The IT-department of the "Trier University of Applied Sciences" is operating the university-wide IT-infrastructure for studies, research, and administration. The facilities, IT-systems, data networks, and services are available for every member of the "Trier University of Applied Sciences" in accordance with the available capacities.
The user rules ensure an error-free, unimpeded, and safe usage of the entire, centrally maintained IT-infrastructure of the "Trier University of Applied Sciences". The user rules are guided by the duties and services defined in the organizational rules for the IT-departments.
The user rules maintain basic rules for the proper operation of the IT-infrastructure. Furthermore, they clarify the relationship between the user and the IT-department. In case of questions, suggestions, or complaints, the user has the possibility to contact service members or the management of the IT-department at any time.
a) to acquire the necessary skills to be able to use the IT-systems and services offered by the IT-departments correctly;
c) to use the given user-ID exclusively for himself/herself in accordance to work-related purposes or studies for the “Trier University of Applied Science” and/or cooperating organisations and institutions;
d) to prevent potential abuse of his or her user-ID, more particularly not to share the own password with third parties and to choose an appropriate password, which is not easy to be guessed;
e) to protect personal programs and data of abuse by making use of the defence mechanisms of the particular system;
f) to ensure either by oneself or with help of a responsible supervisor that every used computer within the IT-department is updated to the latest available version of the particularly used system, including an activated and constantly updated virus protection as well as all security-related updates and patches being installed;
g) to appropriately use every issued device, system, medium, or facility within the IT-departments and to leave the workspace clean and organised;
h) to treat other users with respect and to treat the available resources of the IT-department with consciousness;
i) to immediately report any issues, damages and problems with any device, system, medium, or facility within the IT-departments;
j) to follow instructions of the responsible employees of the IT-departments while using the workspaces and facilities;
l) to coordinate intentions of editing personal data with the responsible system operater beforehand. Excluding obligations occurring as a result of the regulations of the data protection law;
m) to follow the applicable law, especially applicable terms of the criminal law;
n) not to disturb courses taking place in the workspaces of the IT-departments or impede them by blocking resources (cf. §4 bullet number 5);
o) not to install third-party software on any computer of the IT-department without approval of the responsible supervisor;
p) to never access services offered by the IT-department by using another user-ID besides the user-ID uniquely assigned to him or her;
q) not to attempt to gain unauthorised access to protected, encrypted or not publicly accessible data;
r) not to use protected, encrypted or not publicly accessible data, to which he or she accidently gained access to, neither for him or herself, nor to pass it on (for example transferring licensed software to a personal computer);
s) not to attempt any repair work on its own due to any issues, damages and problems with any device, system, medium, or facility within the IT-departments;
t) not to eat, drink (excludes clear water), or smoke while staying in the facilities or making use of workspaces provided by the IT-department.
a) Spying out other passwords or personal data (§202 StGB);
b) Unauthorised changing, deleting, supressing, or disabling of data (§303 StGB);
c) Computer sabotage (§303 StGB) or computer fraud (§263 StGB);
d) Promoting the distribution of propaganda of unconstitutional organisations (§86 StGB) or racist ideas (§131 StGB);
e) Spreading or receiving documents of pornographic content (§184, article 3 and article 5 StGB);
f) Receiving or being in possession of documents including child pornography (§184, article 5 StGB);
g) Defamation like libel or slander (§§ 185 ff. StGB).
a) Every member of the “Trier University of Applied Sciences” is eligible to demand an IT-device, being used for work-related tasks or studies as well as research and administration, getting connected to the IT-Network of the “Trier University of Applied Sciences”. The connection of this IT-device will be performed by the IT-departments based on available possibilities and state-of-the-art standards.
b) In case of the device not being administrated by the IT-departments, the user has to take care that the device that is getting connected has all required hardware, software and security systems installed. The IT-departments give recommendations and help in the selection of appropriate components.
c) The administrative data received with the connection (such as IP-address, computer name, network masks etc.) of a device are to be treated as the user ID. In particular, the administrative data is only to be changed upon approval by the IT-departments.
a) In accordance with state-of-the-art technology, the administrator of a terminal device has to guarantee that the connection of the device to the network can´t cause danger or damage to other network participants or devices connected to the network. The user is obliged to keep the operating system software as well as anti-virus software up to date at any time.
b) The provider of a terminal device has to ensure that only authorized individuals make use of the network services available through the device and that they follow these user rules. Necessary arrangements have to be made to be able to prove if and when other individuals besides the providers made use of network services using the terminal device.
c) The IT-departments are entitled to temporary shutdown network components or remove devices from the network in consultation with the users to do tests and maintenance work and conduct troubleshooting.
d) Preserving integrity is the users’ responsibility. The IT-departments take no responsibility for the accuracy of the transferred data.
e) For the joint use of networks the respective applicable regulations and rules have to be followed.
a) to operate security systems (such as alarm systems, video recording, entrance control) in order to keep the systems, devices and facilities safe and analyse personal data and information in case of damage. Possible involvement of staff council happens according to existing service agreements;
b) to check on and analyse data and programs of the users for test purposes if company interests are touched (e.g. in case of operations disruption or reasonable suspicion of misuse), in accordance with the data protection laws;
c) to save personal data that are required in order to issue a user-ID or to offer IT-services (cf. §3, article 2 and 3);
d) to publish name, surname, field of study/department and Email-address of a user by using electronic information systems;
e) to ask users for their work, utilized programs and methods;
f) to release further user rules as well as temporary priorities or set restrictions in order to ensure optimal securing of the services offered by the IT-departments;
g) to temporary put certain IT-services out of operation due to test purposes or technical changes and improvements;
h) to withdraw the user-ID and usage authorization of IT facilities and services of users who are violating these user rules (cf. §8);
i) to develop damage and risk prevention systems, based on automated data analysis, not including systems using personalised methods (such as SPAM-categorising and anti-virus scans of emails).
a) to support the users of the services and facilities (cf. §6) of the IT-departments in consideration of the available capacities and to the best knowledge and believe. The users’ responsibility for the technical content as well as the factualand computational accuracy of the achieved results remains unaffected;
b) to operate the IT-systems in consideration of economical, technical and organizational aspects for the user in the best possible way;
c) to take organizational measures to avoid loss of data, as well as unauthorised access, use or processing of data, in particular, unauthorised access to personal data;
d) to take reasonable steps to prevent further violations of current laws or the user rules in case of violations as mentions become known;
e) to inform the affected users in time in case of interventions in the availability of IT-systems, as well as in case of use of personal data and programs;
f) to record basic processes and consequences of data-analysing methods (cf. §7 article 1i ) and to inform affected users.
In case of violation of these user rules, current law, or further rules of the Trier University of Applied Science – as far as they affect the IT-departments – disciplinary measurements can be executed, irrespective of any further considerations:
A user affected by exclusions 1-4 as listed above, may object to the exclusion in written form at the manager of the responsible IT-department. The president decides about the objection after consulting the affected user as well as the manager of the responsible IT-department.
These updated user rules, adopted by the senate committee of learning and teaching media, communication, and information supply of the Trier University of Applied Science become effective on November 18th of 2015.
Trier, November 19th 2015
The management of the Trier University of Applied Science