Computer Network Policies, Procedures and Regulations

It is the policy of East Texas Baptist University (ETBU) to provide current faculty, staff and students with computer access in order to take advantage of the best possible technological advancements. Use of ETBU computers and access to ETBU's computer network (TigerNet) is a privilege. That privilege is also governed by the rules and regulations of ETBU as well as state and federal laws.

Please familiarize yourself with the following procedures and regulations. Knowledge of them can save you time and aggravation.


Users are reminded to conduct their computer activities in a way that is in keeping with the values and mission statement of East Texas Baptist University. ETBU also reserves the right to deny access to any areas on the Internet that are not in keeping with the values and mission statement of the University

ETBU further reserves the right to deny or revoke computer access at anytime without notice.


Students are automatically assigned an ETBU email account when they apply for admissions to ETBU. Faculty or Staff may apply for an account by completing the appropriate form (Request for Network Accounts) available in the I.T. Office. Each computer account (USER-ID) is to be utilized by only the individual to whom it is assigned. Use of others User-ID is strictly forbidden and may be a violation of Texas State criminal law. Any unauthorized use of another's program or data files will result in the loss of computing privileges and possible disciplinary or legal action. If you suspect that a User-ID or password is known to anyone other than the user to whom it was assigned, report the information to the Dean of I.T. immediately. BE FOREWARNED! For a student, loss of computing privileges could make it impossible to complete classroom assignments, or even an entire degree program.


Unauthorized copying or possession of files or software is illegal and is strictly prohibited! It is the policy of ETBU that no consulting will be done with users on software that we know or have reason to believe is pirated. Pirated means that the software is being used in violation of the license agreement with the company that produced the software. Pirated software found on ETBU owned computer will be erased without regard to corresponding data that will be lost. Disciplinary action will be taken and the loss of computer privileges, suspension, and/or criminal prosecution may result.

Examples of illegal copying/possession include but are not limited to:

  • Making personal copies of files/software licensed to ETBU.
  • Making personal copies of files/software belonging to others.
  • Transmitting, receiving, downloading, or uploading files/software created by others without obtaining the proper permission or authorization (this includes music, e-mail, video, etc).
  • Making copies for distribution without proper permission (usually the author or publisher).
  • Placing pirated software on ETBU hardware.

* Random software inventories will be performed throughout the year. Please do your best to make sure that unauthorized software does not reside on the computer you use. Report suspected illegal copying to the Dean of I.T.

All users are strongly encouraged to comply with all copyright laws. For more information see the File Sharing and Copyright pages.


Users should not attempt unauthorized access into any systems. Browsing, exploring or making other unauthorized attempts to view data, files or directories belonging to the University or to others is forbidden. Possession of a program designed to gain unauthorized access will be deemed to constitute an attempt at breaking computer security. Break-in attempts are often grounds for federal prosecution and will be dealt with in the most strict manner. All computer privileges will be permanently revoked and permanent suspension may result.


The intentional creation and/or release of a computer virus by a student or employee on any computer system accessed at or from the University is grounds for immediate suspension of all computer privileges and other punishment including possible legal prosecution.


Commercial traffic on the TigerNet such as soliciting, selling, chain letters, or advertising is not allowed. Suggesting a product is acceptable, but to try to sell it is considered inappropriate use of TigerNet. This type of activity should be conducted via the bulletin-board (which will be provided on the network).



  • Fraud and false statements
  • Harassment
  • Defamatory comments
  • Chain letters
  • Transferring pirated software, documents or files
  • Commercial traffic



It will not be the policy of ETBU to snoop into the E-mail of the users. However the University retains the right, for the protection of the users and the university, to monitor and review E-mail without notice to or consent from the sender or receiver. ETBU provides electronic mail service to its employees and students to conduct business and to allow and encourage free exchange of ideas and information among friends and colleagues. Users should be aware though that E-mail is not a totally private or secure form of communication.


In order to avoid possible network conflicts or issues, users should refrain from running any software or hardware that could conflict with network services or activity. Examples of such software/hardware includes but is not limited to:

  • DNS servers
  • DHCP servers
  • Web servers
  • sniffers
  • FTP servers
  • Hubs
  • Routers
  • Switches
  • Wireless Devices (except in designated areas), etc.