Location: Library 2nd floor Room 227
Mon - Fri: 8AM - 5PM*
Sat - Sun: Closed
*Closed for Event Support
Director for Information Technologies
Information Technology Support
Beixin Ni (Team Leader)
Programming and System Administration
Rebecca Espinoza (Team Leader)
How To"s & FAQs
The IT staff maintain the Law School computing network, support information technology needs of the Law School community, serves the faculty, staff and students of the Law School with regard to computers, printers, and various mobile electronic devices. IT also provide Web and media services to the Law School. The following are a few examples of the kind of technology services available:
- Install computer hardware and software in the faculty or staff offices, classrooms, and computer labs in the library
- Assist the faculty, staff and students solve problems regarding user name/password, printing, computer hardware and software
- Support the technology and equipment in the classrooms, courtrooms and conference rooms, and assist the faculty and students in using such technology
- Help law students configure personal computers and devices to connect to the Law School and University network
- Consult with law students about personal computer problems and recommend solutions when possible
- Monitor, evaluate and implement new IT technology and products for the Law School
- Lab computers are available 24-7 for law school students with the proper security access to the building
- Laptop computers are available for checkout from the Library Circulation Desk. Please see the Library Circulation Desk for details
- There are three high-speed, multi-function scanner / printer / copiers available for student use. A small, per page charge is applied for printing and copying. Scanning is free of charge
- Every study carrel is equipped with wired network ports and electrical outlets to support your laptop. In addition, there are numerous electrical outlets and open network ports throughout the law library and in the first floor classrooms
- There is wireless network access in every area of the Law School. This includes the Law School forum, the student break area, the immediate patio areas, and the second floor classrooms
The Law School Technology resources, including Internet access, are available to all faculty/staff and students to support their educational and research needs. Each user shall be responsible for using Texas Tech University's (TTU's) computer services ethically and courteously. As owners of the computing systems, TTU and the School of Law have an obligation to ensure ethical use of the systems and maintain the right to monitor all academic accounts. All computer access must be consistent with TTU policies.
Most users act responsibly, but on those occasions when a user acts unethically or irresponsibly, disciplinary measures will be taken. The following list of ethical standards governs all users of TTU's computing facilities. Courteous use applies at all times, for all users, and for all systems.
Users may use only the computing resources they are authorized to use and only for the purposes specified when their accounts are issued or permission to use the resources (i.e., workstations) is granted. Disciplinary action will be taken against users who engage in activities including but not limited to the following:
- Use of computing resources for unauthorized or nonacademic purposes.
- Irresponsible use of accounts. Account holders shall be responsible and will be held accountable for ALL usage of their accounts. Keywords and passwords must be kept confidential to protect account holders and their files. Users shall not give, sell, loan, or in any way transfer their passwords to others.
- Attempted or actual use of TTU's computing resources for personal or financial gain.
- Unauthorized access or duplication of software or data belonging to others or to TTU. Reading another user's files, except by authorized System Management personnel in times of a security audit, is an invasion of privacy; using another's program or data without the author's permission is plagiarism. Each of the above is prohibited and shall constitute a violation of TTU policy.
- Unauthorized transportation of software or data provided by TTU to another computer site constitutes theft.
- Attempted or actual destruction or modification of the integrity of computer-based information, programs, records, or data belonging to TTU or other users.
- Attempted or actual use of the computing facilities to interfere with the normal operation of TTU's computing systems; or, through such actions, causing a waste of such resources (people, capacity, computer).
- Failure to respect the rights of other users. A user shall not hamper or deprive another of access to resources or encroach on another's use of computing facilities. Users shall consider the impact of their conduct on other users.
- Violation of federal or state laws, violation of the TTU's computer-use policies or the University's "Code of Student Conduct."
Security is a serious issue. Your main concern will be protecting your network username and password. As a law student you will have access to many resources that are restricted to law student use, access to your personal information, and possibly sensitive information. Your print account is also tied to your username. Not protecting your login information is an open invitation for someone to print on your account. It is important you keep your laptop and home computer updated with the latest antivirus definitions and security patches. Here are some simple rules you can follow to help protect your system and files from a virus.
- If it looks too good to be true, chances are it is. Be careful of what you download and stick to reputable Web sites.
- If you get an email attachment from someone you don't know, don't open it. Delete it immediately, and empty your deleted items folder. Most emails that contain virus infected attachments have subject lines to entice you to open the attachment. (i.e. “You got to see this”, “You're our big winner”, “Hot babes”, “Your privacy may have been violated”, to mention a few common ones.)
- Be suspicious of unusual emails from people you know. Their email address may have been “spoofed.”
- You may also see attachments that are .zip files and password protected. This method is used to bypass antivirus filters. The body of the message is usually short and tries to arouse your curiosity. (e.g. “Is this you?”, “I can't believe you wrote this”, etc.)
Automatic Anti-Virus Scanning: The computers in the Law School are protected with the latest version of Symantec Anti-Virus software. Although the software is set to real-time (immediate) scanning of files, it is always best to run periodic a scan. The scanning software has been set to perform an automatic scan overnight. Leave your computer on, but not logged in, overnight at least two days each week to ensure that the program has scanned the computer for virus problems. We also recommend that you scan your flash drives on a regular basis to prevent problem viruses from getting into the computer and damaging your files. Anti-Virus Software for your home computer: Symantec Anti-Virus software is freely available on the eRaider download site.
Your Techmail email account will be the single point of contact between you and the Law School's faculty and administration. We DO NOT support NON-law school email accounts. The Law School uses Microsoft Outlook as the email software or Outlook Web mail access is also available (http://outlook.com/ttu.edu) so you can check your mail from any Internet browser. It is recommended that you keep your law school mail separate from your personal mail.
If you forget your password, you will need to access your eRaider account to get a new password. Your eRaider account should be set up with a personal reminder and you can always change your eraider password at https://eraider.ttu.edu. You can also contact main campus IT Help Central at 806-742-4357 (742-HELP) for password problems.
Google Technology News Feed
- Samsung has five new budget smartphones — here's how they all compare - CNN
- Logitech officially discontinues its line of Harmony universal remotes - TechHive
- Q Link Wireless made private customer information accessible with just a phone number - The Verge
- Google Pixel Watch leak gives us a first look at the anticipated smartwatch - TechSpot
- Elon Musk startup shows monkey with brain chip implants playing video game - The Guardian