User regulations

University of Erlangen-Nuremberg
-Senate Commission for Computing Facilities-

User guidelines
for Information Processing Systems at the University of Erlangen-Nuremberg
Status: June 1, 1995

  • Scope of Application of the Usage Guidelines

These usage guidelines apply to computer systems (computers), communication networks (networks) and other auxiliary facilities for information processing which are kept available at the Regional Computer Centre Erlangen (RRZE) and at the University of Erlangen-Nuremberg in general within the framework of the tasks assigned to the universities by law (cf. Art. 2 BayHSchG) for the purpose of information processing. They regulate the modalities of the use of these facilities, in particular the rights and duties of the users as well as the tasks of the system operators.

  • Authorised Universities

Authorised universities are
– with regard to the RRZE facilities, the Universities of Erlangen-Nuremberg, Bamberg and Bayreuth as well as the Universities of Applied Sciences Coburg and Nuremberg,
– with regard to the other facilities, the University of Erlangen-Nuremberg.

  • circle of users
  1. the facilities named in No. 1 shall be available to members of the universities entitled to use them. Other persons may be permitted to use the facilities.
  2. members of the University of Erlangen-Nuremberg either contact the RRZE or the organisational unit responsible for them.
  • Formal authorisation to use

Anyone wishing to use facilities in accordance with No. 1 shall require a formal authorisation to use from the competent system operator, with the exception of anonymous services.

The system operators for

  1. central systems the RRZE
  2. decentralised systems the responsible organisational units such as faculties, institutes, operating units, chairs and other subunits of the University of Erlangen-Nuremberg.
  3. the application for a formal user authorisation must contain the following information:
    – Operator/institute or organisational unit
    – System
    – User name and address
    – Rough details of the purpose of use, e.g. study/diploma thesis, research project, training/teaching
    – a declaration that the user accepts the usage guidelines
    – Entries for information services of the university (e.g. X.500)

    The system operator may only request further information if it is absolutely necessary for the decision on the application.
  1. The responsible system operator shall decide on the application. He may make the granting of the user authorisation dependent on proof of certain knowledge about the use of the system.
  2. The authorisation to use the system may only be refused if
    1) there appears to be no guarantee that the applicant will fulfil his obligations as a user
    2) the capacity of the facility for which use is requested is insufficient for the intended work due to an existing workload;
    3) the project is not compatible with the purposes pursuant to No. 5 (1).
  3. The right of use only entitles the holder to carry out work in connection with the use applied for.
  • General obligations of the user

The facilities according to No. 1 may only be used for the purposes determined by law. Use for other purposes, in particular private or commercial purposes, may only be permitted on application and against payment.

The user is obliged,

  1. To ensure that he/she uses the available operating resources (workstations, CPU capacity, disk storage space, line capacities) responsibly, as their availability is limited;
  2. To work exclusively under his or her own user ID;
  3. To protect access to the facilities by means of a secret password or an equivalent procedure;
  4. Take precautions to prevent unauthorised third parties from accessing the facilities; this includes in particular avoiding primitive, obvious passwords, changing passwords more often and not forgetting the „logout“;
  5. When dealing with other operators‘ computers, to strictly observe their user and access policies.

The user bears full responsibility for all actions taken under his/her user ID.

  • further duties of the user

a) The user is obliged

  1. As a matter of principle not to use any software other than that developed by himself or made available by the system operators;
  2. To observe the conditions under which the software, some of which has been acquired within the framework of licence agreements, is made available,
  3. In particular, not to copy or pass on software, unless it is specially marked as freeware, nor to use it for purposes other than those permitted, in particular for non-commercial or private purposes.

b) Without the consent of the responsible system operator, the user is prohibited from

  1. Install software other than that provided,
  2. To interfere with the hardware installation,
  3. Change the configuration of the operating systems or the network.

c) The user is obliged to coordinate a project for the processing of personal data with the system operator prior to commencement. This does not affect the obligations arising from the provisions of the Data Protection Act. 4.

d) The user is obliged to observe relevant guidelines on use, such as the guidelines on the use of networks and on ethical and legal issues of software use.

e) Each user is responsible for the effects of the programmes he or she runs. He/she shall inform himself/herself sufficiently about the effects beforehand.

