HFD IT-Security

Informationsecurity and Dataprivacy

Protecting information means more than just keeping computers running and keeping hackers out. It requires systems that prioritise data security, careful consideration of what information we collect and responsible handling of that data.

The Information Security Office (SIS) at Fulda University of Applied Sciences is responsible for developing, implementing and monitoring the information security strategy. Together with HFD CERT, SIS coordinates the response to security incidents, analyses them and takes appropriate countermeasures.

Our tasks include the creation and maintenance of security guidelines and procedures to ensure the confidentiality, integrity and availability of information. In doing so, we ensure compliance with legal and regulatory requirements. We carry out regular risk assessments, identify potential security gaps and develop risk mitigation measures. We also sensitise employees to security issues through training and campaigns.

Jan 5, 2026

Subsections of HFD IT-Security

Report Incident

Content

Report promptly!

Report all IT security incidents or IT security emergencies to the Information Security Office at Fulda University of Applied Sciences. By email to it-security@hs-fulda.de or by telephone on 0661-9640-8877.

Your report should contain the following information:

  1. who is reporting (name, email address, telephone number)?
  2. when did the incident occur (date, time)?
  3. where did the incident take place (building, room)?
  4. type of incident (malware attack, system intrusion, …)?
  5. which system is affected (name, IP address)?

You can also download and print out our IT emergency card.

What is an IT security incident?

  1. you have accidentally opened a suspicious attachment in an attachment in an email.

  2. you have inadvertently clicked on a suspicious web address (link) in an email.

  3. you receive an extortion email.

  4. you receive an e-mail in which you are asked to personal data (user name, password, account number, …) via a web page or communicate them to someone.

  5. you receive a large number of unsolicited messages in your mailbox (spam mail).

  6. your user account is being misused to send spam mail.

  7. your computer is behaving strangely (hard drive is running continuously, computer does not respond to inputs, …) because it may be infected with malware. is infected with malware.

  8. you receive a phone call (usually the people pretend to be employees of a hotline of a certain company) company) because your computer allegedly has problems that can be solved with your can be solved with your help if you certain settings, which are now given to you by telephone. are now given to you by telephone.

  9. you are called and asked about your working environment environment (products used, colleagues, colleagues, superiors, email addresses, …) so that this information can later be used for an attack computers and/or the university network (information computers and/or the university network (information gathering via social engineering).

  10. you have committed an irregular use according to **Chapter 6 of the IT Security Policy of the university**.

  11. if something seems strange or suspicious to you suspicious, it may also be an IT security incident. IT security incident.

**Report the incident promptly! All members of the university are obliged to report IT security incidents **.

Top of page

What is an IT security emergency?

  1. your end device has been stolen or you have lost it lost it.

  2. your files are automatically deleted, modified or encrypted. **Try to limit the damage according to chapter 5 in the limit the damage according to chapter 5 in the basic protection document. requested to do so by the data centre.

  3. your access data (user name/password, chip card, …) have been stolen. **Change your password immediately and/or have your user account blocked if necessary **.

  4. you are being acutely blackmailed or threatened in order to compromise the to compromise the university’s IT infrastructure.

Top of page

Who do I report what to?

Please contact the contact person of your organisational unit or the data centre if you detect an IT security incident or emergency, notice a violation of the IT security policy or report it yourself. breach of the IT security policy or if you yourself are the have been the victim of an attack by electronic means or you you have noticed incidents with criminal consequences. All IT security incidents and emergencies (with the exception of blackmail and threats) must also be reported to the affected the system administrator concerned, who is responsible for the who is responsible for the end device, lab computer, server or special software, the server or the specific software.

Top of page

Oct 25, 2025

Subsections of Report Incident

Ansprechpersonen

Content

  1. Reporting of security incidents
  2. Reporting of faults or problems
  3. Central contact persons
  4. Contact persons in administration and central facilities
  5. Contact persons in specialist departments
  6. Contact persons in the computer centre
  7. General email lists

1. reporting of security incidents

If you notice a security-related event, for example a hacker intrusion, misuse, unusual system or network unusual system or network behaviour or merely have suspicion, then please report the event or your suspicion **immediately or your suspicion immediately by email to it-security@hs-fulda.de or by telephone to the central IT emergency number 0661-9640-8877.

If you know which person is responsible for administration of the computer or network, you should also inform this person in order to minimise the damage to damage to the computers and networks of Fulda University of as possible. Otherwise, the staff unit Information Security will inform the person responsible for responsible for system administration.

The following information is important for the notification:

  • What happened when?

  • Which system is affected (building, room, computer name or IP address (are labelled on the computer), operating system)

  • Your name and/or telephone number for queries

The affected system must be disconnected from the university university network as soon as possible to avoid further damage spread of the malware to other systems. The affected system should not be disconnected from the power supply disconnected and not shut down so that forensic analyses so that forensic analyses can be carried out later analyses to investigate the malware and the damage caused and the damage caused and so that measures can be taken to of consequential damage can be taken.

  • If the computer is connected to the university network with a **network cable university network, the cable should be disconnected. should be disconnected. The cable is fitted with a tick, which is sometimes sometimes hidden under a plastic cover and must be must be pressed down before disconnecting.

  • If the computer is connected to the university network via the wireless network (WLAN), you should try to the network via the WLAN switch or the touch-sensitive screen (touchscreen) to switch off the network. If the malware prevents this, you should try to switch off the device by pressing the pressing the on/off button for several seconds. In this case, also disconnect the device from the power supply, if it is connected to it and remove the battery, if this is possible.

Top of page

2. reporting of faults or problems

You can report faults and problems to the person named named as the contact person in one of the following tables. If you do not know who is responsible for your concern, report it to the the user support in the computer centre, who will then forward it will immediately forward it to a suitable person for processing.

Top of page

3. central contact persons

Information Security Officer (ISB) of Fulda University of Applied Sciences
Christian Stickel ☏ +49 661 / 9640 - 1073 πŸ–‚ isb(at)hs-fulda.de
IT Security Officer (CISO) of the University of Applied Sciences Fulda
Prof. Dr Michael Zohner ☏ +49 661 / 9640 - 1140 πŸ–‚ it-sicherheit(at)hs-fulda.de
Data Protection Officer (DPO) of Fulda University of Applied Sciences
Katharina Reith ☏ +49 661 / 9640 - 1051 πŸ–‚ datenschutz(at)hs-fulda.de

top of page

4. contact persons in administration and central facilities

IT Security Officer for Administration and Data Centre
Knut Merz ☏ +49 661 / 9640 - 1301 πŸ–‚ knut.merz(at)rz.hs-fulda.de
IT Security Officer at the University and State Library
Frederik Stey ☏ 0661 / 9640 - 9840 πŸ–‚ frederik.stey@hlb.hs-fulda.de

top of page

5. contact persons in specialised departments

IT Security Officer in the AI department
Dennis Biezā ☏ +49 661 / 9640 - 3051 πŸ–‚ dennis.bieza(at)informatik.hs-fulda.de
IT security officer in the ET department
Oleg Menger ☏ +49 661 / 9640 - 5814 πŸ–‚ oleg.menger(at)et.hs-fulda.de
IT Security Officer in the LT department
Inga Huismann ☏ +49 661 / 9640 - 5234 πŸ–‚ inga.huismann(at)lt.hs-fulda.de
IT Security Officer in the OE department
Natallia Kazlouskaya-Disagio ☏ +49 661 9640-3692 πŸ–‚ natallia.disagio(at)oe.hs-fulda.de
IT Security Officer in the PG department
Christian Reum ☏ +49 661 9640-6414 πŸ–‚ christian.reum(at)gw.hs-fulda.de
IT Security Officer in the SK department
Alexander Wald ☏ +49 661 9640-436 πŸ–‚ alexander.wald(at)sk.hs-fulda.de
IT Security Officer in the SW department
Stephan Kling ☏ +49 661 9640-2420 πŸ–‚ stephan.kling(at)sw.hs-fulda.de
IT Security Officer in the W department
Alexander-Nicolai KΓΆhler ☏ +49 661 9640-2828 πŸ–‚ alexander-nicolai.koehler(at)w.hs-fulda.de

top of page

6. data centre service desk

Service Desk for employees
☏ +49 661 / 9640 - 1300 πŸ–‚ it-support@rz.hs-fulda.de
ticket system: https://www.hs-fulda.de/helpdesk
Service Desk for students
☏ +49 661 / 9640 - 1336 / 1332 πŸ–‚ fdnr-support@rz.hs-fulda.de
Ticket system: Service Desk for Students

Top of page

Jan 5, 2026

IT Emergency Card

HFD Emergencyplan

IT Security Training

BITS

https://it-sicherheit.hs-fulda.de/bits

Since July 2006, BITS, the government IT security training, has served as a learning course and awareness training to inform and sensitise colleagues at IT workplaces in administrations with regard to the relevant IT security topics. BITS is available under the Creative Commons BY-SA 4.0 licence and is hosted by us:

Online self-study course on cyber and information security

https://elearning.hs-fulda.de/help/course/view.php?id=1810

This learning programme is aimed at all students and lecturers at Fulda University of Applied Sciences. It serves to sensitise and strengthen your IT skills and your security awareness in dealing with the risks of digitalisation risks of digitalisation and cyberattacks. We rely on a flexible and intuitive online learning programme that enables participants to participants to learn independently and at their own pace. The course can also be used without enrolment, but the certificate for successful certificate is only available with enrolment.

Information security in the workplace

https://elearning.hs-fulda.de/help/course/view.php?id=1703

This learning unit gives you an overview of the basic dangers of information security at your workplace. By acting carefully and following a few rules, you can make a significant contribution to the security of information systems at your university. Using university-specific examples, you will learn what consequences your actions can have and how you can protect your institution and your data. protect your institution and your data**.

Data protection

https://elearning.hs-fulda.de/help/course/view.php?id=1704

This video-based learning unit provides basic knowledge about the relevance of relevance of data protection, the principles of data processing and legal foundations. At the same time, learners are given an overview of organisational and technical measures and the rights of data subjects. They learn what to look out for when working with third parties and who to contact in the area of data protection. data protection. Examples and use cases from the university from the university landscape.

Learning and working in the context of digitalisation

https://elearning.hs-fulda.de/help/course/view.php?id=1705

This learning programme offers specialists and managers in university administrations with self-learning materials for skills development in the digital learning and working. In three areas - Understanding Understand, Use, Share - you will find self-contained modules in different different levels of difficulty.

