Gemeinsame Systemgruppe IfI/b-it

You are here: aktuelles » en » vpn » termsofuse

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
en:vpn:termsofuse [2017-03-07 15:14] – created Torsten Steinhäuseren:vpn:termsofuse [2025-05-20 15:50] (current) – created Thomas Thiel
Line 1: Line 1:
-====== Terms of use for the VPN and WiFi Services at B-IT======+====== VPN Terms of Use ======
  
-**Please note, this translation is for your convenience only. By accepting it, you legally accept the German version ([[de:vpn:termsofuse|Nutzervereinbarung für die Nutzung von VPN/WLAN am B-IT]]) of this document.**+[As ofMay 20, 2025]
  
-  - **Personal Network Access Services (PNAS@BIT) ** \\ The Bonn-Aachen International Institute for Information Technology (B-ITprovides everyone affiliated with the Institute with a privileged and within the boundaries of the used Concepts secure Access to the IP-Network of the B-IT (NET@BIT) as well as the University-Network (BONNET) and the Internet.\\ This Access via the Service called PNAS@BIT is initiated by Computer using the Authentication, Authorisation- and Encryption mechanisms 802.1X and\or Virtual Private Network (VPN)Access is possible via WLan (802.1X and\or VPN)designated Connection-points in our internal Network (802.1X and\or VPN) and from the Internet (VPN)+**Disclaimer**: This translation exists for your convenience only. The [[de:vpn:termsofuse|german original]] is the only document which is valid for you if you are using our VPN service. 
-  - **Ambit** + 
-    - The Rules listed here are not dependant on the Equipment, nor the Procedure used by a User to connect to our Network using a PNAS@BIT-Account. +===== Preamble ===== 
-    - For this Account all special as well as all basic terms of use for the Computer-Infrastructure at BIT apply+ 
-    The provided Access to Networks run by third parties does, if you make use of it, imply your acceptance of all terms of use of this third-party Network. This does especially include the Terms of the traversing Networks BONNET (University Network run by HRZ) and WIN (german research network) and the Networks your connection aims at+The shared systems group b-it\Computer Science (GSGoffers all members of the Inst. for Computer Science and the b-it privileged and secure access to the institutes network via a VPN gatewayThis VPN access can be used, in particular, with mobile devices, e.g., from public wireless networks, or from a privatehome-based workstation via the InternetThe access is fundamentally bound to responsible and considerate usage and must be proportionate to the scientific benefit. 
-    - Changes to the Terms of PNAS@BIT will be brought to the Users attention by Email+ 
-  - **Provision** +===== 1. Scope ===== 
-    - The Service is available to all users that are legit for use of the BIT Computer-Infrastructure+ 
-    In order to be able to use a PNAS@BIT-Account you need a valid Account in the BIT-Network+  - The following regulations apply to all network accesses via the VPN gateway of the Institute of Computer Science/b-it, regardless of the type of device you are using
-    Requests for PNAS@BIT/Accounts are taken via a web/interface. Once your PNAS@BIT-Account has been activated it will be active until the aforementioned BIT-Network Account expires or is revoked. Independant of your BIT-Network Account we reserve the right to revoke your PNAS@BIT-Account any time+  - Access to other networks via the VPN gateway generally requires acceptance of the applicable regulations. 
-    Systems Group BIT reserve the right to disable your PNAS@BIT-Account anytime if you violate the Terms of Use or simply to prevent harm on the Networks managed by itIf your Account gets disabled you will receive an email explaining the reasons in detail+  In particular, the rules of the User Agreement for the Institute of Computer Science/b-it, hereinafter referred to as the general User Agreement, apply
-    - The PNAS@BIT-Access does not depend on office hours of BIT and is, as far as possible, provided 24\7+  - Changes to these VPN Terms of Use will be communicated to users via email. 
-  - **Users Duties** + 
-    - Users have to abide the Terms of this Agreement as well as the Terms of use. Users are also required to pay attention to any addition Information provided by the Administrator and act accordingly+===== 2. Admission Regulations ===== 
-    - The PNAS@BIT Account is for personal use only and must not be shared with others. If you suspect someone obtained your Account information you must inform the Administrator immediately. + 
-    Connections may be established only from Computers/Devices and Software that fulfill the requirements stated in this Document+  - All users of the Inst. for Computer Science or the b-it are authorized to use the VPN gateway in accordance with the general User Agreement
-    Users have to take all possible measures to prevent disruptions of ServiceIt is especially necessary to keep your OS updated (patches/fixes) and to take measures to prevent malicious software from spreading (ie Virus scanner). +  Use of the VPN gateway requires a valid user authorization and user ID at the Institute for Computer Science/b-it in accordance with the general terms of use
-  - **Terms of Use** +  VPN access can be requested informally via a web interface and is valid for one year or until revoked. 
-    - For as long as you use a PNAS@BIT connection your System will dynamically assigned an IP of the Network of BIT/University of Bonn. Therefor the Terms of use of the University Network (BONNET) apply+  VPN access may be blocked by the joint systems group in the event of violations of the applicable terms of use or to avert dangerThe user will be notified of this in writing or by email, stating the reasons. 
-    You must not provide access to or through the BONNET to third parties via your PNAS@BIT Account+ 
-    You must not run Servers, nor Peer-to-Peer Services+===== 3User Obligations ===== 
