Translations of this page:
- de
- en
You are here: aktuelles » en » vpn » termsofuse
En:vpn:termsofuse
Table of Contents
VPN Terms of Use
[As of: May 20, 2025]
Disclaimer: This translation exists for your convenience only. The german original is the only document which is valid for you if you are using our VPN service.
Preamble
The shared systems group b-it\Computer Science (GSG) offers all members of the Inst. for Computer Science and the b-it privileged and secure access to the institutes network via a VPN gateway. This VPN access can be used, in particular, with mobile devices, e.g., from public wireless networks, or from a private, home-based workstation via the Internet. The access is fundamentally bound to responsible and considerate usage and must be proportionate to the scientific benefit.
1. Scope
- The following regulations apply to all network accesses via the VPN gateway of the Institute of Computer Science/b-it, regardless of the type of device you are using.
- Access to other networks via the VPN gateway generally requires acceptance of the applicable regulations.
- In particular, the rules of the User Agreement for the Institute of Computer Science/b-it, hereinafter referred to as the general User Agreement, apply.
- Changes to these VPN Terms of Use will be communicated to users via email.
2. Admission Regulations
- All users of the Inst. for Computer Science or the b-it are authorized to use the VPN gateway in accordance with the general User Agreement.
- Use of the VPN gateway requires a valid user authorization and user ID at the Institute for Computer Science/b-it in accordance with the general terms of use.
- VPN access can be requested informally via a web interface and is valid for one year or until revoked.
- VPN access may be blocked by the joint systems group in the event of violations of the applicable terms of use or to avert danger. The user will be notified of this in writing or by email, stating the reasons.
3. User Obligations
- Users are obligated to comply with the provisions of these VPN Terms of Use and the applicable operating regulations and to observe notices from the shared systems group.
- The access authorization may only be used for personal access and may not be made available to third parties. If there is any suspicion that the access authorization has been used by third parties, the systems group must be informed immediately.
- VPN access may only be obtained via end devices and VPN software that comply with the operating regulations.
- The user must take all appropriate measures to avoid disruptions to operations. In particular, system programs must be kept up to date with the latest security standards and protective measures must be taken to prevent the spread of malware (e.g., viruses).
4. Usage Rules
- For the duration of VPN use, the end device is dynamically assigned a network address from the University of Bonn address range and is therefore subject to the operating regulations for the university network. When accessing the university network, the user must ensure that they only use services for which they are authorized/licensed. In case of doubts in that regard, access to these services should be ceased immediately.
- Third parties may not be granted access to the university network or to services within the university network via this network access.
- No personal servers or peer-to-peer services may be operated via the VPN connection.
- Commercial use is prohibited. Any use must be proportionate to the scientific benefit.
- The use of devices or software that could cause network disruptions or that are used to systematically scan network endpoints is prohibited. If disruptions or attempted attacks are detected, the VPN access of the person responsible will be blocked.
- The servers and services available via VPN access are limited. The specific restrictions depend on the user ID used and the network from which the connection was established.
- On the end device, network-side firewall rules can be configured for the duration of VPN use, and the current security status can be checked.
5. Data Protection/Connection Data and Statistics
- To ensure smooth operation, the following data is collected and stored when using the VPN access:
- User ID
- IP address of the end device and the assigned IP address
- Time of connection establishment and termination
- Number of bytes received and sent
- This connection data is deleted after 8 weeks at the latest.
- The creation of anonymized traffic statistics, which may not contain user IDs, is permitted for operational reasons and for research and teaching purposes.
- For security purposes, the joint system group responsible for operations may log user data communications and, if necessary, store them for later analysis. The logged data must be deleted immediately once the reason for the data collection no longer applies.
6. Liability and Exclusion of Liability
- Without prejudice to criminal prosecution, the user is liable for any damage caused by him or her through culpable intent or gross negligence resulting from violations of legal regulations and the provisions of these regulations.
- The usage of the VPN service lies entirely within your own risk.
- The Institute of Computer Science/b-it assumes no liability for malfunctions of technical equipment or programs, data loss, or incorrect information provided by the shared system group.