Terms of Use for the Guest Network at Schloss Ringberg (hereinafter called Institute)
1. Area of application
1. These regulations apply both to non-Institute computers which have access to the guest network as well as to computer facilities made available by the Institute and used to access the guest network. Computers which are not the property of the Institute may only be connected to the guest network with the permission of the Institute.
2. All users of guest networks are obliged to comply with these regulations, irrespective of their legal relationship with the Max Planck Society (MPS).
2. Access rights
1. There is no legal entitlement to access guest networks or use computer facilities made available by the Institute and connected to the Institute guest network.
2. Users who breach these regulations are liable to have their right of access permanently or temporarily withdrawn or subsequently restricted. Persons concerned will be afforded an opportunity to respond before access is withdrawn.
3. Duties of users
1. Users shall refrain from any and all unlawful acts (e.g. downloading or uploading material that is protected by copyright). In addition users shall refrain from any and all acts that are likely to prejudice the interests or reputation of the MPS or third parties or otherwise cause harm to the MPS or third parties (e.g. downloading or uploading pornography).
2. The computer facilities made available by the Institute must be treated with care. It is prohibited to make any changes to the installation or configuration of computers and networks or manipulate the hardware or interfere in any way with the software installation. In the event of functional defects or serious faults, the IT department must be notified immediately.
3. Users are obliged to install an up-to-date virus scanner and a firewall to protect their non-Institute computers against malware. Users must provide proof of such protection on request. Where necessary the IT department will provide appropriate software protection within the meaning of Sentence 1 of this Paragraph.
4. Users are obliged to use their non-Institute computers on the network solely via the guest log-in approved in conjunction with their rights of access. This log-in must not be disclosed for use by third parties. Similarly the guest network may only be accessed from computers made available by the Institute via the guest log-in approved in conjunction with the right of access, or in the configuration specified by the Institute.
5. Users are in particular obliged
a. to use the guest network solely in accordance with these regulations;
b. to refrain from any action likely to interfere with due and proper operation;
c. to refrain from using chargeable services at the expense of the MPS;
d. not to offer any services that may be accessed via the Internet;
e. to observe the legal/contractual requirements to protect the rights of third parties when using the guest network; it is in particular prohibited to use of peer-to-peer services, file hosting/share hosting or Usenet services to distribute or download content that is protected by copyright;
f. to observe the provisions of the law, in particular criminal law, copyright legislation and regulations for the protection of minors.
4. Logging and analysis
1. The following user data are logged: User ID and/or MAC address, IP addresses of sender and recipient, types of services used (e.g. http, ftp, telnet) and timestamp. Logs are retained for a period of two months. However this period will be extended if there are grounds to suspect any misuse of the guest network. In such case the requisite logs will be retained until such suspicion has been clarified and investigations completed.
2. Where necessary the data logs will be analysed for the following purposes
a. to guarantee due and proper system operation;
b. for resource planning and system administration purposes;
c. to protect the personal data of other users;
d. for billing purposes;
e. to identify and eliminate faults;
f. to combat misuse if there is evidence that the guest network is being or has been used
in contravention of these regulations.
5. Liability of users
1. Users shall be liable for any loss, damage or detriment suffered by the MPS either as a result of their improper or unlawful use of the guest network – whether via a non- Institute computer or via computer facilities made available by the Institute - or due to a negligent failure on the part of users to fulfil their obligations arising from these regulations.
2. Users shall be liable for any acts committed by third parties insofar as the user shall have facilitated the same as a result of a negligent breach of these regulations.
3. Users shall not however be liable for compensation pursuant to Paras. 1 and 2 provided that they have taken commensurate care in complying with these regulations and the loss or impairment would have occurred even despite this care.
4. Users must indemnify the MPS against all claims made by third parties against the MPS as a result of a negligent breach of the obligations arising from these regulations.
5. In the event that notice is given by the MPS to cease and desist on pain of prosecution, this shall also include the imposition of such contractual penalty as shall be due in the event of conduct pursuant to Paras. 1 and 2.
6. The MPS reserves the right to take legal action against users who breach the terms of these regulations.
6. Limited liability on the part of the Max Planck Institute
1. No liability is assumed for access to the guest network, irrespective of whether via a non-Institute computer or via computer facilities made available by the Institute. In particular, there is no expressed or implied guarantee that the guest network will be available at all times, either in full or without defect.
2. The Institute shall not be liable for any loss or damage – whether direct or indirect – in connection with such use other than in the event of wilful or gross negligence on the part of the Institute. Limited liability does not apply in case of loss of life, physical injury or impairment of health as a result of a negligent breach of duty on the part of the Institute or a wilful or negligent breach of duty by a legal representative or vicarious agent of the Institute.