected. This method is used to bypass antivirus filters. The body of the message is usually short and tries to arouse your curiosity. (e.g. “Is this you?”, “I can't believe you wrote this”, etc.)

Your Techmail email account will be the single point of contact between you and the Law School's faculty and administration. We DO NOT support NON-law school email accounts. The Law School uses Microsoft Outlook as the email software or Outlook Web mail access is also available (http://outlook.com/ttu.edu) so you can check your mail from any Internet browser. It is recommended that you keep your law school mail separate from your personal mail.

If you forget your password, you will need to access your eRaider account to get a new password. Your eRaider account should be set up with a personal reminder and you can always change your eraider password at https://eraider.ttu.edu. You can also contact main campus IT Help Central at 806-742-4357 (742-HELP) for password problems.

...