Oct 16, 2025

Subsections of IT Security Training

Password Checkup

Security Checklist

IT Security Strategy (IT-SL)

VERSION 28.02.2025

The IT Security Strategy (IT-SL) was adopted by the Executive Board of Fulda University of Applied Sciences on 28 February 2025 and has been in force since then.

Content

PREAMBLE

The University of Applied Sciences Fulda (HFD) recognises the central role that information technology (IT) plays in the academic and administrative environment. The security of these technological resources is of paramount importance to ensure and sustain the integrity, confidentiality and availability of data and IT services. This IT Security Strategy (IT-SL) serves as a framework to ensure comprehensive protection of the university’s IT systems and data in a continuous security process. It is essentially based on the best practice recommendations for IT security at universities, which were created as a template by the ZKI IT Security Working Group. The need to define an IT-SL is derived from Section 3 (1) of the Hessian IT Security Act (HITSiG).

The aim of this IT-SL is to create uniform security standards to ensure proper IT operations, which enable a balance between academic freedom and the need for IT security. In order to achieve this goal, all university institutions must recognise the protection of data and information technology as a common challenge.

Top of page

Β§1 OBJECT OF THE IT-SL

The IT security guideline determines the organisational structure required for the IT security process at HFD (structural and procedural organisation) and defines tasks and responsibilities.

top of page

Β§2 SCOPE

The IT-SL applies to the entire information technology of the HFD in its academic and non-academic institutions. It applies to all users who use or provide it. It is binding for the Executive Board, all departments, staff units, the central administration, all central or other institutions and all affiliated institutions of the university as well as other companies and persons who are commissioned with IT security-relevant activities for and on behalf of HFD. The same applies to all HFD partners not mentioned in the above list whose actions affect HFD’s IT security interests.

Top of page

Β§3 PARTIES INVOLVED IN THE IT SECURITY PROCESS

The main responsibility for the IT security process lies with the university management. It therefore appoints the following committees and functionaries and involves existing institutions in the IT security process:

(1) Presidential Board

(2) Information Security Unit (SIS)

(3) IT Security Management Team (SMT)

(4) Computer Emergency Response Team (HFD-CERT)

(5) Decentralised IT Security Officers* (dIT-SB)

(6) Computer centre (RZ)

(7) Data protection officer* of the university (DPO)

(8) Departments, staff units, central administration, university library,

central and other facilities of the university and their users

The parties involved in the IT security process work together in all matters relating to IT security, provide the necessary information and regulate the communication and decision-making channels both among themselves and in relation to third parties. In particular, the aspect of urgency required in crisis situations must be taken into account.

Top of page

Β§4 ESTABLISHMENT OF THE SECURITY ROLES

  1. INFORMATION SECURITY UNIT (SIS)

(1) The university management shall establish an Information Security Unit (SIS), which reports directly to the Executive Board.

(2) The SIS consists of an Information Security Officer* (ISB) and a Central IT Security Officer* (zISB).

(3) The ISB* and the zISB* represent each other.

(4) Organisationally, the SIS is located in the Vice President’s Office for Teaching and Digitisation.

  1. IT SECURITY MANAGEMENT TEAM (SMT)

(1) The Presidential Board shall set up an IT Security Management Team (SMT). The SMT is the university’s central control body for IT security.

(2) The composition of the SMT should - while limiting the number of members to the necessary minimum - reflect both the different areas of responsibility of the university and the different aspects of IT security relevant to the university.

(3) The SMT consists of the following permanent members:

i) Representative of the Presidential Board (VPLD)

ii) Representation of the Information Security Unit (SIS)

iii) Information Security Officer* of the HLSB (ISB HLSB)

iv) Representation of the management of the HFD-CERT

v) Representation of the management of the computer centre

vi) In an advisory capacity: the Data Protection Officer* of HFD

(4) By resolution of the SMT, it can be expanded to include advisory experts if required.

  1. COMPUTER EMERGENCY RESPONSE TEAM (HFD-CERT)

(1) The members of the Computer Emergency Response Team of Fulda University of Applied Sciences are proposed by the SMT and appointed by the Presidential Board. The nomination of the HFD-CERT members are appointed exclusively from the full-time staff of the university. university.

(2) The HFD-CERT is organisationally assigned to the Computer Centre.

(3) The HFD-CERT is composed of the following members who are authorised to make decisions:

  • Head of the HFD-CERT (qualification required for the operational and technical tasks arising within the HFD-CERT).

  • HFD-CERT employees: At least three other IT security experts from e.g. the areas of: Network, identity management, e-mail server and gateway, critical infrastructure or facilities with a distinctive IT infrastructure.

  • By decision of the HFD-CERT, it can be expanded by experts if necessary, while limiting the number of members to the necessary number.

(4) A member of the HFD-CERT shall represent the management of the HFD-CERT.

(5) The HFD-CERT works confidentially and directly with the SIS, coordinates on key issues and reports to the SMT on its activities at regular intervals, at least twice a year.

  1. DECENTRAL IT SECURITY OFFICER (dIT-SB)

(1) Each department, academic, central and other institution of Fulda University of Applied Sciences that operates IT systems shall appoint a decentralised IT security officer* (dIT-SB).

(2) A dIT-SB* may be responsible for several institutions.

(3) The appointments must cover the entire scope of application, i.e. a dIT-SB* is assigned to each IT system and each user.

(4) Personnel continuity must be ensured in the appointment, i.e. the persons involved should belong to the full-time staff of the university.

(5) If an institution does not appoint a dIT-SB*, the SMT may appoint a temporary dIT-SB*.

(6) The tasks and authorisations of the dIT-SB are described in this IT-SL or the subsequent documents based on it.

Top of page

Β§5 IT SECURITY DOCUMENTS

(1) The IT Security Strategy (IT-SL) provides the strategic and organisational framework for the IT security process. It is adopted by the Executive Board and reviewed on its behalf after six years at the latest.

(2) Subordinate to the IT-SL is the IT security concept (IT-SK), which is based on best practice recommendations (e.g. BSI 200-1). The IT-SK is the documentation of the IT security process. In it, the Information Security Unit and HFD-CERT record identified risks and the associated, binding technical and organisational measures. The information security concept is reviewed regularly.

(3) The framework conditions and regulations required to implement the IT-SK are documented in the IT Security Guideline (IT-SR), which is proposed by SIS and approved by the SMT. It contains descriptions of the initial situation, the basic protection measures, the implementation of IT security as an updating process and the IT infrastructure as a basic component of IT deployment and, if necessary, a specification of the tasks or roles of those involved in the IT security process. In addition, instructions on special organisational measures and guidelines for dealing with certain risks and protection requirements may be included. These are also binding and are reviewed regularly. Initially, the IT-SR can also be adopted before the IT-SK is finalised, but must be continuously developed in close coordination with the IT-SK and adopted by the SMT.

(4) Further topic-specific guidelines and work instructions are added to the IT-SR, regulations, recommendations and specifications for dealing with specific risks downstream. The same applies to emergency concepts and emergency plans. They are proposed by SIS and approved by the SMT or, depending on the scope of the the scope of validity of the respective document, by other other persons responsible for procedures or department heads, i.e. by the heads of the departments concerned, the staff units, the central administration, the central or other central or other institutions as well as the affiliated institutions of the university.

(5) In each of the documents, the respective scope of application and the respective binding nature is expressly defined. The revision intervals of the documents documents downstream of this guideline are specified in the respective document.

Top of page

Β§6 TASKS OF THE PARTIES INVOLVED

(1) The Executive Board of the university shall give the IT security process process with sufficient priority so that the tasks associated with the process can be can be carried out immediately and comprehensively.

(2) The SMT draws up and adopts the standardised framework guideline for IT security at Fulda University of Applied Sciences and is responsible for updating and monitoring the IT security process. Among other things the development of emergency plans. The SMT issues the university’s internal technical standards for IT security. In addition training and further education of the decentralised IT security security officers and support with the implementation of guidelines.

(3) The Information Security Unit is responsible for the implementation of the IT security framework guideline at the university and is supported by the SMT. supported by the SMT. It is the point of contact for all security-related issues point of contact both externally and internally. The SIS documents security-relevant incidents, prepares an annual IT security report and develops a report and develops a training and further education plan on cyber security topics for all employees of Fulda University of Applied Sciences.

(4) The dIT-SB are responsible for the implementation of the IT security process in their institution.

(5) Despite the appointment of the dIT-SB, the responsibility of the of the departments, the staff units, the central administration, the central and other central and other institutions as well as the affiliated institutions of the university for IT security in their areas remains unaffected. They are They are obliged to consult with the relevant decentralised departments in all relevant related to IT security, the respective responsible decentralised IT security officers and the SIS. The users assigned to them users of the IT infrastructure assigned to them must comply with the regulations and specifications from the IT security documents (IT-SL, IT-SK, IT-SR), the user regulations of the HFD, as well as instructions from authorised IT security roles.

(6) The University Computer Centre is responsible for the system, network and operational aspects of IT security. aspects of IT security. The computer centre provides significant support in ensuring information security and coordinates the IT emergency management. It also supports all IT-SBs, the HFD-CERT and the SMT in technical matters.

(7) The HFD-CERT is responsible for overarching coordination and, at an operational level operational level, the timely response to security incidents and computer computer misuse in the context of the use of information infrastructure. The HFD-CERT is responsible for the design and implementation of measures to prevent security incidents and minimise any damage that occurs. damage to a minimum. The HFD-CERT supports the dIT-SB and the SMT in technical technical issues and intervenes independently to avert danger in an emergency. It regularly prepares a situation report for the SMT on the IT security situation at Fulda University of Applied Sciences. The management of the HFD-CERT reports regularly to the SMT on operational measures. It also reports immediately to the SIS in acute cases. HFD-CERT members are responsible to authorised to issue instructions to users and IT operators in IT emergencies and IT incidents and crises. crisis situations.

(8) The staff council of the university is involved in accordance with accordance with Β§69 of the Hessian Staff Representation Act.

(9) Insofar as data protection issues are concerned, the university’s data protection officer* of the university is consulted.

Top of page

Β§7 REALISATION OF THE IT SECURITY PROCESS

(1) SIS shall design a university-wide information and communication communication system through which all participants in the IT security process are in contact and manages the information security management system (ISMS).

