Information Sheet
Center for Information Services and High Performance Computing (ZIH)
Information leaflet on IT resources
1. Terms of Use
By using the ZIH resources, you agree to the rules of the ZIH of the Dresden University of Technology, the regulations on the handling of data networks and software as well as those of the copyright are recognized. Changes to the registered inventory data are to be reported immediately to the ZIH. The use of ZIH resources for non-university or commercial purposes is subject to approval. In particular, the provisions of the IT Regulations of the TU Dresden apply.
(Please note: The English translation is provided for information purposes only. The English text is not legally binding. Only the original German document has legalvalidity.)
2. Processing of Personal Data
On the basis of Section 14 (1) No. 1 of the Sächsisches Hochschulgesetz (Higher Education Act), the TU Dresden processes personal data for the purpose of studies at the tUD, resp § 14 para. 1 no. 5 SächsHSG i.V.m. § 37 para. 1 SächsDSG (Saxon Data Protection Act) for the purpose of carrying out a service or employment relationship, in particular the necessary use of university facilities.
The ZIH processes the following data according to the IT Regulations as well as the Order for the establishment and operation of an identity management system exclusively for the purpose of central administration of user data for authentication, provisioning and authorization for all facilities according to § 1 of the IT framework.
Group of persons affected | Attribute |
---|---|
Gesamter Personenkreis | Surname First given name Salutation Title Date of birth (except for definite allocation) Place of birth (except for definite allocation) Maiden name or birth name (except for definite allocation) Gender (except for definite allocation) User type (employee, student, guest) User name Password Login status (active, disabled) User ID (identification of Unix users) Home (Path to home directory) Shell (default shell) Group ID (belonging to Unix groups) Mail addresses (TU addresses) Mail quota Organizational entities |
Mitarbeiter der TU Dresden | Personnel number Accounting /Cost-center Employee status (active or beginning work in future) Contract Numbers Type of service |
Studenten der TU Dresden | Matriculation number Courses Semester (Current semester) Study status (backdated, on leave, ...) Service number (used to generate logins) |
1 1: University lecturer, 2: Research employee, 3: Administrative staff, 4: Technical personnel, 5: Employees, 6: Apprentices, 7:SHK, 8: WHK
This data will not be communicated to third parties. (Unless the user agrees to a transmission in an individual case or TU Dresden is legally obliged to do so.)
3. Login name and password
To use the resources of the ZIH, a user ID (login name and initial password) is generated and communicated to the user. This user identification is to be protected from misuse by third parties by a suitable, self-selected password.
4. Period of validity of the user ID
According to § 15 IT framework, the user identification is valid only for the specific time in which s/he belongs to the closed user group. On leave of absence, the registration office processes an automatic renewal of the user identification.
5. Costs
The general use of the user ID is currently free of charge. However, individual services (such as printing) are subject to charges.
6. Usage possibilities
- Use of the ZIH PC pools, the central login server, the campus network and the internet
- A personal mailbox, a central home directory including storage space for a personal homepages
- Connection to the internet by dialing into the TU Campus network (WLAN, possibility of encrypted access using VPN technologies)
7. General due diligence and user disclosure requirements
The user ID may only be used by the owner himself (pursuant to § 12 para. 2 of the IT framework regulations). The personal password is to be chosen according to the given security guidelines and to be kept secret to third parties. When recognizing bisuse of a user ID, the ZIH must be notified immediately. If the password is forgotten, the authorized user can temporarily leave a new password in the service desk of the ZIH, presenting the valid student ID and ID card. This is to be replaced as soon as possible by a self-appointed password.
8. Locked or deleted user ID
The ZIH locks / deletes a user ID:
(1) after the end of the affiliation to the closed user group pursuant to § 12 IT framework.
Explanation: According to § 12 IT framework, if the user is withdrawn from the closed user group, his login remains active for 14 days. After that, it is deactivated for 15 months (blocking pursuant to § 21 para. 1 no. 2 Sächs DSG) before it is finally deleted. The identity-revealing data of the user is stored in an encrypted manner, so that upon return to the closed user-group, the user can be enabled again with his old login and his e-mail address.
(2) at the request of the user
Explanation: if a user requests the blocking or deletion of his user ID during his membership of the closed user group, studies, employment or the employment relationship may also be restricted.
(3) With the knowledge of disclosure to or usage by third parties
(4) In the case of misuse or reasonable suspicion of misuse of services as stated in § 12 of the IT framework. In these cases section 12 of the IT Regulations is used.
Locked user ID can be released only after clarification of the facts at the Service Desk of the ZIH upon submission of the valid student ID and an ID card. In the cases referred to in paragraph 13, the relevant provisions of the IT framework apply.
9. Liability for damages
(1) Liability is determined by specific legal provisions. Particular reference is made to civil damage claims, copyright and trademark law. Criminal liability is also considered.
(2) The User is liable for all disadvantages that result from the abusive or unlawful use of computing, software and/or communication thecnology, as well as failure to comply with its obligations under this regulation.
(3) The user is liable for damages that have been caused by third parties when the user is responsible for their acces and use.
(4) The user has to release the TU Dresedn from any and all claims, if third parties use the TU Dresden because of an abusive or unlawful behavior of the user for damages, omission or in any other way.
(5) The user is liable for gross negligence and intent.
10. What constitutes misuse of a user ID?
Misuse of the user ID is defined as:
(1) A breach of relevant legislation and the provisions of the ICT framework (abusive conduct) ,
(2) The comuting and communication technology as well as the software of the TU Dresden are abused for criminal acts,
(3) The attempt is made to misuse the computing and communication technology and software of the TU Dresden for criminal acts,
(4) The TU Dresden is used for any type of unlawful user behavior.
The following criminal offenses are particularly important to note:
- Spying out data (§ 202a StGB)
- Data change (§ 303a StGB) and Computer sabotage (§ 303b StGB)
- Computer fraud (§ 263a StGB)
- Dissemination of pornographic representations (§ 184 StGB), in particular retrieval or possession of child pornography (§ 184 Abs. 5 StGB)
- Dissemination of propaganda means of unconstitutional organizations (§ 86 StGB) and incitement of the people (§ 130 StGB)
- Insults or defamanation (§§ 185 ff. StGB)
- Criminal copyright infringements, e.g. by copyright infringement and/or duplication of software (§§ 106 ff. UrhG)
Signed Prof. Dr. Wolfgang E. Nagel
Director of ZIH