The Basics

Clickers for Students

Does every class use the Audience Response System from Turning Technologies (“Clickers”)?

No, but all 1L LRW classes use them so each member of the 1L class will be issued a clicker during Launch Week.  1L clickers must be returned to the Law Library at the end of the Spring Semester to avoid the $50 Replacement Fee.

Upper division classes and other 1L classes may take advantage of this technology. Professors will inform their classes if a clicker is required. If you have a class that does require a clicker, go to the Law Library Public Services Desk and check one out for the semester.   Please return the clicker at the end of the semester and avoid the $50 Replacement Fee.

How Do I change the channel?

  1. Turning Technologies ResponseCard RF LCDPress channel (or CH) button
  2. Enter the new channel number
  3. Press channel (or CH) button again

The new channel number will appear in the screen

What Channel Do I need?

Unless otherwise noted by your instructor,each classroom has a separate channel:

Room # Channel #
Law Library Learning Lab 30
Classroom A 32
Classroom B 34
Classroom C 36
Classroom D 38
Classroom E 40
Classroom F 42
Classroom G 44
Mendenhall Appellate Courtroom 46
Darling Trial Courtroom 48
Seminar Room 1 50
Seminar Room 2 52
Seminar Room 3 54
Seminar Room 4 56

What if it needs a new battery or doesn’t work?

Come to the Law Library  Public Services Desk  or call thePublic Service Desk at 310-506-4643

How & When Do I Return It?

LRW students must return it to the Law Library Public Services Desk at the end of the Spring Semester. All other students must return it to the same location at the end of each term. A $50 Replacement Fee will be charged to students for unreturned clickers.

Law Guides

Law Library Law Guides is a collection of research guides prepared by librarians at the Harnish Law Library. These guides are specifically designed to assist library users with the research of certain subjects or for specific courses. For further assistance, you may contact the guide author or the librarian on duty. To access Law Guides go to:

The Most Popular Guide Topics:

  • Microsoft Word: Answers to Law Students’ Most Frequently Asked Questions
  • Foreign, Comparative, and International Law (FICL) Research
  • Clinical Law Research Guide
  • International Arbitration
  • Prepare for Legal Practice
  • Using the Law Library Catalog
  • National Security Law, Terrorism, and the Law of War

Additional Resources: Access the Home Page of Law Guides with important details of all of the law library services.


CALI & CALI Lessons

CALI Lessons IconCALI [The Center for Computer-Assisted Legal Instruction] is a  resource provided by Pepperdine School of Law for students that includes over 2,000+ interactive online tutorials written by law professors, on over 50+ topics. This includes, but is not limited to topics such as, 1L-First Year Lessons, 2L-3L Upper Level Lessons, Administrative Law, Tax Law, Constitutional Law, Legal Research, Property Law, Civil Procedure, and Environmental Law. These interactive tutorials are an excellent resource to enhance your studies. You may find that one or more of your professors will require you to use CALI lessons in the course of your studies.

CALI Password: In order to take advantage of the CALI interactive online tutorials, you will need to register with the CALI service.  You will need the institutional password to do so. The Pepperdine School of Law CALI password is available in the Law Library at the Computing Support Desk at the Public Services Desk.

CALI also provides additional services including (but not limited to):eLangdell Icon

HOTMAIL Banned: As of August 22, 2012 the CALI organization has banned Hotmail Email Accounts due to a large number of spam issues. If you used a Hotmail Email Account to log in to CALI you have the following two options:

(1) Send an email to with your name and a non-Hotmail email address that you wish to use with your CALI account.  The switch over will have to be done manually, so it’s entirely foreseeable that the process may get clogged up. If you want instant gratification and access….

(2) Create a new account using a non-Hotmail email address.  Please note, if you do choose this option, you will lose all access to previous lesson run information. You will also need to obtain a valid authorization code. Speak with someone at the Computing Support Desk at the Public Services Desk for this information.