(2) The decentralised IT security officers are obliged to to obtain up-to-date security-relevant information and are supported in this by supported by SIS. In addition, the system operators shall provide the dIT-SB all requested information that is necessary for reporting to internal and external to internal and external superordinate bodies and provide this information to SIS and the HFD-CERT in a complete and structured manner. The dIT-SB shall arrange for the necessary IT security measures in their area to avert danger. To this end, they must be given the necessary competences by the management of their institution. competences by the management of their institution.

(3) Those involved in the IT security process shall inform each other immediately, comprehensively and completely about security-relevant incidents. incidents. SIS must be informed of every incident.

(4) The information security unit may disclose all information information that arises during the implementation of the IT security process in the individual individual organisations. If the information is obtained in the form of information protected under data protection law, this must be documented. If If recurring processes arise in which personal data is regularly personal data are regularly used, these processes must be described in a processing activities. Furthermore, the user concerned must be notified in the cases prescribed by law. If workplace and personnel-related data of university employees is required, the staff council must be informed. If, for example in the context of emergency, rapid action is required in a specific situation, this is is sufficient afterwards.

(5) For the continuous further development of the framework guideline for IT security framework guideline, the SMT should meet regularly, but at least twice a year. Those involved in the IT security process can submit proposals to the SMT for this purpose. to the SMT.

(6) This IT-SL shall be reviewed and updated by the SMT after 2 years, to ensure that it remains relevant and effective. Changes become effective after approval by the university management.

Top of page

Β§8 DEALING WITH SAFETY INCIDENTS

(1) The instructions of the HFD-CERT members and/or the staff unit Information Security Unit must be followed immediately in the event of an IT security incident or emergency. to be followed immediately.

(2) In the event of a breach of the IT-SL or its binding follow-up documents (see Β§5) SIS or the members of HFD-CERT may order the immediate, temporary shutdown of the affected shutdown of the IT system concerned and temporarily prevent the responsible responsible users from using the information technology. from using the information technology. In this case, the responsible dIT-SB* must be informed of the incident immediately. informed of the process.

(3) In the event of the data centre can temporarily block network connections or network segments. block them. The data centre must immediately inform HFD-CERT, the SIS and the responsible dIT-SB* about the incident.

(4) The temporarily decommissioned IT systems is subject to their thorough in-depth review and approval by the responsible dIT-SB*.

(5) The exclusion of a user temporarily blocked from using the information technology from using the information technology will be cancelled by the blocking authority as soon as proper use appears to be guaranteed again. A permanent restriction of use of an IT system is only considered in the case of serious or repeated violations if, despite prior reminders, proper operation can no longer be proper operation can no longer be expected in the future. The The decision is made by the Information Security department after detailed consultation with the SMT and the responsible dIT-SB*. Possible claims of the university and the system operator arising from the user relationship remain remain unaffected.

(6) The SMT shall determine the IT services for which the Information Security emergency plans. They contain instructions for action in situations and in the event of incidents and are divided into a generally accessible a generally accessible notification plan, an emergency concept for service use and a detailed emergency and a detailed emergency manual, which is available in printed form at the SIS and in a and in a designated room for crisis management.

(7) The HFD-CERT, together with the SIS, shall investigate all incidents and take appropriate taking appropriate remedial and preventive measures.

Top of page

Β§9 VALIDITY

This IT Security Guideline shall be valid upon its publication following a resolution by the Executive Board.

Top of page

Oct 16, 2025

IT Security Guideline (IT-SR)

VERSION 23.10.2008

VERSION 23.10.2008

The IT Security Guideline (IT-SR) was adopted on 23 October 2008 by the Presidential Board of Fulda University of Applied Sciences and has been in force since then.

Content

  1. Overview
  2. Introduction
  3. Promoting security awareness
  4. Minimum standards for the operation of a computer
  5. Minimum standards for the operation of a network
  6. Use contrary to the rules
  7. Consequences of non-compliance with the IT security policy

1. overview

Fulda University of Applied Sciences expects users of the university’s computers and networks to and networks of the university to use them responsibly. responsible behaviour when using them. In response to violations violations of the security guidelines or legal provisions Fulda University of Applied Sciences and its organisational units are entitled to withdraw access authorisations from users temporarily or permanently, delete data from Fulda University of Applied Sciences computers if necessary Fulda University of Applied Sciences and to remove computers from the network. In the event of ambiguities or in cases of dispute, the IT Security Officer of Fulda University of Applied Sciences and, in the second instance, the the head of the university’s computer centre decides on such measures. measures.

Based on the User Regulations for Computers and Networks at Fulda University of Applied Sciences, this guideline details the general rules for the use and operation of computers and networks with regard to IT security. If you notice a security-relevant event, please report it. You will find instructions in the document “Report IT security incident”.

1.A Reason

Fulda University of Applied Sciences would like to enable all users to work efficiently and undisturbed. Therefore the IT security guideline contains a list of prohibited behaviours prohibited behaviour (improper use), **which every user can demand to refrain from to protect themselves from harassment and threats and to protect the University of Fulda and its organisational units from damage and legal consequences. legal consequences. In order to ensure flawless operation operation, the IT security guideline defines standards for the security of computers, networks and data. These These are minimum requirements. The organisational units organisational units of Fulda University of Applied Sciences can stricter rules in writing for their area of responsibility.

1.B Scope of validity

The IT Security Policy is binding for all members of members of Fulda University of Applied Sciences and persons who are authorised by the use of computers and networks at Fulda University of Applied Sciences. Fulda University of Applied Sciences.

In addition, it forms the basis for reactions to all security-related incidents from outside.

1.C Version

Version 1.0 from 23 September 2008

At this point, revisions to the document are noted with a brief document with a brief summary of the changes. The guideline should be reviewed regularly (e.g. every two years) to ensure that it is be reviewed. Serious changes to the technologies used technologies used or of an organisational nature can organisational changes may result in short-term revisions.

Top of page

2. introduction

The use of computers and networks has become an everyday routine for members of the members of Fulda University of Applied Sciences. When use, it facilitates many activities and activities and some work would be inconceivable without the use of would be unthinkable without the use of computers. Negligent or even unlawful use use, on the other hand, can infringe the rights of other users. rights of other users. Fulda University of Applied Sciences therefore requires all users to careful and responsible and responsible behaviour when using computers and networks.

In principle, within the framework of the legal provisions the discretion of each individual user or the discretion of the departments or the discretion of the departments and facilities of Fulda University of Applied Sciences as to the manner in which computers and networks are used. This practised approach of maximum openness has proved its worth over the years and should be maintained. However, the experience of recent years has made it clear that there must be a generally recognised consensus which irregular use is not accepted, which [minimum standards for is not accepted, which minimum standards for the operation of a computer or a network are binding and which consequences are drawn in the event of non-compliance with the guideline.

The purpose of the IT security guideline is to formalise these topics formalise these topics and to provide all users with a uniform basis basis on which to decide which use is compliant and which measures compliant and which measures are to be taken.

Due to maximum openness, misuse cannot be ruled out a priori. be ruled out a priori. The IT security guideline is intended to to accelerate the detection of security problems in order to minimise the damage minimise the damage to each individual and to Fulda University of Applied Sciences. It is intended to serve as a guideline for one’s own actions and for judgement of the actions of others. This also reduces the probability that violations will remain without consequences.

Fulda University of Applied Sciences relies on users to report security problems to the users report security problems to the computer centre and their their responsible IT security officers (contact persons of the organisational units and the system administrators to report security problems to the computer centre. system administrators rectify recognised deficiencies in their area of responsibility themselves. The complete list of contact addresses is updated regularly.

Top of page

3. promotion of safety awareness

The following measures are intended to promote safety.

3.A Users

  • Users should keep themselves informed about changes to the to the security policy.

  • Necessary actions due to a change in the security security guideline must be carried out immediately.

  • Violations or suspected violations of the the security guideline must be reported immediately to the responsible IT security officer immediately.

  • Regular participation in training on the topic of IT security is recommended.

3.B Administrators

  • All of the above measures for users and additionally

  • Informing users about security-related incidents security-relevant incidents, threats, etc.

  • Training users, in particular on relevant topics for maintaining and increasing IT security (also for new users).

  • Providing information about vulnerabilities and threats in the software used.

Top of page

4. minimum standards for the operation of a computer

In order to ensure the proper operation of a computer or an active active network component, at least the following requirements must be met. In addition the applicable security measures of the data centre must be observed.

  1. the system must be professionally installed.
  2. . The necessary security patches or upgrades must be installed promptly.
  3. if a system does not have suitable protection mechanisms, it must be protected on the network side, e.g. by a firewall.
  4. user accesses that are no longer used must be removed.
  5. passwords must be changed immediately if they have fallen into unauthorised hands or there is a suspicion that they have become known to unauthorised persons and secure passwords or stronger authentication authentication methods (e.g. public key) must be used. must be used.
  6. passwords may not be sent in plain text across the the boundaries of the university network and should also not be within the university network in plain text if possible. transmitted in plain text.
  7. passwords should never be stored on the hard drive to avoid entering them in a programme.
  8. if a procedure is introduced or significantly changed, in which personal data is processed, a [record of processing activities pursuant to record of processing activities pursuant to Article 30 GDPR must be drawn up beforehand. The result must be sent to the data protection officer of Fulda University of Applied Sciences.

If a user of a computer becomes aware of security security deficiencies, he or she is obligated to report the deficiencies to the person responsible for system administration. responsible for system administration or, if he or she does not know the person person, the IT security officer of the organisational unit. organisational unit. The IT security officer is obliged obliged to report information known or made known to him or her about security deficiencies of a computer to the person person responsible for system administration. This person in turn is obliged to take appropriate countermeasures. take appropriate countermeasures.

Top of page

5. minimum standards for the operation of a network

A network operation within the meaning of this guideline exists if dedicated network hardware (e.g. router) is operated or network services are offered at the logical level, such as NAT gateways, DNS or DHCP servers.

  1. at least one responsible person must be named for each area (subnet, IP area, DNS domain) at least one responsible person must be named for each area (preferably several persons, so that in the event of errors or security incidents responsible person can always be contacted in the event of errors or security incidents) who is also technically capable of carrying out emergency measures.

