Legal framework

Content

  1. Overview 2 Hessian Higher Education Act 3 Hessian Matriculation Ordinance
  2. Hessian Data Protection and Freedom of Information Act
  3. Criminal Code
  4. Telecommunications Act 7 Digital Services Act
  5. Copyright Act

1. overview

The legal texts are available from the Federal Ministry of Justice (https://www.gesetze-im-internet.de), on Hesse Law (https://www.rv.hessenrecht.hessen.de) or at the Hessian Commissioner for Data Protection and Freedom of Information (https://datenschutz.hessen.de/infothek/gesetze) and can be read there or downloaded as a downloaded as a PDF file.

Hessian IT Security Act - HITSiG https://www.rv.hessenrecht.hessen.de/perma?a=ITSiG_HE
General Data Protection Regulation (GDPR) https://eur-lex.europa.eu/eli/reg/2016/679/oj
Federal Data Protection Act (BDSG) https://www.gesetze-im-internet.de/bdsg_2018
The Federal Commissioner for Data Protection and Freedom of Information https://www.bfdi.bund.de
Hessian Higher Education Act https://www.rv.hessenrecht.hessen.de/…
Hessian Matriculation Ordinance https://www.rv.hessenrecht.hessen.de/…
Hessian Data Protection and Freedom of Information Act https://www.rv.hessenrecht.hessen.de/…
The Hessian Commissioner for Data Protection and Freedom of Information https://www.datenschutz.hessen.de
German Criminal Code https://www.gesetze-im-internet.de/stgb/index.html
Telecommunications Act https://www.gesetze-im-internet.de/tkg_2021/index.html
Digital Services Act https://www.gesetze-im-internet.de/ddg/
Copyright and Related Rights Act https://www.gesetze-im-internet.de/urhg/index.html

Top of page

The following is a selection of paragraphs from some laws, relevant for research and teaching or IT security. are relevant.

2. Hessian Higher Education Act

§ 14 HessHG Quality assurance, reporting
§ 17 HessHG Student Counselling
§ 34 HessHG Research with third-party funds
§ 61 HessHG Enrolment, Guest Auditors

top of page

3rd Hessian Matriculation Ordinance

§ 3 HSchulImmV Matriculation
§ 5 HSchulImmV Student ID card, student handbook
§ 14 HSchulImmV Processing of examination data
§ 15 HSchulImmV Processing of personal data
§ 16 HSchulImmV Data for university statistics
§ 17 HSchulImmV Transmission of data to the student body and the student union
§ 18 HSchulImmV Transmission of data to the library
§ 19 HSchulImmV Transmission of data to the ministry responsible for higher education
§ 20 HSchulImmV Transmission of data to the responsible health insurance fund
§ 21 HSchulImmV Retention periods for documents of university examinations and proof of studies
§ 22 HSchulImmV Data protection

Top of page

4. Hessian Data Protection and Freedom of Information Act

Section 1 HDSIG Scope of application
Section 3 HDSIG Processing of personal data, commissioned processing
Section 22 HDSIG Data transfers by public bodies
Section 31 HDSIG Duty to provide information when collecting personal data from the data subject
Section 32 HDSIG Duty to provide information if the personal data was not collected from the data subject
Section 33 HDSIG Right of access by the data subject
Section 34 HDSIG Right to erasure (“right to be forgotten”)
Section 35 HDSIG Right to object
Section 37 HDSIG Criminal provisions
Section 38 HDSIG Provisions on fines

Top of page

5th Penal Code

§ 86 StGB Dissemination of propaganda material of unconstitutional organisations
Section 130 StGB Incitement of the people
Section 166 StGB Insulting denominations, religious societies and ideological organisations
§ 184 StGB Distribution of pornographic writings
§ 184a StGB Distribution of violent or animal pornographic writings
§ 184b StGB Distribution, acquisition and possession of child pornography
§ 185ff StGB Insult, Defamation, Slander, etc.
§ 202a StGB Spying on data
§ 202b StGB Interception of data
Section 202c StGB Preparation of spying and interception of data
Section 202d StGB Data theft
Section 263a StGB Computer fraud
Section 303a StGB Data alteration
§ 303b StGB Computer sabotage

