Gemeinsame Systemgruppe IfI/b-it

This translation is older than the original page and might be outdated. See what has changed.
Translations of this page:

You are here: aktuelles » en » useragreements » datenverarbeitung

En:useragreements:datenverarbeitung

This is an old revision of the document!


FIXME This page is not fully translated, yet. Please help completing the translation.
(remove this paragraph once the translation is finished)

User Guidelines for Data Processing

Please note, this translation is for your convenience only. By accepting it, you legally accept the German version (Benutzungsordnung für die Datenverarbeitungsanlagen) of this document.

By requesting a user ID, you have agreed to our terms of usage (german only, PDF-file). You will be informed about changes by email.

I General

(1) Scope of application

The data processing equipment at the Institute for Computer Science encompass the institute's central computers. These are Unix computers of diverse manufacturers and the PCs in the computer pools. Also the computers of the institute's various departments as well as devices for data-communication.

(2) Competences

The central computers and data-communication devices, as well as the computers of the departments I, II and IV are the responsibility a system group. The computers of other departments are the responsibility of their respective system groups.

(3) General Operating Rules

The modalities for using the data-processing sites are defined in the operating rules.

This especially governs access rights and limitations for data-processing resources, e.g disk space, computation power, communication bandwidth and limits as well as printers.

Access to the Unix computers is as a matter of principle permitted via modem as well.

(4) Fees

With the exception of cost sharing when using the printers, no fees are imposed. Only actual operation costs are imposed when printing. The procedure to deposit into the printing account is described in the printer operating guide.

II Authorization Regulations

(1) Authorized Users

Authorization to use the institute's data processing resources is granted to:

  • members and affiliates of the institute of computer science
  • members and affiliates of the University of Bonn with special contracts
  • other individuals based on the proper system group's judgement

Computer Science majors are entitled to receive a Unix account starting with the third semester.

(2) Authorization process

Permission to use the central Unix computers and to receive a Unix account is granted by the proper system group following a written request. The permission is usually valid for one academic year (starting in the winter term) and has to be renewed thereafter.

For an application, the following information has to be supplied:

Matriculation number, semester, given name and surname, home address, phone number.

On requesting a renewal, the Unix account name is to be supplied.

The application is only valid if signed by the applicant. The applicant agrees that their information is stored by signing the application form.

The systems group is to be informed immediately if any of these information change.

The user request is done in an automated process. The process is detailed in its own notice.

Usage of a department's computers is governed by the respective department.

PCs in the PC-Pool are only to be used to courses or by permission of the proper system group.

(3) Deregistration

If the basis for authorization is lost, e.g. after removal from the register of students, the system group is to be informed immediately. The user account will be removed then.

If an account is not renewed by the November the 15th, the account will be disabled and deleted at the end of the semester.

The user's personal information and any files on their account will be deleted as well.

(4) Exclusion

If a user violates the terms of use or severely disrupts the operation of the data processing devices, the system group or proper head of department can temporarily or permanently revoke that users access. The user has to be informed about the reasons in written form. They can ask the institute's director for mediation.

III Terms of use

(1) Users Responsibilities

The users have to:

  • obey the terms of use and proper user guidelines
  • inform themselves about these rules
  • handle devices, data media et cetera with care, also report problems, defects and errors to the proper system group immediately
  • obey copyright laws, especially not copying provided software without explicit permission (except for software provided via the central FTP archive)
  • prevent other parties from using their account, using safe passwords
  • not attempt accessing other users data, especially passwords, unless they explicitly allow this
  • grant the head of the institute (and authorized employees) access to their data
  • covering their print account and immediately balance out impositions
  • prevent disrupting the operation of devices and the work of other users
(2) Inspection measures

System group employees are permitted to gather, store and process data about the usage of resources, especially in relation to user accounts, in order to keep operations working properly.

Singular users' data, input and communication may be monitored by the system group in individual cases to ensure proper operation of services. This information will only be stored for as long as it is necessary to keep operation safe.

IV Rechtsvorschriften

(1) Datenschutz

Die für den Betrieb der DV-Anlagen verantwortlichen Mitarbeiter stellen sicher, dass personenbezogene Daten nur dem dazu autorisiertem Personal zugänglich sind.

Die Speicherung, Verarbeitung und Weitergabe personenbezogener Daten erfolgt im Rahmen des DSG NW (Datenschutzgesetz Nordrhein-Westfalen).

Mit der Antragstellung erklärt sich der Benutzer damit einverstanden, dass

  • seine Antragsdaten gespeichert und verarbeitet werden können;
  • Abrechungsdaten erhoben werden, die seiner Benutzerkennung zugeordnet werden können;
  • Einzelangaben über seine Rechnernutzung allgemein zugänglich sind, soweit diese vom Betriebssystem automatisch erfaßt und zugreifbar gemacht werden (z.B. die Unix Kommados finger, who, last).

(2) Mißbrauch

Der Benutzer wird hiermit ausdrücklich darauf hingewiesen, daß die unberechtigt vorgenommene Veränderung von Daten nach § 303 StGB strafbar ist und die Mitarbeiter der Systemgruppe verpflichtet sind, ihnen zur Kenntnis gelangte strafbare Handlungen anzuzeigen.

In besonders schweren Fällen trifft dies ebenso für Störungen des Betriebsablaufes zu.

(3) Haftung

Unbeschadet der strafrechtlichen Verfolgung haftet der Benutzer für die von ihm schuldhaft verursachten Schäden an den DV-Einrichtungen des Instituts und für Schäden, die aus Verstößen gegen Rechtsvorschriften und den Bestimmungen dieser Ordnung resultieren.

Jegliche Haftung des Instituts wegen fehlerhafter Funktion der technischen Einrichtungen oder der Programme oder wegen inhaltlich falscher Ergebnisse ist ausgeschlossen.

V Sonstiges

(1) Benutzerinformation

Die Benutzer werden von der Systemgruppe über Ereignisse, die im Zusammenhang mit dem Betrieb und der Nutzung der DV-Anlagen stehen, vorzugsweise auf elektronischem Weg (E-mail, /etc/motd) informiert.

Insbesondere werden Benutzungsordnungen und Betriebsregelungen in rechnergestützten Informationsdiensten allgemein zugreifbar gehalten (z.B. gopher, siehe dort Benutzerinformation).

Weiterhin erhält jeder Benutzer eine E-mail Adresse. An diese werden Nachrichten von der Systemgruppe gesandt, die von besonderer Bedeutung sind (z.B. Warnung, das eine Benutzerkennung ausläuft).

Daneben gibt es E-mail Adressen, die alle oder mehrere Benutzer gleichzeitig ansprechen. Diese Sammeladressen sollten nur in Ausnahmefällen benutzt werden.

(2) Inkrafttreten

Die Benutzungsordnung tritt mit Wirkung vom 20. Januar 1994 in Kraft.

Ausgefertigt aufgrund des Beschlusses des Institutsvorstandes des Instituts für Informatik.