  2. access to the network must not be uncontrolled. The access to the network must be either physical (closed room) or administratively regulated by access lists, VPN access or similar. be regulated.

  3. if IP addresses are assigned, it must be possible to trace who or which device had an IP address at a certain time. time.

  4. the locations of all components in the network, including those of the of the connected computers, must be known to the responsible persons must be known.

  5. the names and / or addresses of the network components (including the computers) should be visible on the be visible on the outside of the device.

Top of page

6. improper use

The rule violations defined in the security guideline are categorised into the following four areas. Behaviour sanctioned under criminal law sanctioned behaviour is always against the rules.

6.A Use of electronic communication to attack individuals or groups of individuals

(A1) Disseminating or circulating information that insults or degrades individuals (e.g. on the basis of their skin colour, nationality, religion, gender, political opinions or sexual orientation).
A2)
A3) Multiple unsolicited sending of messages.

6.B Use of electronic communications to obstruct the work of others

B1) Obstructing the work of others (e.g. through mail bombs and similar techniques).
B2) Appropriation of resources beyond what is authorised (e.g. extreme data traffic).
B3) Sending electronic mass mailings (e.g. SPAM e-mails). Exception: distribution of official messages in analogy to internal mail.
B4) Forwarding or circulating electronic chain letters.
B5) Unauthorised manipulation of electronic data of others.
B6) Accessing third party data without their permission.

6.C Offences against licence agreements or other contractual provisions

C1) The use, copying and distribution of copyrighted material in contravention of the Copyright Act, the Statutes of Fulda University of Applied Sciences for Safeguarding Good Scientific Practice, licence agreements or other contractual provisions on computers of Fulda University of Applied Sciences or the transport of these documents via networks of Fulda University of Applied Sciences.
C2) Infringement of copyright by falsification of electronic documents.
C3) Passing on access authorisations to third parties (e.g. accounts, passwords, Fulda University chip cards)

6.D Use of electronic communication for attacks against computers, the network or services provided on it

The following violations must be reported to the respective IT security officer of the organisational unit and of Fulda University of Applied Sciences!

D1) Systematic investigation of servers and services (e.g. port scans). Exception: Security tests after consultation with the person responsible for system administration.
D2) Unauthorised appropriation of access authorisations or attempts to do so (e.g. cracking). Exception: security tests after consultation with the person responsible for system administration.
D3) Damage to or disruption of electronic services (e.g. denial of service attacks).
D4) Intentional dissemination or circulation of malicious programmes (e.g. viruses, worms, Trojan horses).
D5) Spying on passwords or attempting to spy on them (e.g. password sniffer).
D6) Unauthorised manipulation or falsification of identity information (e.g. email headers, electronic directories, IP spoofing, etc.).
D7) Exploitation of recognised security flaws or administrative deficiencies.

Top of page

7. consequences of non-compliance with the security policy

Experience has shown that most violations result from result from ignorance of the security guideline or technical inadequacy. In such cases, it will be sufficient if the perpetrator is informed about the violation of the violation of the security guideline of the Fulda University of Applied Sciences and demanded to refrain from further violations is demanded. In the event of breaches of licence agreements, the deletion of the corresponding data on the affected computers. If it can be assumed that recognised violations will also affect other departments, institutions or organisations (including those outside Fulda University of Applied Sciences) Fulda University of Applied Sciences, the responsible persons concerned and possibly the Fulda University Computer Centre must be informed (e.g. Blocking a user who also has access authorisations on other computers access authorisations on other computers).

If the direct request is unsuccessful or the identity of the identity of the perpetrator cannot be determined, the computer centre cannot be determined, the computer centre of Fulda University of Applied Sciences should be involved in solving the problem. Contact with the computer centre should best be centre via the e-mail address provided for this purpose. provided for this purpose.

In addition to the description of the problem, it should always be explicitly stated which point of the security policy has been violated. has been violated. In case of disagreement about the correctness of the complaint the IT security officer of Fulda University of Applied Sciences and, in the second instance second instance, the head of the computer centre.

7.A Measures taken by the computer centre

  1. the data centre will ask the person responsible for the network or computer responsible for the network or computer to stop rule violations, if necessary, block the access authorisation of the perpetrator. block the access authorisation of the perpetrator and, in the event of breaches of licence agreements information concerned from the computers in the event of breaches of licence agreements.

  2. the computer centre carries out regular checks on aspects of the IT security policy. If violations of the policy are detected (e.g. due to the activities of installed malware), the data centre reserves the the computer centre reserves the right to contact the user by telephone and and deactivate the user account. Activation of the account is only possible on site after prior consultation.

  3. if the person responsible cannot be contacted or is unable or unwilling to able or unwilling to prevent such violations, the computer centre is the computer centre is obliged to inform the next higher authority (e.g. the dean) of the grievances and to instruct him or her to rectify them. and request that he or she rectify them.

  4. if the measure in point 2 is also unsuccessful, the computer centre is computer centre is entitled to remove the computer in question from the network from the network or to block the services concerned or, if necessary, an entire subnetwork. block.

  5. if circumstances so require (imminent danger), the data centre can also carry out blocks without consulting the the respective person responsible. The data centre is obliged in such data centre is obliged in such cases to inform the data possible) and the next higher authority immediately afterwards about the measures taken.

  6. incidents that are relevant under criminal law, e.g. due to possible claims for compensation for damages, damage, must always be forwarded to the President of Fulda University of Applied Sciences.

  7. in addition, the perpetrator may be required to provide written acknowledgement of the IT Security Policy. may be requested.

7.B Measures taken by the University, State and City Library (HLSB)

The measures taken by the University, State and City Library are set out in the “User Regulations of the Fulda University of Applied Sciences Sciences for the University, State and City Library (HLB) of 28 March 2019” in "Β§ 22 Exclusion from use".

Top of page

Oct 16, 2025

Subsections of IT Security Guideline (IT-SR)

User regulations

VERSION 26.11.2021

The regulations for the use of computers and networks at Fulda University of Applied Sciences were adopted by the Executive Board of Fulda University of Applied Sciences on 23 October 2008 and amended on 29 May 2013 and 25 November 2021. The extended user regulations come into force on 26 November 2021.

Content

Preamble

Fulda University of Applied Sciences, its departments and facilities operate an information processing and communication infrastructure (IT infrastructure) consisting of information processing systems (computer systems) and a multiservice communication network for the transmission of data, images and voice. The IT infrastructure is integrated into the global Internet.

These terms of use regulate the conditions under which the services offered by this infrastructure can be used. They

  • are based on the legally defined tasks of Fulda University of Applied Sciences and its mandate to safeguard academic freedom;

  • establish basic rules for the proper operation of the IT infrastructure;

  • points out the rights of third parties that must be observed (e.g. with regard to software licences, network operator requirements, data protection aspects);

  • obliges users to behave correctly and use the resources offered economically;

  • obliges the operators to operate the system correctly;

  • informs about possible measures in the event of violations of these user regulations;

  • regulates the details of user registration and computer operation.

The individual organisational units of Fulda University of Applied Sciences can define additional regulations for user registration and computer operation.

Top of page

Β§ 1 Scope

These Terms of Use apply to the IT infrastructure operated by Fulda University of Applied Sciences, consisting of information processing systems, communication systems and other auxiliary facilities.

Top of page

Β§ 2 User group and tasks

  • The IT resources specified in Β§ 1 are available to members and affiliates of Fulda University of Applied Sciences for the fulfilment of their tasks in research, teaching, administration, training and further education and public relations work at the university.

  • Other persons and institutions may be authorised to use them.

Top of page

Β§ 3 Authorisations for use

  1. a formal user authorisation (e.g. user ID, network connection, network access) from the responsible system operator is required to use the IT resources in accordance with Β§ 1.

  2. the use of computer-based services (e.g: e-mail address, internet access, extensive computing time or storage capacity, use of PC pools) is regulated as required in the respective user regulations of the central facilities and departments.

  3. the connection of computers to the university network can only be requested by university staff (professors, employees) via their respective system administrators. They will provide information on rights and obligations and record the required data.

  4. the system operator is

    1. the computer centre for the university network, central systems and services,

    2. for decentralised systems, an organisational unit of Fulda University of Applied Sciences (department, institute, working group, facility or other sub-unit of the university).

  5. The application for a formal user authorisation should contain the following information:

    1. system operator from whom the user authorisation is requested;

    2. systems for which the user authorisation is requested;

    3. applicant: name, address, telephone number and, if available, email address (for students additionally the matriculation number) as well as affiliation to an organisational unit of the university;

    4. information on the purpose of use, e.g. education/teaching, research, administration;

    5. information on whether personal data is processed;

    6. a declaration that the applicant recognises the current version of the user regulations and consents to the collection, processing and use of his/her own personal data for the purpose of user administration, in particular in accordance with Section 6 (5), (6) and (7) of these user regulations. The applicant is obliged to inform himself/herself about changes to the user regulations and to return his/her user authorisation if he/she does not agree to the changes.

    The system operator may only request further information if this is necessary for the decision on the application.

  6. The responsible system operator shall decide on the application. He may make the granting of user authorisation dependent on proof of certain knowledge about the use of the system.

  7. the user authorisation shall be granted if

    1. the project is compatible with the purposes according to Β§ 2 number 1 of these user regulations;

    2. it appears to be guaranteed that the applicant will fulfil his or her obligations as a user;

    3. the system is suitable for the intended use and is not reserved for special purposes;

    4. the capacity of the system for which use is requested is sufficient for the intended work despite existing capacity utilisation;

    5. it is not to be expected that the requested use will unreasonably interfere with other authorised uses.

  8. the user authorisation only entitles the user to carry out work in connection with the requested use.