Top of page

6th Telecommunications Act

§ 174 TKG Manual information procedure (Data retention only affects service providers that are publicly accessible. If the services are only accessible to members of Fulda University (computers can only be used with user ID and password in the computer network), these paragraphs do not apply).
Section 175 TKG Obliged parties; compensation
Section 176 TKG Obligations to store traffic data
Section 177 TKG Use of the data
Section 178 TKG Ensuring the security of data
Section 179 TKG Logging
§ 180 TKG Catalogue of requirements
§ 181 TKG Security concept
§ 182 TKG Requests for information from the Federal Intelligence Service

Top of page

7th Digital Services Act

§ 5 DDG General information obligations
§ 6 DDG Special information obligations for commercial communications
§ 33 DDG Provisions on fines

Top of page

8. copyright law

§ 60a-h UrhG Legally authorised uses for teaching, science and institutions
Section 69a-g UrhG Special provisions for computer programmes
Section 106 UrhG Unauthorised use of copyright-protected works
Section 107 UrhG Unauthorised affixing of the copyright notice
Section 108 UrhG Unauthorised interference with related rights
Section 108a UrhG Unauthorised commercial exploitation
Section 108b UrhG Unauthorised interference with technological protection measures and information required for rights management

Top of page

Jan 5, 2025

Subsections of Legal framework

Data Privacy

Content

  1. Legal bases
  2. Personal data
  3. Legal bases for processing
  4. Protection mechanisms
  5. Deleting files
  6. Printing personal data
  7. General information

1. legal bases

The legal bases are

  • the Regulation (EU) 2016/679* of the European Parliament and of the Council of European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation GDPR), which has been in force since 25 May 2018, and

  • the Hessian Data Protection and Freedom of Information Act (HDSIG) in the version dated 3 May 2018, which supplements the to the GDPR for the processing of personal data by the public the public authorities of the state, municipalities and districts applies.

The Federal Data Protection Act (BDSG) essentially applies to federal authorities.

Top of page

2. personal data

The subject of data protection is personal data. Personal data is any information relating to an identified or identified or identifiable natural person (“data subject”) (“data subject”) (Art. 4 No. 1 GDPR). A natural person is regarded as identifiable, directly or indirectly, in particular by reference to an identifier identifier such as a name, an identification number, location data, to an online identifier or to one or more specific special characteristics that express the physical, physiological, genetic, psychological physical, physiological, genetic, mental, economic, cultural or social social identity of that natural person, can be identified.

Top of page

3. legal bases of the processing

Insofar as the processing of personal data requires the the consent of the data subject is required, Art. 6 para. 1 lit. a GDPR serves as the legal basis.

In the processing of personal data necessary for the fulfilment of a contract to which the data subject is a person is a party to, Art. 6 para. 1 lit. b GDPR serves as the legal basis. This also applies to processing operations that are necessary for the performance of pre-contractual measures.

Insofar as the processing of personal data is necessary for the fulfilment is necessary for compliance with a legal obligation to which the Fulda University of Applied Sciences is subject to, Art. 6 para. 1 lit. c GDPR serves as the legal basis.

In the event that vital interests of the data subject or another natural person or another natural person require the processing of personal of personal data, Art. 6 para. 1 lit. d GDPR serves as the legal basis.

If the processing is necessary for the performance of a task carried out necessary for the performance of a task carried out in the public exercise of official authority vested in Fulda University of Fulda University of Applied Sciences, Art. 6 para. 1 lit. e GDPR in conjunction with a relevant, specialised federal or state law as the legal basis for the processing.

