(November 2002)


The University's computer and information network is a continually growing and changing resource that supports hundreds, soon to be thousands of users and systems. These resources are vital for the fulfillment of the academic, research and business needs of the University community. Their use is provided as a privilege. In order to ensure a reasonable and dependable level of service, it is essential that each individual faculty member, staff member, and student exercises responsible, ethical behavior when using these resources. Misuse by even a few individuals has the potential to disrupt University business, and, even worse, the legitimate academic and research work of faculty and students.

This policy outlines the application of the principles that govern our academic community in the appropriate use of University computer and information network resources. Because it is impossible to anticipate all the ways in which individuals may misuse these resources, this policy focuses on a few general rules and the principles behind them.

This policy applies to the entire user community (e.g., all faculty, staff, students, alumni and retirees) of the University and to the use of any and all University owned or managed computer-related equipment, computer systems, and interconnecting networks, as well as all information contained therein.

Use of Resources.

All users are expected to utilize University resources in a responsible manner consistent with University policies and the guidelines and operating policies that Academic Council may issue from time to time. You are expected to take reasonable measures to ensure that traffic entering the Jacobs University network from other networks conforms to this policy. Conversely, you are expected to take similar measures to avoid situations where traffic from the Jacobs University network violates the policies of connecting networks.

The unauthorized use of resources is prohibited and, in many cases, may be violations of the law. We are guided by the law in noting that unauthorized use includes, but is not limited to the following types of activities.

1. Harassment or threats to specific individuals, or a class of individuals:

2. Interference or impairment to the activities of others:

3. Unauthorized access and use of the resources of others:

4. Damage or impairment of University resources:

5. Unauthorized commercial activities:

6. Violation of the laws of the City of Bremen or of the Federal Republic of Germany:

When Inappropriate Use of Computer Resources Occurs

The use of University resources is a privilege. The resources have always been, and will remain, the property of the University.

It is your responsibility promptly to report any violation of this policy or other University policy or guideline. In addition, you must report any information relating to a flaw in or bypass of resource security to irc-director@jacobs-university.de.

Reports of unauthorized use or misuse of the resources will be investigated pursuant to standard University procedures. All illegal activities will be reported to local or national authorities, as appropriate, for investigation and prosecution.

While the University desires to maintain user privacy and to avoid the unnecessary interruption of user activities, the University reserves the right to investigate unauthorized or improper use of University resources, which may include, within the limits permitted by law, the inspection of data stored or transmitted on the network. In the event that use is determined to be contrary to University policy or applicable law, appropriate measures will be taken. These measures may include, but are not limited to, permanent or temporary suspension of user privileges, deletion of files, disconnection from the Jacobs University network, referral to student or administrative disciplinary processes, and cooperating with the appropriate law enforcement officials and government agencies.

The University is not responsible for information, including photographic or video images and musical recordings, published on or accessible through personal web pages, including personal home pages. The University does not monitor the contents of these personal web pages. The individual or group creating or maintaining personal web pages is solely responsible for the content of the web page and may be held civilly and criminally liable for the materials posted on the web site.

Information on Applicable Laws and Statutes

The examples of unauthorized use set forth above are not meant to be exhaustive. Whenever you are in doubt regarding an issue of questionable use, it is in your best interest to resolve the issue before pursuing any questionable use of University resources. All users of the University computer and information resources are expected to be familiar with and to abide by University codes and policies, as well as all laws relating to electronic media, copyrights, privacy, and security.

Responsible Parties: Academic Affairs, Information Resource Center