  9. the user authorisation ends upon notification by the user or if he/she leaves the group of authorised users. The Student Service Center (SSC) informs the Computer Centre of every de-registration and the Human Resources Department informs it of every departure of staff members so that the corresponding user authorisations can be blocked. The Computer Centre informs the system operators of the other organisational units of Fulda University.

top of page

Β§ 4 Legal integration

The IT infrastructure may only be used in a legally correct manner. Users and operators must inform themselves about the relevant provisions of the Hessian Data Protection and Freedom of Information Act (HDSIG) and other laws (see also laws/data protection). It is expressly pointed out that the following activities, among others, are punishable:

  1. spying (Β§ 202a StGB) and interception (Β§ 202b StGB) of data;

  2. preparation of spying and interception of data (Β§ 202c StGB).
    Note: The activities of the system administrators in accordance with Section 6 (5) to (7) of this document do not violate Section 202c, as the users have agreed to these activities when applying for user authorisation;

  3. unauthorised modification, deletion, suppression or rendering unusable of data (Β§ 303a StGB);

  4. computer sabotage (Section 303b StGB) and computer fraud (Section 263a StGB);

  5. the dissemination of propaganda material of unconstitutional organisations (Section 86 StGB) or racist ideas (Section 130 StGB);

  6. the distribution and possession of certain forms of pornography on the Internet (Sections 184, 184a, 184b StGB);

  7. offences of honour such as insult or defamation (Β§ 185ff StGB), insults to denominations, religions or world views (Β§ 166 StGB);

  8. copyright offences, e.g. by copying software in breach of copyright or entering protected works and distributing them via the IT infrastructure (Sections 106ff UrhG).

In some cases, even the attempt is punishable.

Top of page

Β§ 5 Rights and obligations of users

  1. the IT resources according to Β§ 1 may only be used for the purposes specified in Β§ 2 number 1 of these user regulations. Any use deviating from this may be permitted if it is minor and does not impair the purpose of the University Computer Centre or the interests of other users.

  2. central systems and services of the computer centre may be used by all members and affiliates of the university, decentralised systems may generally only be used by members and affiliates of the corresponding organisational unit.

  3. users are obliged to ensure that existing resources (e.g. workstations, CPU capacity, disk storage space, line capacity, peripheral devices and consumables) are used responsibly and economically. Users are also obliged to refrain from causing any foreseeable disruption to operations and, to the best of their knowledge, to avoid anything that could cause damage to the IT infrastructure or to other users. Infringements may give rise to claims for damages and lead to exclusion from use (see also Β§ 8 of these user regulations). Users are also obliged to comply with the IT Security Policy of Fulda University of Applied Sciences and to implement all necessary measures for basic protection of the IT infrastructure of Fulda University of Applied Sciences.

  4. users must refrain from any kind of misuse of the IT infrastructure. In particular, they are obliged to do so:

    1. to work exclusively with user authorisations that they have been permitted to use; the passing on of user IDs (user name/password) is generally not permitted;

    2. protect the second factor for two-factor authentication and only use the factors that have been provided to you by the data centre; passing on the second factor is generally not permitted; you can find further information on two-factor authentication in the “Basic protection” document;

    3. to protect access to IT resources as far as possible, e.g. by means of a password that must be kept secret or an equivalent procedure;

    4. to take precautions to prevent unauthorised third parties from accessing IT resources; this includes, in particular, avoiding obvious passwords, changing passwords immediately if they fall into the wrong hands or if there is a suspicion that they have become known to unauthorised persons and not forgetting to log out of the system before leaving the room;

    5. not to identify or use unauthorised user IDs and passwords;

    6. not to gain unauthorised access to information of other users and not to pass on, use or change information of other users that has become known without permission;

    7. to comply with the statutory regulations (copyright protection, copyright etc.) when using software (sources, objects), documentation and other data;

    8. to inform themselves about the conditions under which the programmes, documentation or data, some of which have been acquired under licence agreements, are made available and to observe these conditions;

    9. not to copy or pass on software, documentation and data, unless expressly authorised, nor to use them for purposes other than those permitted, in particular not for commercial purposes. Infringements may give rise to claims for damages (Β§ 5, clause 9) and result in a restriction of the user authorisation (Β§ 8).

Users bear full responsibility for all actions carried out under their user ID, even if these actions are carried out by third parties to whom they have at least negligently granted access.

  1. users are prohibited from using the system without the consent of the responsible system operator

    1. to interfere with the hardware installation;

    2. to change the configuration of the operating systems, programmes or the network.

  2. users are obliged to create a record of processing activities in accordance with Article 30 GDPR before introducing and before making significant changes to a procedure in which personal data is processed. The result must be sent to the data protection officer of Fulda University of Applied Sciences. The project must also be coordinated with the respective system operator. The data protection precautions proposed by the data protection officer and the system operator must be used.

  3. Users are obliged to

    1. to observe the guidelines for use provided by the system operator;

    2. to provide the person responsible for the system with information on programmes and methods used for monitoring purposes in justified individual cases upon request (in particular in the event of justified suspicion of misuse and for troubleshooting). This regulation does not cover user data that is protected by telecommunications secrecy or data secrecy, e.g. personal files or personal data of third parties;

    3. to inform themselves about the respective local and system-related conditions and regulations before installing software and to comply with these. Students may not install any software on the computers of Fulda University of Applied Sciences or download any binary files (pre-translated programmes, libraries, etc.) from the Internet and then run them on the computers of Fulda University of Applied Sciences.

  4. users as providers of WWW information:

    1. are responsible for the content of their web pages;

    2. must indicate the imprint on every web page.

  5. Liability of the users

    1. users shall be liable for all disadvantages incurred by Fulda University of Applied Sciences as a result of misuse or unlawful use of the IT infrastructure and user authorisation or as a result of their culpable failure to comply with their obligations under these user regulations. The university may demand that misused resources and other costs be reimbursed by such users in accordance with the Fee Regulations.

    2. users are also liable for damages caused by third-party use within the scope of the access and usage options made available to them if they are responsible for this third-party use, in particular if they have passed on their user ID to third parties. In this case, the university may charge these users a fee for third-party use in accordance with the fee regulations.

    3. users shall indemnify the university against all claims if third parties assert claims against the university for damages, injunctive relief or in any other way due to abusive or unlawful behaviour on the part of the user.

Top of page

Β§ 5a Obligation of use for students

Upon enrolment, students receive a user ID (fd number) and an e-mail address. The university uses these exclusively to send information to its students. Students are obliged to check these e-mails regularly and to check their e-mail account regularly for incoming messages. When applying for a user ID, students are informed of their obligation to use this e-mail address.

top of page

Β§ 6 Tasks, rights and obligations of the system operators

  1. the system operator may maintain a user file containing the personal data of the users via the user authorisations granted. An overview of the type of information stored must be accessible to each user. The application documents for the granting of user authorisations must be kept for at least two years after the authorisation expires.

  2. the system operator is entitled to verify the identity of a person before issuing a user authorisation. The verification can be carried out on site using a photo ID or via a video conference.

  3. the system operator shall disclose the persons responsible for managing its systems. The system operator and the system administrators are obliged to maintain confidentiality.

  4. the system operator may temporarily restrict the use of its resources or temporarily block individual user IDs if this is necessary to rectify faults, for system administration and expansion or for reasons of system security and to protect user data. If possible, the affected users must be informed immediately.

  5. if there are reasonable indications that a user is making illegal content available for use on the system operator’s servers, the system operator may prevent further use until the legal situation has been sufficiently clarified.

  6. the system operator is entitled to check the security of user passwords and user data by means of regular manual or automated measures and to implement necessary protective measures, e.g. changes to easily guessable or outdated passwords, in order to protect IT resources and user data from unauthorised access by third parties. The user must be informed immediately of any necessary changes to user passwords, access authorisations to user files and other protective measures relevant to use, insofar as this is possible.

  7. The system operator is authorised to document and evaluate the use of the data processing systems by the individual users for the following purposes:

    1. to ensure proper system operation,

    2. for resource planning and system administration,

    3. to protect the personal data of other users,

    4. for billing purposes,

    5. for the detection and elimination of faults and

    6. for the clarification and prevention of unlawful or improper use.

The system operator keeps an overview of the data collected for these purposes, which can be viewed by every user.

  1. for the purposes listed under section 6, the system operator is also authorised to inspect the user files insofar as this is necessary to eliminate current faults or to clarify and prevent violations of the user regulations and there are actual indications of this. Data secrecy and the dual control principle must be observed.

    However, inspection of the message and e-mail mailboxes is only permitted if this is essential to rectify current disruptions in the message service. In any case, the inspection must be documented and the person concerned must be informed immediately after the purpose has been achieved. In the event of substantiated indications of criminal offences, the system operator shall act in consultation with the university management in consultation with the competent authorities and, if necessary, shall take measures to preserve evidence.

  2. system operators who offer users independent homepages on the WWW_Server_ for publication on the Internet are authorised to automatically generate an imprint on these pages, which contains the full name and e-mail address of the author.

    The logging of connection data (e.g. access to the database of a WWW_Server_) may not contain any personal data.

  3. in accordance with the statutory provisions, the system operator is obliged to maintain telecommunications and data secrecy.

Top of page

Β§ 7 Liability of the System Operator/Disclaimer

  1. the system operator does not guarantee that the system functions will meet the user’s specific requirements or that the system will run error-free and without interruption. The system operator cannot guarantee the integrity (in terms of destruction, manipulation) and confidentiality of the data stored by the system operator.

  2. the system operator shall not be liable for damages of any kind incurred by users from the utilisation of IT resources in accordance with Β§ 1 of these user regulations, unless otherwise stipulated by law.

Top of page

Β§ 8 Consequences of improper or unlawful use

In the event of violations of legal regulations or of the provisions of these user regulations, in particular Β§ 5 (Rights and obligations of users), the system operator may restrict the right of use. It is irrelevant whether the offence has resulted in material damage or not. Measures to withdraw or restrict user authorisation, which are decided on by the head of the facility, should only be taken after a prior unsuccessful warning. The person concerned must be given the opportunity to comment.

Top of page

Β§ 9 Other regulations

  1. charges or fees may be set for the use of IT resources. The fee schedule of the respective system operator shall apply.

  2. supplementary or deviating rules of use may be defined for individual systems as required.

  3. the responsible university body shall decide on amendments to these terms of use. The computer centre and the other system operators must be given the opportunity to comment beforehand.

top of page

Oct 25, 2025

Legal framework

Content

  1. Overview 2 Hessian Higher Education Act 3 Hessian Matriculation Ordinance
  2. Hessian Data Protection and Freedom of Information Act
  3. Criminal Code
  4. Telecommunications Act 7 Digital Services Act
  5. Copyright Act

1. overview

The legal texts are available from the Federal Ministry of Justice (https://www.gesetze-im-internet.de), on Hesse Law (https://www.rv.hessenrecht.hessen.de) or at the Hessian Commissioner for Data Protection and Freedom of Information (https://datenschutz.hessen.de/infothek/gesetze) and can be read there or downloaded as a downloaded as a PDF file.

