Skip to main content

About ETBU


Computer Network Policies, Procedures and Regulations

It is the policy of East Texas Baptist University (ETBU) to provide current faculty, staff and students with computer access in order to take advantage of the best possible technological advancements. Use of ETBU computers and access to ETBU's computer network (TigerNet) is a privilege. That privilege is also governed by the rules and regulations of ETBU as well as state and federal laws.

Please familiarize yourself with the following procedures and regulations. Knowledge of them can save you time and aggravation.

Users are reminded to conduct their computer activities in a way that is in keeping with the values and mission statement of East Texas Baptist University. ETBU also reserves the right to deny access to any areas on the Internet that are not in keeping with the values and mission statement of the University

ETBU further reserves the right to deny or revoke computer access at anytime without notice.

User accounts

Students are automatically assigned an ETBU email account when they apply for admissions to ETBU. Faculty or Staff may apply for an account by completing the appropriate form (Request for Network Accounts) available in the I.T. Office. Each computer account (USER-ID) is to be utilized by only the individual to whom it is assigned. Use of others User-ID is strictly forbidden and may be a violation of Texas State criminal law. Any unauthorized use of another's program or data files will result in the loss of computing privileges and possible disciplinary or legal action. If you suspect that a User-ID or password is known to anyone other than the user to whom it was assigned, report the information to the Dean of I.T. immediately. BE FOREWARNED! For a student, loss of computing privileges could make it impossible to complete classroom assignments, or even an entire degree program.

Possession of illegal files or software

Unauthorized copying or possession of files or software is illegal and is strictly prohibited! It is the policy of ETBU that no consulting will be done with users on software that we know or have reason to believe is pirated. Pirated means that the software is being used in violation of the license agreement with the company that produced the software. Pirated software found on ETBU owned computer will be erased without regard to corresponding data that will be lost. Disciplinary action will be taken and the loss of computer privileges, suspension, and/or criminal prosecution may result.

Examples of illegal copying/possession include but are not limited to:

  • Making personal copies of files/software licensed to ETBU.
  • Making personal copies of files/software belonging to others.
  • Transmitting, receiving, downloading, or uploading files/software created by others without obtaining the proper permission or authorization (this includes music, e-mail, video, etc).
  • Making copies for distribution without proper permission (usually the author or publisher).
  • Placing pirated software on ETBU hardware.

* Random software inventories will be performed throughout the year. Please do your best to make sure that unauthorized software does not reside on the computer you use. Report suspected illegal copying to the Dean of I.T.

Unauthorized access

Users should not attempt unauthorized access into any systems. Browsing, exploring or making other unauthorized attempts to view data, files or directories belonging to the University or to others is forbidden. Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security. Break-in attempts are often grounds for federal prosecution and will be dealt with in the most strict manner. All computer privileges will be permanently revoked and permanent suspension may result.


The intentional creation and/or release of a computer virus by a student or employee on any computer system accessed at or from the University is grounds for immediate suspension of all computer privileges and other punishment including possible legal prosecution.

Commercial use

Commercial traffic on the TigerNet such as soliciting, selling, chain letters, or advertising is not allowed. Suggesting a product is acceptable, but to try to sell it is considered inappropriate use of TigerNet. This type of activity should be conducted via the bulletin-board (which will be provided on the network).

Inappropriate use
  • Fraud and false statements
  • Harassment
  • Defamatory comments
  • Chain letters
  • Transferring pirated software, documents or files
  • Commercial traffic

It will not be the policy of ETBU to snoop into the E-mail of the users. However the University retains the right, for the protection of the users and the university, to monitor and review E-mail without notice to or consent from the sender or receiver. ETBU provides electronic mail service to its employees and students to conduct business and to allow and encourage free exchange of ideas and information among friends and colleagues. Users should be aware though that E-mail is not a totally private or secure form of communication.

Network items
  • DNS servers
  • DHCP servers
  • Web servers
  • sniffers
  • FTP servers
  • Hubs
  • Routers
  • Switches
  • Wireless Devices (except in designated areas), etc.
Protect yourself

Avoid P2P

The safest way to avoid copyright infringement trouble is to avoid using peer-to-peer and other file sharing software altogether. 

Use Legal Alternatives

There are plenty of legal alternatives — and plenty of options: including pay-per-song, subscription, and streaming — many are free. Also to note, free doesn't always mean illegal, and not all paid services are legal. It's your job to make sure.

Disable outbound sharing

If you still intend to use peer-to-peer or other file sharing software, ensure that it's not configured to automatically share the files on your computer. If configured improperly, malware (viruses), spyware, or identity theft could await you.

Ever loan your computer?

Be aware when others use your computer. If the machine connected to the network is registered to you, you'll be the one contacted during an incident.

Educate yourself

Learn how peer-to-peer (P2P) software works and how software can be used to pirate music, and then avoid it. This site serves as a great place to start.

Recognize the Difference

Services that provide music legally will not usually have confusing warnings telling you how to use their software legally. Legal sites should also have documentation available proving that their service doesn't violate copyright.

Get permission to share

Confirm that the distributor of a file you are interested in downloading has permission from the copyright holder to distribute it. Assume you don't have permission to download or distribute a file unless you have proof to the contrary.


If all else fails, ask — the software company in question, a lawyer, or contact us. We're not lawyers, but we'll give you our best opinion.

Some content adapted from © 2009