The network of the University of Basel represents an important working tool for all its users. In order to maintain its operation, all participants must adhere to the following rules. These rules are not intended to restrict communication, but to enable as many users as possible to access the network smoothly.
Any use of the University Network must be in accordance with the primary goal of serving the exchange of information in the context of teaching and research at the University of Basel.
- The network may not be used to violate laws or regulations. In particular, the Data Protection Act must be observed.
- The use of the university network for commercial purposes is not permitted. In particular, no advertising may be disseminated.
IT Services has defined some rules for connecting a computer to the University network. In brief:
- A network socket may only be used after consultation with the Computer Manager (CM) and IT Services.
- Network settings are specified by IT Services and assigned to individual computers by the CMs.
- A computer may not be switched from one socket to another without consulting the CM.
- Basic security requirements must be observed (current status of system and software, virus protection, good password).
- Network devices (switches, hubs, routers, security devices, etc.) required for the connection of computers are installed and commissioned exclusively by IT Services (or persons authorised by IT Services) with network components procured by IT Services.
- Radio routers are only connected to the network by IT Services.
- Radio routers may only be put into operation in premises of the University of Basel with the permission of IT Services, even if they are not connected to the university network, as they may interfere with/impair the radio network of the University of Basel.
- In the event of violations, the corresponding network segment will be disconnected from the University network without prior notice. This applies to all types of devices that forward and/or manipulate network traffic (e.g. proxies).
University members have the option of connecting their computer to the university network from home or on the road via VPN. Since the computer is then part of the university network, both the regulations for the use of the university network and basic security requirements must be met (current state of system and software, virus protection, good password). If a computer does not meet these conditions, access to the university network may be limited or dial-in for the user account may be blocked altogether. With the use, the participants declare their agreement to these regulations.
No programs may be developed, passed on or used which
- break access authorizations to computers (e.g. passwords)
- penetrate other computers without authorization
- change or damage data or programs of others (e.g. viruses or worms).
Data, programs and other information of users may not be viewed, changed, passed on or destroyed without their express consent. It is not permitted to impersonate another person. Other users may not be harassed (e.g. through chain letters).
There are various virtual networks on the Internet through which files are exchanged. In the vast majority of cases, it is mainly music, films or copyright-protected software that is offered. This usually violates applicable laws. In addition, viruses and other malware are often spread via such files. The download of large amounts of data burdens the university network and causes costs and is therefore only permitted for university tasks. In accordance with §2 (Copyright), §3 (private use to a limited extent without endangering security) of the "Regulations on the Use of University IT Resources", IT Services therefore reserves the right to take measures to limit such traffic generally or for individual computers, or to block it completely.