Hessian IT Security Act - HITSiG https://www.rv.hessenrecht.hessen.de/perma?a=ITSiG_HE
General Data Protection Regulation (GDPR) https://eur-lex.europa.eu/eli/reg/2016/679/oj
Federal Data Protection Act (BDSG) https://www.gesetze-im-internet.de/bdsg_2018
The Federal Commissioner for Data Protection and Freedom of Information https://www.bfdi.bund.de
Hessian Higher Education Act https://www.rv.hessenrecht.hessen.de/…
Hessian Matriculation Ordinance https://www.rv.hessenrecht.hessen.de/…
Hessian Data Protection and Freedom of Information Act https://www.rv.hessenrecht.hessen.de/…
The Hessian Commissioner for Data Protection and Freedom of Information https://www.datenschutz.hessen.de
German Criminal Code https://www.gesetze-im-internet.de/stgb/index.html
Telecommunications Act https://www.gesetze-im-internet.de/tkg_2021/index.html
Digital Services Act https://www.gesetze-im-internet.de/ddg/
Copyright and Related Rights Act https://www.gesetze-im-internet.de/urhg/index.html

Top of page

The following is a selection of paragraphs from some laws, relevant for research and teaching or IT security. are relevant.

2. Hessian Higher Education Act

Β§ 14 HessHG Quality assurance, reporting
Β§ 17 HessHG Student Counselling
Β§ 34 HessHG Research with third-party funds
Β§ 61 HessHG Enrolment, Guest Auditors

top of page

3rd Hessian Matriculation Ordinance

Β§ 3 HSchulImmV Matriculation
Β§ 5 HSchulImmV Student ID card, student handbook
Β§ 14 HSchulImmV Processing of examination data
Β§ 15 HSchulImmV Processing of personal data
Β§ 16 HSchulImmV Data for university statistics
Β§ 17 HSchulImmV Transmission of data to the student body and the student union
Β§ 18 HSchulImmV Transmission of data to the library
Β§ 19 HSchulImmV Transmission of data to the ministry responsible for higher education
Β§ 20 HSchulImmV Transmission of data to the responsible health insurance fund
Β§ 21 HSchulImmV Retention periods for documents of university examinations and proof of studies
Β§ 22 HSchulImmV Data protection

Top of page

4. Hessian Data Protection and Freedom of Information Act

Section 1 HDSIG Scope of application
Section 3 HDSIG Processing of personal data, commissioned processing
Section 22 HDSIG Data transfers by public bodies
Section 31 HDSIG Duty to provide information when collecting personal data from the data subject
Section 32 HDSIG Duty to provide information if the personal data was not collected from the data subject
Section 33 HDSIG Right of access by the data subject
Section 34 HDSIG Right to erasure (“right to be forgotten”)
Section 35 HDSIG Right to object
Section 37 HDSIG Criminal provisions
Section 38 HDSIG Provisions on fines

Top of page

5th Penal Code

Β§ 86 StGB Dissemination of propaganda material of unconstitutional organisations
Section 130 StGB Incitement of the people
Section 166 StGB Insulting denominations, religious societies and ideological organisations
Β§ 184 StGB Distribution of pornographic writings
Β§ 184a StGB Distribution of violent or animal pornographic writings
Β§ 184b StGB Distribution, acquisition and possession of child pornography
Β§ 185ff StGB Insult, Defamation, Slander, etc.
Β§ 202a StGB Spying on data
Β§ 202b StGB Interception of data
Section 202c StGB Preparation of spying and interception of data
Section 202d StGB Data theft
Section 263a StGB Computer fraud
Section 303a StGB Data alteration
Β§ 303b StGB Computer sabotage

Top of page

6th Telecommunications Act

Β§ 174 TKG Manual information procedure (Data retention only affects service providers that are publicly accessible. If the services are only accessible to members of Fulda University (computers can only be used with user ID and password in the computer network), these paragraphs do not apply).
Section 175 TKG Obliged parties; compensation
Section 176 TKG Obligations to store traffic data
Section 177 TKG Use of the data
Section 178 TKG Ensuring the security of data
Section 179 TKG Logging
Β§ 180 TKG Catalogue of requirements
Β§ 181 TKG Security concept
Β§ 182 TKG Requests for information from the Federal Intelligence Service

Top of page

7th Digital Services Act

Β§ 5 DDG General information obligations
Β§ 6 DDG Special information obligations for commercial communications
Β§ 33 DDG Provisions on fines

Top of page

8. copyright law

Β§ 60a-h UrhG Legally authorised uses for teaching, science and institutions
Section 69a-g UrhG Special provisions for computer programmes
Section 106 UrhG Unauthorised use of copyright-protected works
Section 107 UrhG Unauthorised affixing of the copyright notice
Section 108 UrhG Unauthorised interference with related rights
Section 108a UrhG Unauthorised commercial exploitation
Section 108b UrhG Unauthorised interference with technological protection measures and information required for rights management

Top of page

Jan 5, 2025

Subsections of Legal framework

Data Privacy

Content

  1. Legal bases
  2. Personal data
  3. Legal bases for processing
  4. Protection mechanisms
  5. Deleting files
  6. Printing personal data
  7. General information

1. legal bases

The legal bases are

  • the Regulation (EU) 2016/679* of the European Parliament and of the Council of European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation GDPR), which has been in force since 25 May 2018, and

  • the Hessian Data Protection and Freedom of Information Act (HDSIG) in the version dated 3 May 2018, which supplements the to the GDPR for the processing of personal data by the public the public authorities of the state, municipalities and districts applies.

The Federal Data Protection Act (BDSG) essentially applies to federal authorities.

Top of page

2. personal data

The subject of data protection is personal data. Personal data is any information relating to an identified or identified or identifiable natural person (“data subject”) (“data subject”) (Art. 4 No. 1 GDPR). A natural person is regarded as identifiable, directly or indirectly, in particular by reference to an identifier identifier such as a name, an identification number, location data, to an online identifier or to one or more specific special characteristics that express the physical, physiological, genetic, psychological physical, physiological, genetic, mental, economic, cultural or social social identity of that natural person, can be identified.

Top of page

3. legal bases of the processing

Insofar as the processing of personal data requires the the consent of the data subject is required, Art. 6 para. 1 lit. a GDPR serves as the legal basis.

In the processing of personal data necessary for the fulfilment of a contract to which the data subject is a person is a party to, Art. 6 para. 1 lit. b GDPR serves as the legal basis. This also applies to processing operations that are necessary for the performance of pre-contractual measures.

Insofar as the processing of personal data is necessary for the fulfilment is necessary for compliance with a legal obligation to which the Fulda University of Applied Sciences is subject to, Art. 6 para. 1 lit. c GDPR serves as the legal basis.

In the event that vital interests of the data subject or another natural person or another natural person require the processing of personal of personal data, Art. 6 para. 1 lit. d GDPR serves as the legal basis.

If the processing is necessary for the performance of a task carried out necessary for the performance of a task carried out in the public exercise of official authority vested in Fulda University of Fulda University of Applied Sciences, Art. 6 para. 1 lit. e GDPR in conjunction with a relevant, specialised federal or state law as the legal basis for the processing.

Top of page

4. protection mechanisms

  1. the processing of personal data on publicly accessible accessible workstations is prohibited.

  2. workstations in offices must be specially protected protected if personal data is processed on them. are processed on them.

  • The office must be locked when it is is left.

  • The login to the computer must be protected by a secure password protected be protected.

  • Starting the workstation computer (boot process) must be protected by a password (“BIOS password”, see sections “Functions” and “Security” in the German explanation of the BIOS or better explained in the section “Configuration” in the English explanation for the BIOS). This protection must also be effective if an intruder can access the computer with his own CDROM, DVD, a memory stick or something similar. wants to start the computer. If the computer does not have such password protection, the personal data may not be personal data encrypted on the hard disc. stored on the hard disc.

  • The computer must either be secured against theft against theft or it may only be operated with removable hard drives that are stored in a burglar-proof cabinet at night.

  • On portable data carriers (hard disks in notebooks, removable discs, CDROM, DVD, memory stick, etc., personal data may be stored only encrypted.

  • On network drives of the university, the Hessenbox and similar external storage media sensitive personal research data may be stored in accordance with Art. 9 GDPR, which regulates the processing of which regulates the processing of special categories of personal data only encrypted may be stored. The encryption of the data is the responsibility of the person who stores the data on data on these storage media.

  1. if the computer’s operating system supports the protection of protection of personal data, the appropriate protection mechanisms must be used.

Top of page

5. deletion of files

The normal command for deleting a file only deletes the name of the file from internal system lists (e.g. the file directory), while the file content is not destroyed. Memory areas of deleted files can, under certain circumstances (with some effort and appropriate knowledge) into readable files again. readable files. Destroying the file contents is only possible with special operating system commands (these commands are only provided by provided by some operating systems) or special programmes. programmes.

If a data carrier on which personal data is stored has been is to be released for general operation or deleted, all file contents must first be destroyed.

Top of page

6. printing personal data

Personal data may only be printed out if the printout is personally personally supervised.

Top of page

7. general notes

Any person who works with personal data, should carry out their work particularly responsibly, as all protection mechanisms only fulfil their purpose if they are are taken seriously by those involved.

Finally, a few general tips:

  1. do not leave any written documents lying around from which that reveal your passwords.

  2. do not allow any other person to work under your work under your ID.

  3. collect output lists and data carriers with personal data personal data in person instead of sending them send them.

  4. do not leave portable data carriers (CDROM, DVD, memory stick, etc.) with personal data lying around. lying around, but lock the data carriers in a burglar-proof in a burglar-proof cabinet before you leave the office. leave the office.

  5. store personal data on portable data carriers data carriers only in encrypted form.

**Remember that you personally are primarily responsible responsible for the protection of the data entrusted to you.

Top of page

Oct 16, 2025

Administrative regulations of the Hessian ministries

Content

  1. Overview
  2. Information security guideline for the Hessian state administration

1. overview

The administrative regulations are published on the page Hesse Law - Legal and administrative regulations (https://www.rv.hessenrecht.hessen.de) and can be read or downloaded there. downloaded there.