Fax Services

Fax MachineA fax machine is available for student use (sending and receiving) between the Pharos Print Release Station and the Cannon Copier.

  • FAX NUMBER: (310) 506-4330
  • Instructions for sending a fax are located on the fax machine. If you have any questions, please speak with a Student Computing Support worker at the Public Services Desk.
  • Received faxes are placed in the bin below the fax machine.

Help Desk & Information Services

There are two places to get technology support here at Pepperdine. The University Help Desk and the Information Services SHIELD Desk located at the Front Desk of the School of Law Library.

University Help Desk (HELP)
The Pepperdine University Information Technology (University IT) department provides direct technical support for students via the University’s ‘Anytime’ Help Desk. In addition to providing technical assistance, the University Help Desk also acts as the central coordination point for School of Law technical services during the weekend. The University Help Desk is open 24/7 via phone and email at: 310-506-HELP (4357) or for the following issues:

School of Law Information Services Department (IS)
Information Services Department LogoThe Information Services Department is here to assist you with a variety of issues including, but not limited to, configuring laptops, multimedia reservations and training, School of Law web site, ExamSoft, and Email account training/usage. The IS team has offices in the School of Law Library to assist with technical support and is available between the hours of 8am-5pm (Monday-Friday). To contact the IS team, use the following contact methods:


Lexis-Nexis ( Lexis is an online legal research system used primarily by attorneys but also government agencies and other business professionals. The traditional version of Lexis, often called has been available online since 1999. In 2012, Lexis Advance (a new, enhanced) version of Lexis was released. You are given free access to Lexis. However, you will have to specifically request access to Lexis Advance by contacting the Lexis-Nexis rep, Ellie Javadi at:


Lexis-Nexis Advance Log In:

Register Your Password at Lexis-Nexis Instructions: In order to use Lexis-Nexis or Lexis-Nexis Advance, you will need to first register your activation code. You should have received your activation code at Orientation or via email (your Pepperdine account). If you feel that you have not received an activation code, email with the subject line: LEXIS NEXIS ACTIVATION CODE.

Additional Lexis-Nexis Resources: On the Lexis-Nexis law school homepage you can find tutorials and webinars that cover a variety of Lexis related topics. The tutorials are only 5 minutes long and the webinar recordings are from live events hosted online for students. They cover a variety of topics and range from 45 minutes to an hour.

**Please note: You will learn more about Lexis in your Legal Research & Writing course**


If you didn’t receive your LEXIS Registration ID, please email Gilbert Marquez with your Pepperdine Email at


Turnitin is a plagiarism detection service that Pepperdine School of Law faculty may use when you submit a paper for grading. This service provides a detailed assessment of originality on any submitted work by performing a search for textual similarities to other works in academic journals, on the Internet, and within its own database of submitted work. For more information visit the University’s Turnitin Community page.

If you are required to use Turnitin you will need to complete the following steps: (1) enroll in the course and (2) submit your work. If you have never used Turnitin before, you will also need to create a free account. This can be done through the home page on their web site.  Watch the video below for step-by-step instructions on how to enroll in a course and submit your work.

Law Library Catalog

20131108_112230The Law library can be one of the most valuable assets to you during your time in law school. It’s value goes beyond your law education, as it can be a great tool for such activities like Law Review and Moot Court as well as preparing for your careers as a whole. The catalog system contains records describing all the books, microforms, and journals in the law library and other selected libraries. Links are also provided which can take you directly to the web sites of other libraries both local and across the country.

The Law Library Catalog can be accessed via computers located throughout the Law Library.

Law Library Catalog:

Additional Law Resources can be found at:


Save Early, Save Often

For many, losing a document or a project that you’ve been working on for a while can be devastating. You put so much time and effort into your work and thanks to a mishap, it’s gone. Here are a few ways you can help prevent those kinds of catastrophes from effecting your productivity.