Top of page

4. protection mechanisms

  1. the processing of personal data on publicly accessible accessible workstations is prohibited.

  2. workstations in offices must be specially protected protected if personal data is processed on them. are processed on them.

  • The office must be locked when it is is left.

  • The login to the computer must be protected by a secure password protected be protected.

  • Starting the workstation computer (boot process) must be protected by a password (“BIOS password”, see sections “Functions” and “Security” in the German explanation of the BIOS or better explained in the section “Configuration” in the English explanation for the BIOS). This protection must also be effective if an intruder can access the computer with his own CDROM, DVD, a memory stick or something similar. wants to start the computer. If the computer does not have such password protection, the personal data may not be personal data encrypted on the hard disc. stored on the hard disc.

  • The computer must either be secured against theft against theft or it may only be operated with removable hard drives that are stored in a burglar-proof cabinet at night.

  • On portable data carriers (hard disks in notebooks, removable discs, CDROM, DVD, memory stick, etc., personal data may be stored only encrypted.

  • On network drives of the university, the Hessenbox and similar external storage media sensitive personal research data may be stored in accordance with Art. 9 GDPR, which regulates the processing of which regulates the processing of special categories of personal data only encrypted may be stored. The encryption of the data is the responsibility of the person who stores the data on data on these storage media.

  1. if the computer’s operating system supports the protection of protection of personal data, the appropriate protection mechanisms must be used.

Top of page

5. deletion of files

The normal command for deleting a file only deletes the name of the file from internal system lists (e.g. the file directory), while the file content is not destroyed. Memory areas of deleted files can, under certain circumstances (with some effort and appropriate knowledge) into readable files again. readable files. Destroying the file contents is only possible with special operating system commands (these commands are only provided by provided by some operating systems) or special programmes. programmes.

If a data carrier on which personal data is stored has been is to be released for general operation or deleted, all file contents must first be destroyed.

Top of page

6. printing personal data

Personal data may only be printed out if the printout is personally personally supervised.

Top of page

7. general notes

Any person who works with personal data, should carry out their work particularly responsibly, as all protection mechanisms only fulfil their purpose if they are are taken seriously by those involved.

Finally, a few general tips:

  1. do not leave any written documents lying around from which that reveal your passwords.

  2. do not allow any other person to work under your work under your ID.

  3. collect output lists and data carriers with personal data personal data in person instead of sending them send them.

  4. do not leave portable data carriers (CDROM, DVD, memory stick, etc.) with personal data lying around. lying around, but lock the data carriers in a burglar-proof in a burglar-proof cabinet before you leave the office. leave the office.

  5. store personal data on portable data carriers data carriers only in encrypted form.

**Remember that you personally are primarily responsible responsible for the protection of the data entrusted to you.

Top of page

Oct 16, 2025

Administrative regulations of the Hessian ministries

Content

  1. Overview
  2. Information security guideline for the Hessian state administration

1. overview

The administrative regulations are published on the page Hesse Law - Legal and administrative regulations (https://www.rv.hessenrecht.hessen.de) and can be read or downloaded there. downloaded there.

Information Security Guideline for the Hessian State Administration https://www.rv.hessenrecht.hessen.de/…

top of page

2. information security guideline

for the Hessian State Administration

The Information Security Guideline for the Hessian State Administration State Administration was issued by the Ministry of the Interior and for Sport on 01 November 2021 and published on 22 November 2021 in the State Gazette on 22 November 2021. Please select in the State Gazette on the left-hand side in the 2021 in the annual overview on the left, then in the table of contents issue 47/2021 and then page 1517 if you want to read the publication. want to read the publication.

The regulations of the Information Security Guideline for the Hessian State Administration are based on, among other things the Basic Protection Standards and the Guideline for Information Security in Public Administration. public administration](https://www.it-planungsrat.de/fileadmin/beschluesse/2019/Beschluss2019-04_TOP12_Anlage_Leitlinie.pdf).

Top of page