  • Liability of the system operator/disclaimer
  1. The system operator does not guarantee that the system functions will meet the user’s specific requirements or that the system will run error-free and without interruption.
  2. The system operator shall not be liable for damages of any kind incurred by the user from the use of the facilities according to No. 1, with the exception of intentional conduct of the system operator or the persons he uses to fulfil his tasks.
  • Consequences of improper or unlawful use
  1. In the event of violations of legal regulations or of the provisions of these usage guidelines, in particular in the event of
    – misuse of the facilities according to No. 1 for purposes other than those permitted,
    – Exploration of other people’s passwords,
    – attempts to break into other people’s systems, databases or computer networks, or
    – infringement of copyrights
    the system operator may restrict or withdraw the user authorisation as long as proper use by the user does not appear to be guaranteed. It is irrelevant whether the violation resulted in material damage or not.
  2. In the event of serious and repeated violations, a user who cannot be expected to comply with the conditions of use due to his or her behaviour may be permanently excluded from the use of all facilities according to No. 1. The decision is made by the RRZE for the entire scope of these usage guidelines.
  3. Notwithstanding the decisions according to paragraphs 1 and 2, criminal law steps and civil law claims shall be examined. The system operators are obliged to report facts that appear significant under criminal law and civil law to the legal department of the ZUV, which shall examine the initiation of appropriate further steps.
  • Tasks of the system operators
  1. Each system operator shall keep documentation on the granted user authorisations and resource allocations (privileges, resources). The documentation shall be kept for at least two years after expiry of the authorisation. The system operator is obliged to maintain confidentiality.
  2. Before agreeing to the installation of third-party software desired by the user, the system operator must check whether it is harmless with regard to system protection and whether the user is entitled to use it with regard to property rights.
  3. The system operator is entitled,
    1) to document the activities of the users, insofar as this appears necessary for the prosecution of cases of error and misuse;
    2) to take a look at a user’s data if concrete suspicion points to misuse of the facilities.
    In addition, the system operator is entitled to carry out random checks to ensure that the facilities are not being misused.
  4. The system operator shall make known the contact persons for the support of its users; if necessary, it shall issue additional, supplementary user guidelines.

Thomas (e-mail: Bernd.Thomas@rrze.uni-erlangen.de), December 1999


Student Union Erlangen Nuremberg
Institution under public law
Dept. Stud. HousConnection of the student residences to the network of the RRZE
(Regional Computing Centre Erlangen) of the university and to the interneting, Construction and Technology

Connection of the student residences to the network of the RRZE
(Regional Computing Centre Erlangen) of the university and to the internet

User conditions

  1. The user is aware of the user guidelines for information processing systems of the University of Erlangen-Nuremberg, Senate Commission for Computing Facilities, currently valid version of 02 June 1995, and recognises them as binding. In particular, the user is aware of the general and further duties of the user (sections 5 and 6), the provisions on liability and the consequences of improper or unlawful use (sections 7 and 8). Any attempt at misuse will be punished.
  2. In addition, the RRZE may issue further terms of use at any time if it deems this to be necessary for the regulation of an orderly course of operations.
  3. The user authorisation can only be granted if the applicant can present a valid access to the RRZE. If this access is no longer valid for any reason, the applicant must immediately inform the local administrator team (the representative of the head of the hall of residence). In addition, the RRZE is also entitled to notify the Student Union or the administrator team of such information.
  4. The user agrees that in the event of any violations of these usage guidelines or in the event of misuse, the usage authorisation will expire immediately. It is at the discretion of the Studentenwerk or its representatives in the administration team to reissue the usage authorisation if the conditions for this are guaranteed. Under no circumstances is the user entitled to compensation or a reduction in rent.
  5. Only the tenant of the Studentenwerk in person who is simultaneously enrolled as a student at one of the universities supervised by the Studentenwerk is entitled to use the facilities. The right of use ends when the student leaves the university. The user must ensure that other persons who are not entitled to use the facilities for the same reason as he or she is – for example subtenants or visitors – remain excluded from use.
  6. The Studentenwerk or the team of administrators or individual administrators accept no liability whatsoever, for example for unlimited or complaint-free use, or for possible damage or changes to the user’s equipment or software. The user is responsible for the security of his/her own data.
  7. In particular, if sufficient support or monitoring by volunteer administrators on site is not guaranteed, for technical reasons or to avert danger, the Studentenwerk may at any time and without notice bring about the immediate suspension of network operation without replacement.
  8. Each user is responsible for the content of his or her public data (especially WWW pages). Commercial use is not permitted.
  9. The responsible dormitory manager and the local team of administrators may, in consultation with the Studentenwerk, issue supplementary further locally valid usage guidelines if this appears to be necessary to ensure proper operational procedures.
  10. By signing the co-contract, the tenant accepts these conditions of use for the duration of this tenancy agreement and any subsequent tenancy agreements.

Supplementary user regulations
for the EDP network of the student dormitory
Dutzendteich 8 and 10
Status 11.10.2012

1.Scope of application

These usage guidelines apply to computing facilities and communication networks of the student residence Dutzendteichstraße 8 and 10, in Nuremberg. They regulate the modalities of the use of these facilities, in particular the rights and duties of the users, as well as the tasks of the system operators.

2. Circle of users

The facilities mentioned in No. 1 are available to residents with a valid tenancy agreement and to the facilities of Dutzendteichstraße 8 and 10 student residence.

