Skip to end of metadata
Go to start of metadata
Table of Content

(info) This policy applies to faculty, staff, students, and guests.


"The University's computer and information network is a continually growing and changing resource that supports hundreds, soon to be thousands of users and systems. These resources are vital for the fulfilment of the academic, research and business needs of the University community. Their use is provided as a privilege. In order to ensure a reasonable and dependable level of service, it is essential that each individual user exercises responsible, ethical behaviour when using these resources. Misuse by even a few individuals has the potential to disrupt University business and the academic and research work of Jacobs University's users." – General Policy Governing the Appropriate Use of Computer Resources

Therefore, the use of Jacobs University's data network is only acceptable, if the following requirements are met by the individual and the employed technology.


For the use of privately owned computers within the Jacobs University data network, the following requirements exist:


  • The operating system and all employed software must be held up-to-date.
  • A functional virus scanner must be installed and used, and the corresponding virus data must be held up-to-date.
  • Only functional and standard-compliant cabling must be used.
  • No physical force is to be used against any equipment.
  • Software provided by Jacobs University to the user must be removed from the user's machine(s) upon finally leaving Jacobs University, as required by the respective license agreement of the installed software.


Compliances with the various regulations of Jacobs University as well as any applicable law, especially including, but not limited to:

(info) Other regulations are available on the Policies page.

The following procedures must be accepted by the user:


Please see User Support Services.

Document History

This is an adapted copy of a PDF document available on the IRC-IT page since 2005-02-18.


  1. Is a virus scanner also required on Linux systems? If yes, where can I get one? If no, could you please change the legally binding form of this regulation such that we Linux users can get out of the legal grey area?

    1. Is a virus scanner also required on Linux systems?

      The requirements are indenpendent of the operating system in use. Windows, Linux, MacOS, OS/2, FreeBSD, etc., are all covered by the requirements.

      where can I get one

      I suggest just searching for any. There are a lot of options. There is no official recommendation or requirement for a specific product.

      1. I do not understand how the IT department came up with that statement. Why would users of any operating system have to use a virus scanner? Why don't you just specify that the computer has to be without malware, i.e. is supposed to not distribute malware over the network?

        Also, if I for example forward an email containing a virus for Windows operating systems, how would I ever know of that? A virus scanner in a GNU/Linux environment, reasonably, does not scan for Windows viruses.

        I am a GNU/Linux user for 4 years now, and never have I had any processes running on my computer which I do not know of.
        This might be because I am not randomly executing scripts or binary blobs within root environment (having administrator rights even when surfing the internet is Windows land).

        I suggest to adapt the rules accordingly.

        1. As a Linux user who always installs security updates and does not surf as root, I agree with you in that the requirement should just be "free of malware". However, I disagree with your remark that Linux virus scanners don't scan for Windows viruses. Actually, that is one of the most common uses of virus scanners on Linux – scanning mails for Windows viruses. But such scanners usually don't run on desktop computers, but on mail servers (wink)

          1. Of course, you are absolutely right about that!

            In fact, I have found some virus scanners that do scan for Windows viruses on a Linux system. But that is really the last thing I would have running on my system. Why would I care that some people cannot keep their systems free of malware?

            1. Simple: You might want to interact with people have malware on their computers and afterwards interact with Windows users without malware. You might be the transporter of malware.

              A safe computer is one without keyboard, network access and I/O sockets, reagardless of the operating system.