-    You must not use our Services for commercial purposesEach and every use of our Service has to be proportional to usefulness of the retrieved data for academic purposes+ 
-    Usage of Devices and/or Software that could cause disruptions to our Service or other attached Services as well as Devices/Software whichs purpose is to scan for vulnerability in our Services is forbidden. If a User is found to be disrupting our Services or trying to do so that User's PNAS@BIT Account will be removed instantly+  - Users are obligated to comply with the provisions of these VPN Terms of Use and the applicable operating regulations and to observe notices from the shared systems group
-    There are restrictions on which Services are available to you via a PNAS@BIT ConnectionWhich restrictions apply depends on the used PNAS@BIT Account and the Network the Connection originates from. It also depends on whether you use VPN or 802.1X to connect to our Service+  - The access authorization may only be used for personal access and may not be made available to third parties. If there is any suspicion that the access authorization has been used by third parties, the systems group must be informed immediately. 
-    For as long as you are connected to our Network we may apply restrictions on your System and/or test the current security-state of your System+  VPN access may only be obtained via end devices and VPN software that comply with the operating regulations
-  - **Connection tracking** +  The user must take all appropriate measures to avoid disruptions to operationsIn particular, system programs must be kept up to date with the latest security standards and protective measures must be taken to prevent the spread of malware (e.g., viruses). 
-    - To ensure stable and error-free operation the following data about your PNAS@BIT Connection will be temporary saved+ 
-      Username of the PNAS@BIT Account. +===== 4. Usage Rules ===== 
-      Type of Connection and Authentication method. + 
-      - available and assigned IP of your System and the involved Network Access Service (NAS) and under certain circumstances the MAC of your System and the involved NAS of NET@BIT. +  - For the duration of VPN use, the end device is dynamically assigned a network address from the University of Bonn address range and is therefore subject to the operating regulations for the university networkWhen accessing the university network, the user must ensure that they only use services for which they are authorized/licensed. In case of doubts in that regard, access to these services should be ceased immediately
-      Time of connect/disconnect +  Third parties may not be granted access to the university network or to services within the university network via this network access
-      Amount of Data transferred \\ This Data (a-e) will be deleted after a maximum of 6 weeks unless needed as proof for legal actions+  No personal servers or peer-to-peer services may be operated via the VPN connection
-    We may create anonymous statistics of Network traffic for operational and academic purposes. +  Commercial use is prohibitedAny use must be proportionate to the scientific benefit
-    To counter threats to our network and to ensure error-free operation Systems Group b-it may log network traffic and analyze it to the necessary extentThis data is deleted immediately after the initial reason for it being logged has been eliminated (threat/error)+  The use of devices or software that could cause network disruptions or that are used to systematically scan network endpoints is prohibited. If disruptions or attempted attacks are detected, the VPN access of the person responsible will be blocked
-  - **Liability** +  The servers and services available via VPN access are limitedThe specific restrictions depend on the user ID used and the network from which the connection was established
-    The User is held responsibly for any damage he caused to our system by ignoring the Terms of Use no matter if he did it on purpose or by being careless. This is in dependant of any legal actions that may or may not be taken against the User+  On the end device, network-side firewall rules can be configured for the duration of VPN use, and the current security status can be checked
-    Use a PNAS@BIT Account at own risk. + 
-    - The BIT and the People in charge of the PNAS@BIT Services do not take liability for errors caused in Devices and Programs of any kindloss of data or manipulation of data as well for incorrect Information.+===== 5. Data Protection/Connection Data and Statistics ===== 
 + 
 +  - To ensure smooth operationthe following data is collected and stored when using the VPN access
 +    User ID 
 +    - IP address of the end device and the assigned IP address 
 +    - Time of connection establishment and termination 
 +    Number of bytes received and sent 
 +  - This connection data is deleted after weeks at the latest
 +  The creation of anonymized traffic statistics, which may not contain user IDs, is permitted for operational reasons and for research and teaching purposes. 
 +  For security purposes, the joint system group responsible for operations may log user data communications and, if necessary, store them for later analysisThe logged data must be deleted immediately once the reason for the data collection no longer applies
 + 
 +===== 6. Liability and Exclusion of Liability ===== 
 + 
 +  Without prejudice to criminal prosecution, the user is liable for any damage caused by him or her through culpable intent or gross negligence resulting from violations of legal regulations and the provisions of these regulations
 +  The usage of the VPN service lies entirely within your own risk. 
 +  - The Institute of Computer Science/b-it assumes no liability for malfunctions of technical equipment or programs, data loss, or incorrect information provided by the shared system group.