Skip to Main Content

Facilities and Technology

Library Computers

The Klaude Kendrick and Cordas C. Burnett Libraries provide access to computers for the primary purpose of aiding students in their studies. Each library is equipped with several computers, a laser printer, and a copy machine/scanner. The computers all utilize Microsoft Office and Microsoft Windows. Internet access is available on each computer. To use a computer, students simply need to log-in using their EU ID and Password (a guest login account is available upon request for approved guest patrons).

Restrictions on Use

Use of the Library Student Computers by patrons will be regulated by the following policies:

  1. Patrons must either log-in to the specific computer they wish to use with their EU log-in or, request to be logged onto a computer as a guest by the Circulation Staff.
  2. Patrons must be willing to leave the computer they are using when the library is scheduled to close or if their particular machine has been reserved for some other use. In addition, any patrons using a Guest Account may be asked to surrender the computer they are using to another patron if there are no other machines available for incoming students.
  3. Patrons may bring in CDs or DVDs to run on the computers. However, the library is not responsible for providing support for any personal software brought in by library patrons. Those who listen to music or audio programs must do so with headphones.
  4. Patrons may not disconnect any network cables or other cables.
  5. Due to security concerns and federal regulations, patrons are not permitted to connect any network cables to their laptops.
  6. Priority will be placed on patrons who use the Internet for research or to enhance their educational pursuits.
  7. Patrons are not permitted to access obscene, pornographic, or other similarly morally questionable material.
  8. Patrons may not intentionally download or install copyrighted material for personal use. This includes commercial software, shareware, freeware, typefaces or fonts, wallpaper, sound files or other multimedia.
  9. Commercial use of the network is strictly prohibited.
  10. Students should exercise caution in answering questions regarding Evangel University or the Assemblies of God Theological Seminary and should not respond to any inquirer or initiate any information without full disclosure of name, address and identity of the inquirer. No student shall assume the responsibility of speaking for the Board of Administration or individual member of the Board of Administration or interpret university policy in any electronic or other form of communication. No student may communicate on behalf of another student or EU employee unless specifically authorized by that student or employee to do so.

The library reserves the right to suspend the computer access privileges of patrons who violate any of these policies.

Back to Top


Printing Policy

Library staff will stock the libraries’ printers with paper. Although free printing is primarily reserved for EU students who have paid their technology fee, the library does permit guest patrons to print out a limited number of pages.

Back to Top


Use of Library Computers by Guests

Use of the library computers is restricted to current EU patrons, current students of consortium schools, and members of other approved patron groups. Furthermore, approved guest patrons should only use the computers to search the online library catalog and resources or to briefly look up information related to their current studies. Guests may print out a limited number of pages containing the results of such searches.

Library staff reserve the right to ask guest patrons to leave the computer they are using or to suspend computer access privileges if it is felt that such patrons are using the computer in a manner that is inconsistent with these regulations.

Back to Top


E-mail Security

EU/AGTS students may use the library computers to access their personal e-mail accounts. However, it is recommended that good security practices and precautions are observed:

  • Do not open any e-mail that looks suspicious, even if it is from someone you know.
  • In regards to e-mail attachments: You should never directly open any e-mail attachments. If you do desire to open an attachment from someone you know and feel you can trust, be sure to first save it to the computer drive or to disk (the anti-virus software installed on the machine will check for viruses).
  • Never open an attachment with a file name ending with an .exe, .bat, .scr, or .zip extension. (However, be aware that even files that appear to be text documents based on their extensions may actually be malicious programs in disguise. Your e-mail service may not be set to display the entire name of an attached file. Many virus creators take advantage of this fact, creating lengthy names for their files in order to hide the actual file extension.)

Students who encounter any problems or have any reason to believe that there may be a problem, are encouraged to report the situation to library staff immediately.

Back to Top


Storage Devices

Students are expected to supply their own storage devices for work in progress.

Back to Top