Information Security Guideline for the Hessian State Administration https://www.rv.hessenrecht.hessen.de/…

top of page

2. information security guideline

for the Hessian State Administration

The Information Security Guideline for the Hessian State Administration State Administration was issued by the Ministry of the Interior and for Sport on 01 November 2021 and published on 22 November 2021 in the State Gazette on 22 November 2021. Please select in the State Gazette on the left-hand side in the 2021 in the annual overview on the left, then in the table of contents issue 47/2021 and then page 1517 if you want to read the publication. want to read the publication.

The regulations of the Information Security Guideline for the Hessian State Administration are based on, among other things the Basic Protection Standards and the Guideline for Information Security in Public Administration. public administration](https://www.it-planungsrat.de/fileadmin/beschluesse/2019/Beschluss2019-04_TOP12_Anlage_Leitlinie.pdf).

Top of page

Oct 16, 2025

Basic IT-Security

Content

  1. Overview
  2. Necessary and helpful programmes (technical protection)
  3. Passwords and two-factor authentication
  4. Personal behaviour
  5. Measures in the event of a virus attack
  6. System administration
  7. Wireless networks (WLAN) / Server
  8. Data encryption
  9. Disposal of computers, printers and data carriers
  10. Further information

1. overview

This document describes which programmes should at least be installed on the computers computers at Fulda University of Applied Sciences and how these programmes programmes must be configured so that a certain “basic security” is available. Since even the best security measures do not offer any protection if the users circumvent the users circumvent the protection or do not take the measures seriously measures seriously, there are also some tips on user behaviour. behaviour.

In the settings instructions from chapter 2 onwards “Start > … > …” means that you start with the Start entry in the menu bar (generally at the bottom left of the screen) and then click on an entry in the menu screen) and then start with an entry in the menu, a tab or another tab or another element that has the corresponding label. corresponding labelling.

Top of page

2. necessary and helpful programmes

(technical protection)

In order for you to be able to work with the computer at all, it requires an operating system. The operating system must always be up to date so that all known security security holes" are “plugged”. If the operating system provides an “Automatic Update” is available, this feature should be activated, as the security holes are then closed as quickly as possible. closed as quickly as possible. The current Windows operating systems from Microsoft offer this function. With Windows 10 you can you cannot actually prevent the system from updating automatically so you don’t have to do anything. If you nevertheless still want to start a manual search for updates, click in Windows 10 with the right mouse button on “Start” and then on “Settings”. Then click then click on “Updates and security” and then on “Check for updates” to start a search for current versions to start a search for current versions.

Access to the computer from the Internet or from programmes programmes on the computer to the Internet should be monitored and controlled. This task is performed by a firewall. Although all computers at Fulda University are protected by a central firewall, a local *firewall nevertheless a local firewall should be set up on each computer to protect computers within the university network (intranet). (intranet), which may be poorly maintained and therefore and are therefore infected with malware (viruses, worms, Trojans, etc.), etc.). In addition, the local firewall may be able to prevent malware from spreading from an infected computer to other computers in the from spreading from an infected computer to other computers at the university. Under Windows, for example, you can use the Windows firewall, which is included as standard in the newer Windows operating systems. Click with the left mouse button on “Start” and then select “Windows Security” (at the bottom of the programme list) if you are using Windows 10. There you should see for “Firewall & Network Protection” should say “No action required.” should be displayed. If actions are required, click on “Firewall & network protection” and then successively on “Domain network”, “Private network” and “Public network” and switch the switch there “Windows Defender Firewall” to “On”. **On Portable computers (notebooks) must have a firewall set up.

Every computer must be protected against malware (viruses, worms, Trojans, etc.) by an antivirus programme. The university Fulda uses the Sophos Intercept programme for this purpose, which must be used on all university computers. Please check all formatted attachments (Word, Excel, PDF, …) of emails for malware before you open the attachments with the corresponding programmes. open the attachments with the corresponding programmes. Further information (also for private computers) can be found on the Virus protection (Sophos) page of the computer centre.

Of course, you not only want to protect your computer but also use it. The required security settings for your email programme can be found in the separate document E-Mail and the settings for your for your web browser in the document web browser, as the number of different products is beyond the scope of this document. number of different products is beyond the scope of this document. the scope of this document. You can also open these documents via the navigation bar. The security settings for your other programmes should be researched in the Help of the programme or on the Internet.

Remember to update all programmes automatically or at least or at least regularly, so that you can prevent malware and hackers as difficult as possible.

Top of page

3. passwords and two-factor authentication

Choose a good password and keep it secret. The document Passwords describes how to create a good password and how to change it. change it. Please be sure to observe the following instructions.

  1. never give your password to other people, as you as you may be held responsible for this, if your user account (Account) is misused by other people. misused by other persons.

  2. do not write down your password or at least keep it far away at least far away from your computer and without any recognisable reference to your user account (never in the same room).

  3. never save your passwords in files or programmes to programmes to “make your work easier”, as they can otherwise be otherwise they can be read and misused by malware. by malicious software.

  4. change your password immediately if it has fallen into hands or if you suspect that it has become known to unauthorised it has become known to unauthorised persons.

  5. use different passwords for different computers or different computers or activities.

  6. never use your user name and password for competitions for competitions or similar.

  7. never use a password on any Internet site that is similar or even the same as your own password or even the same as your own password, as this will give a potential “hacker” an opportunity to break into your computer if these details are stored in plain text.

  8. if you have forgotten your password, you can a new password at the computer centre. at the computer centre. Your identity can be verified on site using a photo ID or via a video conference. video conference.

  9. protect the booting of your computer (the so-called boot process) with a password (the so-called (the so-called “BIOS password”, see sections “Functions” and “Security” in the German explanation of the BIOS or better explained in the section “Configuration” in the English explanation BIOS](https://en.wikipedia.org/wiki/BIOS)) if you store personal or other sensitive data on the computer. personal or other sensitive data on the computer. This protection must also be effective if an intruder uses the computer with its own CDROM, DVD, a memory stick or something similar. wants to start the computer. If the computer does not have such BIOS password protection, personal data may not be personal data only encrypted on the hard disc. stored on the hard disc.

Access to some functions of some applications (e.g. in the Huniversity Organisation System for **study and teaching (“horstl”)) is restricted for some persons (e.g. employees and lecturers) by means of a two-factor authentication (often also referred to as “two-factor authentication”), so that these persons must identify themselves legally by a second factor in addition to the password. The system can can then verify (authenticate) the identity of the factors (authenticate) and grant them the privileges privileges (rights) to which the proven identity is entitled (authorisation). identity (authorisation). The web page for two-factor authentication of the data centre describes which procedures are supported and how they can be can be set up. Further information on two-factor authentication can also be found at Wikipedia. Please note the following information.

  1. enter your second factor (smartphone with registered app registered app or hardware token for generating a one-time to generate a one-time password) to other other people, as you may be held responsible if your user account be held responsible if your user account (account) is misused by other misused by other persons.

  2. if you use a hardware token, it is prohibited to hardware token* together with the end device (e.g. notebook) in the same bag. notebook) in the same bag.

  3. loss of the second factor or suspicion of misuse of the second factor misuse of the second factor must be reported immediately to the IT security officer of the data centre. must be reported immediately.

Top of page

4. personal behaviour

Never enter personal data on the Internet, if it is not absolutely necessary. If necessary, make up names and addresses, when registering with web providers, discussing in forums or chatting in in chat rooms. Please also note the following tips.

  1. never change your password, the configuration of the operating operating system or a programme at the request of another (unknown) person who contacts you by telephone. Never download software from the Internet at the request of another person from the Internet at the request of another person in order to install it. Never call up certain web pages and never enter any commands never enter any commands if an unknown person by an unknown person.

  2. never pass on sensitive or internal information by telephone. by telephone.

  3. label portable data carriers (CDROM, DVD, memory stick, etc.) containing sensitive data and lock them lock them when you leave the room.

  4. ensure appropriate disposal of sensitive documents and documents and data carriers that currently contain confidential data or have contained confidential data in the past.

  5. never use CDROMs, DVDs etc. from unknown sources (simply “lying around” somewhere in public) on a university computer, as the autostart function can automatically install automatically install malware on the computer. could be installed on the computer.

  6. never open email attachments if you you were not expecting the email and before you have checked the attachment have checked the attachment for malware. Remember that the sender may be forged.

  7. never forward an email just because the email asks you to. it is requested in the email. Do not contribute to the spread malware or spam e-mail.

  8. do not send sensitive information by email or only in encrypted form.

  9. protect your computer with a password-protected screen saver or log off when you leave the room. when you leave the room.

  10. make sure that you always have the latest antivirus and antivirus and anti-spy software is always installed on your computer and use an up-to-date firewall.

  11. never deactivate or remove the antivirus software or the antivirus software or the firewall without the permission of the data centre.

  12. no one may download or use software that enables the circumvention of protection mechanisms. Exception: System administrators and system administrators to check and maintain the security of the systems.

  13. no one may connect their own network access to their workstation computer without the computer centre without the consent of the computer centre.

  14. students are not entitled to data backup and restoration, so that they may have to back up important data themselves. back up important data themselves.

15 Pay attention to security-relevant incidents and report them. report them.

Top of page

5. measures in the event of a virus attack

If you suspect or even know that your computer has been infected by one or more one or more malicious programmes (viruses, worms, Trojans, etc.) you should take the following measures.

  1. disconnect the infected computer as quickly as possible possible from the university network**, to avoid further damage by spreading the malware to other other systems. The affected system should not be disconnected from the power supply and also not be shut down, so that forensic analyses can be forensic analyses can be carried out later to investigate the malware and the damage caused and so that measures can be taken to contain consequential damage. can be taken.
  • If the computer is connected to the university network with a **network cable university network, the cable should be disconnected. The cable is provided with a tick, which is sometimes hidden under a plastic cover and must be pressed down before disconnecting. must be pressed down before disconnecting.

  • If the computer is connected to the university network via the wireless network (WLAN), you should university network, you should try to switch off the network via the WLAN switch or the touch-sensitive screen (*touchscreen screen (touchscreen) to switch off the network. If the malware prevents this, you should try to switch off the switch off the device by pressing the on/off button for several seconds. In this case disconnect the device from the power supply if it is and remove the battery if this is possible. possible.

Then immediately inform the helpdesk of the data centre and the person computer centre and the person responsible for the administration of the computer.

