Terms of Service
Präambel
The Bremen University of Applied Sciences (UAS Bremen) and its institutions (operato orsystem operato) operate an informationprocessing infrastructure (IP infrastructure) consisting of data processing equipment (computers), communication systems (networks) and further auxiliary IP facilities. The IP infrastructure is integrated in the German scientific network and accordingly in the world-wide Internet.The regulations for use specified below regulate the conditions under which the IP services can be used. § 1 Ambit These regulations apply to the IP infrastructure provided by UAS Bremen and its institutions. § 2 User Category and Responsibilities (1) The operators IP infrastructure is at the disposal of the members of UAS Bremen and beneficiary institutes of UAS Bremen for the fulfilment of their responsibilities in the areas of research, teaching, administration, training and further training, public relations work and publicity as well as other responsibilities described in the Bremen Higher Education Act. (2) Other persons and institutions may be granted permission to use the system. § 3 Formal Authorization for Use (1) The prerequisite for the use of the operators IP resources is the formal authorization for use, to be applied for from the responsible system operator. Services provided for anonymous access (e.g. information services, library services, temporary guest ID codes for conferences) are exempt from this prerequisite. (2) The system operator (4) The responsible system operator decides on the approval/rejection of the application. He may make the granting of authorization for use contingent on proof of certain knowledge about the use of the system. (5) The authorization for use can be denied if § 4 Obligations of User (1) The operators IP resources may be used for the purposes specified in § 2 (1) only. Utilization for other purposes, particularly those of a commercial nature, can only be permitted upon application and against payment. (2) The user is obligated to use the existing operation facilities (workplaces, CPU capacity, hard disk space, data line capacity, peripheral equipment and expendable material) in a responsible and economically sensible manner and to follow the instructions of the operators personnel. In particular, the user is obligated to refrain from any action that causes impairments to the operation to the extent that such impairments are foreseeable and, to the best of his/her knowledge, to avoid any action which can cause damage to the IP infrastructure or other users. The user shall report any malfunctions of the system to the system operator immediately. (3) The user shall refrain from all abusive use of the IP infrastructure. In particular, he/she is obligated : The authorization to install software is regulated in conjunction with the respective local and technical circumstances. § 5 Data Protection The user is obligated to coordinate any intentions to process personal data with the system operator before beginning. The provisions of the Data Protection Act are to be observed in any case. § 6 Responsibilities, Rights and Duties of the System Operator (1) The system operator keeps an ongoing record of the authorizations for use which have been granted. The related documents are to be kept for two years following the expiration of the authorization.. (2) The system operator informs the users of the identity of the contact person charged with attending to the users. (3) In an appropriate manner, in particular by taking regular samples, the system operator contributes to the prevention / exposure of abuse. (4) The system operator is entitled (5) The system operator is obligated to treat information in due confidence. (6) In the context of communication with the computers and networks of other operators, the system operator is obligated to observe the guidelines of the latter for use and access.. § 7 System Operators Liability / Exemption from Liability (1) The system operator must furnish no guaranty that the systems functions will correspond to the users special requirements or that the system will operate without defects or interruption. (2) The system operator cannot guarantee the intactness and confidentiality of the data stored in his system.The system operator is not liable for damages of any kind resulting from the users utilization of the IP resources unless provided for imperatively by legal stipulations. § 8 Consequences of Abuse or Illegal Use (1) In the case of violation of legal provisions or of the provisions of these Regulations for Use, in particular of § 4 (Obligations of User), the system operator can limit or revoke the users authorization for use. (2) In the case of grave or repeated violations, a user can be permanently barred from the use of all IP resources of UAS Bremen. (3) In the case of violations of legal provisions or of the provisions of these Regulations for Use, UAS Bremen explicitly reserves the right to initiate legal proceedings and pursue civil liability claims. § 9 Other Regulations (1) ees for the use of IP resources can be fixed in separate regulations. (2) Supplementary or divergent regulations for use can be fixed for certain systems if necessary. Supplement to the Regulations for Use of the Information Processing System of the Bremen University of Applied Sciences: On October 7, 2002, the academic senate of the University of Applied Sciences of Bremen adopted the following Supplement to the Regulations for Use of the Information Processing System of the University of Applied Sciences of Bremen adopted on October 12, 1998. The following regulations apply to the operation and use of radio networks: 1. Definition of Terms: On the basis of radio technology, a Wireless Local Area Network (WLAN) connects WLAN access points and computers equipped with WLAN interfaces (primarily notebooks with WLAN-PCMCIA cards). The WLAN is connected to the university Network. 2. Supplement to the Regulations for Use of the Information Processing System of the Bremen University of Applied Sciences:< 3. Responsibility : 4. Security Measures :
(3) The application for formal authorization for use shall contain the following information :
The system operator may request further information only to the extent necessary for the approval of the application.
(6) The authorization for use entitles the user to carry out work related to the use uthorization for use entitles the user to carry out work related to the use applied for only.
(4) Without the consent of the responsible system operator,
5. Prerequisites and Pointers for the Use of the WLAN: