EPCC Students:
Use is OPEN access for E.P.C.C. students. This means first come, first served.
Community User:
Community users under age 17 are NOT allowed to use the computers unless they are accompanied by a parent or a guardian at all times. The computer will be assigned to the parent or guardian. Community users MUST request a computer, if one is available, at the circulation desk.
Our students have PRIORITY of access.
- Guidelines
- Community users MUST request a computer, if available, at the Circulation Desk.
- E.P.C.C. students have priority of access. You may be asked to surrender your computer if a student needs it.
- Users must be familiar with the application they are running. The Library will only provide assistance in handling minor problems such as logging in, paper jams, or program selection.
- Please do not save to the C: drive; use a flash (USB) drive for saving documents.
- The Library cannot guarantee a virus-free environment and will not be responsible for loss of documents.
- Priority access will be given to El Paso Community College students, faculty and staff.
- All work and printing must be completed 15 minutes before closing.
- No use of personal or class software.
- The library does not allow the download of personal or class software onto the library's computers. Please make arrangements with computer labs to view/use your software.
- Procedures for Responsible Computing at El Paso Community College
- In support of its mission of teaching, research, and public service, El Paso Community College provides access to computing and information resources for students, faculty, staff and community users, within institutional priorities and financial capabilities.
- All who use the College's computing and information resources must act responsibly. Every user is responsible for the integrity of these resources.
- All users of College-owned or College-leased computing systems must respect the rights of other computing users, respect the integrity of the physical facilities and controls, and respect all pertinent license and contractual agreements.
- It is the policy of El Paso Community College that all members of its community act in accordance with these responsibilities, relevant laws and contractual obligations, and the highest standard of ethics.
- Misuse of Computing and Information Resource Privileges
Examples may include but not be limited to:
- Accessing computers, computer software, computer data or information, or networks without proper authorization, regardless of whether the computer, software, data, information, or network in question is owned by the College. (That is, if you abuse the networks to which the College belongs or the computers at other sites connected to those networks, the College will treat this matter as an abuse of your El Paso County Community College computing privileges.)
- Using computing facilities, computer accounts, or computer data for purposes other than those for which they were intended or authorized encroaching on others' use of the College's computers (e.g., disrupting others' computer use by game playing; by sending excessive messages, either locally or off-campus [including, but not limited to electronic chain letters.]
- Printing excessive copies of documents, files, data, or programs.
- Modifying system facilities, operating systems, or disk partitions.
- Attempting to crash or tie up a College computer.
- Damaging or vandalizing College computing facilities, equipment, software, or computer files).
- Violations of these procedures may result in administrative and/or criminal actions
Such administrative action may include, but not be limited to:
- Inspecting any files or programs in question.
- Suspending or restricting the computing privileges of the violator.
- It should be understood that nothing in these guidelines precludes enforcement under the laws and regulations of the State of Texas, any municipality or county therein, and/or the United States of America.
- Wireless Network
- Unauthorized use of the system is prohibited.
- Usage may be subject to security testing and monitoring.
- Use of E.P.C.C. computing resources must be in accordance with EPCC procedures for acceptable use of information technology resources and information security.
- You have no expectation of privacy except as otherwise provided by applicable privacy laws.
- By continuing to use the system you indicate your awareness of and consent to these terms and conditions of use.
- Please refer to EPCC's Wireless webpage for additional information and guidelines. https://www.epcc.edu/Services/ITServiceCatalog/wireless​