Save early: Make sure that you save as soon as you get started. I know it sounds dumb, but it can help get you back to the start quicker. You have your margins set and your font and header dialed in, just click save as and give it a name.


Save Often: About every 5 minutes is good. By doing this, you can avoid getting too far down the road before facing data loss or even a program freeze.

Set the auto save/recovery to on: Most casual users don’t realize that this feature is not always on. To do be sure it’s on,( in Word) click on the file tab, then click on the Options choice on the left. Select the Save tab on the left menu. Now you can edit how the document is saved from the file type, location and how often it is saved.

Avoid Confusing WIP Titles: WIP titles (Work in Progress) can get mottled and confusing. You want to create titles that let you know what exactly the document is or where you are at in it. For instance, I give my docs working titles such as, “Saving Docs- Draft 1” or “Saving Docs_draft_6-4-13″. Once my work is ready, I give it it’s final title: Best Practices for Saving Your Data_Final_6-5-13”. The last thing you want to do is get your titles mixed up and accidentally save over a new version with an old version.

Keep your system healthy: My father always taught me that if you take care of your equipment, it will take care of you. Same goes for computers, cars, appliances, etc. Don’t neglect your gear whether it’s keeping up on the latest software updates or cleaning out your air vents on your laptop. These things can build up and then take their toll one at a time or all together. Take your machine to some one you trust. A family friend, an authorized computer repair person or your department IT person. Just make sure you take it in. You may find that you need minor service or a major overhaul. The point is, not knowing is never better.


Be sure you keep these few steps in the back of your mind when working on your next major assignment. It could save your day.

Better Passwords

Some time ago Gilbert wrote a Password Quiz, warning users that they shouldn’t reuse passwords on multiple websites and services. This is fantastic advice. He even linked to some recommended Password Managers to help you keep your passwords safe while promoting good password practices. I’d like to go a bit further and offer you some tips about how to make good passwords.

Here’s the new thinking about passwords: for almost all accounts you should try to use padding to make passwords long, but easy to remember. And you should write down part of your passwords.

Are you skeptical? After all, this is very different advice than you’ve been given in the past. Technology experts are always insisting that crazy passwords like G5x$TrY&6 are the best way to keep your accounts secure. But with advances of technology and with the complexity of managing many different passwords, this conventional wisdom is officially out-of-date.

So, how do you  chose great passwords and write them down so that you never forget them, but never have to worry about them being unsafe?

First, come up with a key. This is the most important step of this process. You must pick a very short, but unusual, 3 or 4 letter word. You must never tell anyone this word. Never write this word down. This is your secret key to all your passwords.

Don’t pick something obvious. It shouldn’t be one of the 5000 Most Common English Words. You might think this is hard, but actually things like goo and bah work just fine as well as our good friend to the left: pony is a great word.

Once you have your key, then fulfill any password requirements the website or program require. So, if you need numbers or symbols add as necessary to comply with complexity requirements. Then pad the password. What is padding? Just fill in the remaining characters with a single symbol such as the letter a or a period.

What does this look like? For a website named that requires a letter a number and a symbol and allows 14 character passwords you type:

pony + 6 + # + ........

What do you write down? KoolStuff 6#.8

This seems complicated, but it isn’t. You have the website name and then you know to use your secret key, then type the next characters and then the last two characters are the padding. In this case, eight periods.

The point is that no one can figure out this password and since you can write it down you never need to memorize it. You can have a bunch of these on a slip of paper in your wallet. Even if your wallet got stolen, you’d be safe.

Now, the only exception you need to remember is that you should never use these high powered passwords on any low grade website. For low-grade websites (anything that only connects via http instead of https is a good indicator of low-grade security) you should just use an ordinary password and write it down on your cheat sheet. The key here is that you don’t want to give away your secret key word to a low-grade security site like a bulletin board or a blog.

Now you have new password super-powers! Because your passwords are long and because they take advantage of something called two-factor authentication, you have easy to use but highly secure passwords.