Page path:
                                            
        - About us
 - Service groups
 - IT Department
 - User rules
 
User rules
User rules for scientific use of computer appliances and networks
I. General
In general all agreements of the Max Planck Society concerning data processing are valid.
§ 1 Tasks of the Computing Department
The tasks are to advise the co-workers of the Max Planck Institute for Marine Microbiology (MPI-MM) concerning hardware and software usage, and to maintain available computer appliances and networks in the institute.
§ 2 Demands of services
The computer appliances are described in manuals and notes. They are available for holders of user identifications. In the library documentation of software can be found. For assistance in solving computer problems a remote software (i. e. Timbuktu) can be activated by the user. The host is located in the Computing Department to avoid misuse.
§ 3 Usage authorised persons
All co-workers of the MPI-MM are authorised to use the computer appliances according to the Computing Department´s information from the institute´s administration. Guests are also authorised to use the services after confirmation of the institute´s management .
§ 1 Tasks of the Computing Department
The tasks are to advise the co-workers of the Max Planck Institute for Marine Microbiology (MPI-MM) concerning hardware and software usage, and to maintain available computer appliances and networks in the institute.
§ 2 Demands of services
The computer appliances are described in manuals and notes. They are available for holders of user identifications. In the library documentation of software can be found. For assistance in solving computer problems a remote software (i. e. Timbuktu) can be activated by the user. The host is located in the Computing Department to avoid misuse.
§ 3 Usage authorised persons
All co-workers of the MPI-MM are authorised to use the computer appliances according to the Computing Department´s information from the institute´s administration. Guests are also authorised to use the services after confirmation of the institute´s management .
II. User allowance for computer appliances and networks
§ 4 Application
Allowance to use computer appliances and networks will be given after written application.
The application must contain:
- Department or group.
- Name of applicant / user.
- User's signature.
- Confirmation of the application by the institute's administration..
- Information whether personal data according to Federal Data Protection Law §3 will be worked on.
§ 5 User allowance
User allowance will be given by the Computing Department creating a user identification and password. The user may change the password. Misuse according to the user rules will lead to withdrawal of the user allowance .
§ 6 Withdrawal of user allowance
If there is no application for prolongation, the user allowance will be withdrawn after the deadline of usage period. It will be withdrawn earlier according to users notification. All information and data will be deleted after passing the deadline of the user period.
Allowance to use computer appliances and networks will be given after written application.
The application must contain:
- Department or group.
- Name of applicant / user.
- User's signature.
- Confirmation of the application by the institute's administration..
- Information whether personal data according to Federal Data Protection Law §3 will be worked on.
§ 5 User allowance
User allowance will be given by the Computing Department creating a user identification and password. The user may change the password. Misuse according to the user rules will lead to withdrawal of the user allowance .
§ 6 Withdrawal of user allowance
If there is no application for prolongation, the user allowance will be withdrawn after the deadline of usage period. It will be withdrawn earlier according to users notification. All information and data will be deleted after passing the deadline of the user period.
III. Using of computer appliances and networks
§ 7 Institute internal rules 
For usage of the available applicances manuals, general security rules and institute internal rules have to be obeyed .
§ 8 Personal data
The responsibility for the protection of their personal data on the appliances of the institute´s network belongs to the user who saves this data.
§ 9 Personnel data
Working on personnel data the user is obliged to use protection methods (password protection) according to the Federal Data Protection Law. After publication of the institute´s data protection rules these have to be obeyed.
§ 10 Misuse
The users must obey the installed rules while working with the facilities of the institute´s network. Misuse of facilities and networks or offence against the installed rules will lead to immediate loss of the user identification.
The user has to take care that his / her user identification cannot be misused by others. Software and documentation directly or indirectly available for users may not be made available or used by third persons without confirmation of the Computer Department.
System and user software available for users may not be copied for usage on other computers without agreement of the holders of the copy right.
The user is obliged to install no system or user software and help programs on the computer appliances without confirmation of the Computer Department.
Users are obliged to delete all copies of public domain or shareware when the license period has passed.
For usage of the available applicances manuals, general security rules and institute internal rules have to be obeyed .
§ 8 Personal data
The responsibility for the protection of their personal data on the appliances of the institute´s network belongs to the user who saves this data.
§ 9 Personnel data
Working on personnel data the user is obliged to use protection methods (password protection) according to the Federal Data Protection Law. After publication of the institute´s data protection rules these have to be obeyed.
§ 10 Misuse
The users must obey the installed rules while working with the facilities of the institute´s network. Misuse of facilities and networks or offence against the installed rules will lead to immediate loss of the user identification.
The user has to take care that his / her user identification cannot be misused by others. Software and documentation directly or indirectly available for users may not be made available or used by third persons without confirmation of the Computer Department.
System and user software available for users may not be copied for usage on other computers without agreement of the holders of the copy right.
The user is obliged to install no system or user software and help programs on the computer appliances without confirmation of the Computer Department.
Users are obliged to delete all copies of public domain or shareware when the license period has passed.
IV. Final determination
§ 11 Violation 
The user rules for computer appliances and networks are included in the institute´s rules. Violation of above mentioned rules are subject to personal liability or may have personnel consequences.
§ 12 Period of validity
These user rules are valid until a new agreement has been made together with the co-workers advisary board.
§ 13 Coming into force
The usage rules for scientific computer appliances and networks come into force March 1st, 1996 .
The user rules for computer appliances and networks are included in the institute´s rules. Violation of above mentioned rules are subject to personal liability or may have personnel consequences.
§ 12 Period of validity
These user rules are valid until a new agreement has been made together with the co-workers advisary board.
§ 13 Coming into force
The usage rules for scientific computer appliances and networks come into force March 1st, 1996 .