3. Formal authorisation to use

  1. Anyone wishing to use facilities according to No. 1 requires a formal user authorisation from the responsible system operator.
  2. System operators are:
    – the RRZE of the University of Erlangen-Nuremberg
    – the Studentenwerk Erlangen-Nürnberg, represented by the local working group of the residents of the student dormitory Dutzendteich 8 and 10 (hereinafter referred to as the administrator team).
  3. The application for a formal user authorisation is submitted to the local administrator team. The user must fulfil the requirements according to the terms of use of the Studentenwerk Erlangen-Nürnberg No. 3 and No. 5.
  4. The application must contain the following information:
    – Name, first name
    – Room number

By signing, the user accepts the user guidelines of the University of Erlangen-Nuremberg (Senate Commission for Computer Systems) for information processing systems of the University of Erlangen-Nuremberg, as of June 2, 1995, user conditions of the Erlangen Nuremberg Student Union, Public Law Institution, Dept. of Stud. Housing, Construction and Technology, as of April 20, 2000, as well as the Supplementary User Regulations for the EDP Network of the Student Residence Dutzendteich 8 and 10, 90478 Nuremberg, as of April 26, 2000, and agrees to the electronic storage and processing of his/her data for internal administrative purposes. The signature is legitimised by the presentation of a valid official photo ID.

5. The system operator decides on the application.
6. The right of use may only be refused if
– it does not appear guaranteed that the applicant will fulfil or has not fulfilled his obligations as a user.
– the capacity of the facility for which use is requested is insufficient due to an already existing capacity utilisation.

4. General obligations of the user

  1. The facilities according to No. 1 may only be used for the purposes determined by law. Use for other purposes, in particular commercial purposes, is not permitted. 2.
  2. The user shall bear full responsibility for all actions taken under his/her user ID. This also applies in the event of use by third parties enabled by the user.
    All legal provisions (Federal Data Protection Act, licensing and copyright laws, Information and Communication Services Act, Teleservices Act, etc.) apply without restriction and must be complied with.
  3. The user is obliged,
    – To ensure that he/she uses the available operating resources (CPU capacity, disk storage space, line capacities, etc.) responsibly, as they are only available to a limited extent.
    – To work exclusively under his or her own user ID.
    – Protect access to the facilities with a secret password or equivalent.
    – To take precautions to prevent unauthorised third parties from accessing the facilities; this includes in particular avoiding primitive, obvious passwords and changing passwords frequently.
    – When dealing with other operators‘ computers, to strictly observe their user and access policies.

5. Further obligations of the user

  1. The user is prohibited from interfering with the hardware installation of the network without the consent of the responsible system operator.
    – Interfere with the hardware installation of the network.
    – To change the configuration of the operating systems or the network.
  2. The user is obliged to observe relevant guidelines on the use of networks and on ethical and legal questions of software use.
  3. Every user is responsible for the effects of the programmes he or she runs. He/she must inform himself/herself sufficiently about the effects beforehand.

6. Liability of the system operator / exclusion of liability

  1. The system operator does not guarantee that the system functions will meet the user’s specific requirements or that the system will run error-free and without interruption.
  2. Furthermore, the system operator assumes no guarantee for the security of the stored data.
  3. The system operator is not liable for damages of any kind incurred by the user from the use of the facilities according to No. 1.

7. Consequences of improper or unlawful use

  1. In the event of violations of legal regulations or of the provisions of these usage guidelines, in particular in the event of
    – misuse of the facilities according to No. 1 for purposes other than those permitted
    – Exploration of other people’s passwords
    – attempts to break into other people’s systems, databases or computer networks
    – infringement of copyrights
    The system operator may restrict or withdraw the user authorisation as long as proper use by the user does not appear to be guaranteed. It is irrelevant whether the violation resulted in material damage or not.
  2. In the event of serious and repeated violations of the user regulations, a user who cannot be expected to comply with the conditions of use due to his or her behaviour may be permanently excluded from the use of all facilities according to No. 1. The decision shall be made by the system operator for the entire scope of these User Regulations.

8. Tasks of the system operator

  1. The system operator shall keep documentation on the granted user authorisations and resource allocations (privileges, resources). These documents shall not be kept or stored longer than absolutely necessary for administrative purposes. The system operator is obliged to maintain confidentiality.
  2. The system operator is entitled to
    – to document the activities of the users insofar as this appears necessary for the prosecution of cases of error and misuse.
    – to inspect the user’s data if there are concrete grounds for suspicion that the facilities are being misused.
    Furthermore, the system operator is entitled to carry out random checks to ensure that the facilities are not being misused.
  3. The system operator shall make known the contact persons for the support of its use.

These usage guidelines can be consulted:

  • on the WWW at http://www.en.stuwodu.de
  • in printed form at the system administration in Dutzendteichstr. 8 ground floor,
  • and from the caretaker at Dutzendteichstr. 10 ground floor.