Security and rules of conduct

Information security and code of conduct

Information security and code of conduct

The following documents (in PDF) provide the rules for dealing with information and computer use within the University:

- Information Security Policy
- Minimal Measures for Information Security
- Regulations on ICT and Internet Use (for students and staff) 


A number of measures have been taken to protect the PC work places for students and staff members and the central ICT facilities. E-mails are checked for viruses at two junctures:

  1. When the e-mail enters the central mail server
  2. When you open a message on your local PC

The mail server is equipped with a virus scanner which checks all incoming and outgoing mail. Anti Virus software is active at every work place. The virus scanners on the computers are operated centrally and they are equipped with the newest definitions against different types of infections on a daily basis.


What is Malware?.

Phishing mails

What is Phishing?  

Never respond to phishing mail.
For more information, please see:


Your password is private. You are the only person who knows it. Treat your password therefore with the same confidentiality as the pin code of your bank card.

- Never lend out your account. 
- Never give your password to third parties. 
- Do not write your password on a bit of paper which you then stick onto your monitor.

Take care of your digital belongings

Take good care of your documents, data, etc.

- Make copies of important data
- Keep a copy on a USB stick
- Never leave laptops, notebooks or USB sticks unattended
- Make sure you are logged out before you leave a public space

Last Modified: 24-03-2015