  1. also report the incident to your IT security officer or your IT security officer, who may be able to assist you in cleaning your computer or tell you who can help you, remove the malware from your computer. Depending on depending on the type of infection, it may be necessary to reinstall the computer and restore the data from a from a data backup, as this is the only way to ensure that the that the malware has been completely removed. has been completely removed.

  2. if a new installation is not necessary and you want to you want to remove the malware yourself, you will need a so-called rescue CD, which contains a boot-compatible operating system and antivirus software (e.g. Desinfec’t). You will need to remove the CD/DVD or the memory stick on a different computer and then start your computer from this medium so that you have a “virus-free” environment. Then you can scan your hard drive with the antivirus programme and remove the malware. If no virus is found, your computer may still be infected with malware that the antivirus programme just cannot find. In this case, be sure to contact the computer centre before you reconnect your computer to the university network.

  3. to ensure that your computer is not immediately infected with malware again immediately, you should update the software on your computer computer software and, if you have not already done so, install an antivirus programme and a local firewall. You will find information on this in Chapter 2 of this document.

  4. the computer centre and the local system administrators are system administrators are obliged to ensure the operation and security operation and security of the university network and carry out the following actions if there is imminent danger is imminent:

  • If necessary, they block the IP address at the next possible location.

  • If the infected computer is in the university network via the (WLAN) in the university network, block the user account user account and interrupt the connection.

  • They notify the user or the administrator responsible or the responsible administrator about the error. administrator responsible about the error.

Top of page

6. system administration

System administrators have a special responsibility and special responsibility and should ensure that in their area of responsibility the IT security policy is implemented and adhered to. They should also observe the following instructions.

  1. user accounts should be created in such a way that only good passwords can be used and that the user user account is blocked if a password is entered incorrectly several times password is entered incorrectly (if the system offers these possibilities).

  2. change default passwords of telephone systems, computers, network components etc. and, if necessary, block standard users (guest (guest accounts) to protect the systems.

  3. regular data backups should be backups should be carried out and the data backup media should stored in fireproof and burglar-proof cabinets if necessary fireproof and burglar-proof cabinets where necessary for the data inventory. If personal or other sensitive data is stored externally, they should be stored in encrypted form.

  4. change or block the computer access authorisation, when a person leaves the university or is assigned a new receives a new area of responsibility. The required data must be from the Student Service Centre (SSC) for students and by the Human Resources Department for staff to the Computing Centre, which immediately forwards the data immediately to all system administrators and system administrators. to all system administrators.

  5. if a system administrator leaves the university, the system administrator leaves the university, **all system passwords must be changed immediately and, if necessary, the password files or databases must be searched for new for new accounts with privileges in order to privileges to ensure the security of the systems. Under UNIX-like operating systems, it may also be necessary to search for programmes with privileges (SUID or SGID bit set) that do not that are not part of the normal operating system.

  6. temporary user accounts should be deactivated if the project for which they were set up has been terminated. they were set up.

  7. users may not deactivate their user account deactivate by telephone or have it activated. Deactivation or activation can only be only be arranged in writing or in person. If the person is not known, the identity must be be verified beforehand. The verification can be carried out on site using photo identification or via a video conference. video conference. In the case of written applications, it should it should also be clarified whether the application was actually person has actually made the application.

8 System administrators should download and use software use software that makes it possible to check and maintain the security security of the systems (e.g. Password Cracker for checking verification of good and bad passwords passwords if the system allows access to the passwords). passwords).

Top of page

7. wireless networks (WLAN) / server

The following provisions apply to the operation of wireless networks (WLAN) and servers. the following provisions apply.

  1. the departments and central facilities may own wireless networks that allow access to the general computer computer infrastructure may only be operated with the consent of the computer centre. Isolated radio networks for for training may be set up and operated as required. as required.

  2. network access to productive radio networks may only take place via user authentication. Access via hardware or IP addresses is not permitted.

  3. data traffic in wireless networks must be encrypted. Under no circumstances may passwords be transmitted in plain text be transmitted in plain text in a wireless network. Instructions for setting up the WLAN can be found on the website WLAN (eduroam) of the computer centre.

  4. the access data (IP address, user account, time) for productive wireless networks productive wireless networks must be logged.

  5. the departments and central facilities may operate their own servers that are connected to the university network, only with the approval of the computer centre. Isolated servers in closed laboratory networks for may be set up and operated as required. as required.

  6. no servers may be operated in wireless networks.

  7. servers* may only be managed via external access points using a secure VPN connection. Information on setting up the VPN software can be found on the web page VPN access of the computer centre.

  8. the VPN access software, the configuration file for the VPN software the VPN software and the user ID and password for dialling into the for dialling into the wireless network of Fulda University of Applied Sciences not be passed on to other persons.

Top of page

8. data encryption

There are many products that support the encryption of data. encryption. If you want to send sensitive data as an attachment to an email, you can compress and encrypt the file or files for example with the programme 7-zip and encrypt it. The password for decryption can then be communicated to the recipient by telephone, for example. “7-zip” also supports the encryption of the archive directory (header encryption), so that an unauthorised person unauthorised person cannot even find out the names of the files in the archive. the names of the files in the archive.

If you work on your hard drive on a daily basis, you do not want to encrypt and decrypt the files manually, especially as the files would then be stored unencrypted on the hard drive for the would be stored on the hard drive for the duration of processing. For this you need product that encrypts the data automatically and transparently for you (on-the-fly) encrypts and decrypts the data. These products can be into two classes:

  1. products that encrypt files or all files in a file directory directory. This category includes, for example the product Encrypting File System (EFS), which is an extension of the of the NTFS file system from Microsoft and can therefore be used in every modern Windows* operating system. Since temporary files in the Windows world are often are often stored in other directories or even in other partitions partitions, it can happen that the temporary files are stored files are available unencrypted after processing (the temporary (the temporary file is deleted, but its content is not destroyed content is not destroyed, so that it could be be restored later).

  2. products that create an encrypted partition in a file (a so-called file (a so-called container) or encrypt a complete encrypt a complete partition of the hard drive. They are then divided into products that can only encrypt can encrypt data partitions and those that can can also encrypt system partitions. If a can encrypt both data and system partitions, the entire hard disc the entire hard drive can be encrypted. This group This group includes, for example, the commercial product SecurStar DriveCrypt and the free product VeraCrypt. Wikipedia presents in the article Comparison of disk encryption software" describes the features, availability, up-to-dateness etc. of many hard disk hard disc encryption programs. Microsoft Windows offers for some operating system versions the programme BitLocker for some operating system versions.

A detailed description of the use of these programmes would beyond the scope of this documentation. Further information can be found Wikipedia 7-zip, Encrypting_File_System, VeraCrypt, BitLocker.

Top of page

9. segregation of computers, printers and data carriers

When disposing of computers and data carriers, you should data carriers, you should remember that the data is not physically destroyed or overwritten when the files are deleted, so that they can be restored later under certain be restored later. It is therefore essential that you observe the following notes.

  1. make sure that sensitive documents or data carriers data carriers (hard disk, CDROM, DVD, memory stick, etc.) containing personal or other sensitive data data are not destroyed in a recoverable manner (e.g. using a shredder, where possible) before they are possible) before they are discarded.

  2. ensure that hard drives are completely magnetised if necessary magnetised or destroyed in such a way that they cannot be cannot be recovered if they contain personal or other sensitive data. or other sensitive data.

  3. remember that (network) printers are often equipped are often equipped with hard discs on which files are temporarily files before printing and therefore do not forget to destroy the data on these hard disks before the printer is discarded. is discarded.

  4. many devices store configurations in flash memories. Remember to delete the configurations before before removing the device from service, as knowledge of the configuration knowledge of the configuration may facilitate an attack on the IT infrastructure.

  5. remember that under certain circumstances multi-function devices, scanners, fax machines etc. may also be equipped with hard disks or flash memories on which data is stored temporarily. data is stored temporarily. Delete this data before you discard the device.

Top of page

10. further information

Modern copiers are generally equipped with hard discs, on which the copies are temporarily stored before printing. Do not forget to destroy the data on the hard discs, before the copier is discarded. If the copier is also used to copy personal or other sensitive data is to be copied on the copier, the photocopier should always be installed in a locked room and not be and should not be connected to the university network. The data can be read if a computer can be connected to the copier and the computer can be connected to the copier and the administrator password is known password is known (for many copiers, the standard password together with the the operating instructions on the Internet). Some copiers can be equipped with a module to securely erase the hard disc. hard disc.

Top of page

Oct 25, 2025

Subsections of Basic IT-Security

Passwords

Content

  1. Overview
  2. Good passwords
  3. Change password

1. overview

Protect your user account (account) with a good password that you can easily remember and that a stranger or a programme will find very difficult or impossible guess (in a reasonable amount of time). Programmes that want to “crack” passwords “(password crackers) generally work with dictionaries so that every password work with dictionaries, so any password that can be found in a dictionary is a bad password. “peter”, “pEter”, “pEter84” or similar passwords can be found by a programme in no time at all. As computing power ever greater, programmes can also try to generate and test all possible passwords. Today’s workstations (May 2008) can generate approx. 100,000,000 passwords per second per second. If your password consists of only five lower case letters (e.g. “peter”), the programme only has to test all passwords passwords consisting of 26 letters with the lengths one, two, three four and five to generate your password with certainty. with certainty. In this case, a maximum of “26 + 262 + 263 + 264 + 265 = 12,356,630” passwords would have to be generated and be compared. The programme would have found your password using the so-called Brut-Force method on today’s workstations in about 0.12 seconds. If you had chosen a similarly simple password with a length of eight characters, the programme would have would have to generate about 2.17 * 1011 passwords and would take up to 36 minutes.

If your password contains upper and lower case letters, numbers and special characters special characters (e.g. from the following ten special characters “,;.:-_!%/#”) you would already have a character set of 26 + 26 + 10 + 10 = 72 characters. With a password length of eight, the programme would have to generate and compare around 7.3 * 1014 passwords in a Brut-Force attack, which would take around 84 days. would take. As a rule, the programme would find your password much faster. If you are unlucky, your password your password is at the beginning of the generated password list and is found found after just a few seconds. On average, a password found by these programmes in half the time (i.e. around 42 days). found. For this reason, today’s programmes generally use programmes generally use so-called dictionary attacks instead of brute-force attacks, as they can reach the target faster with many passwords more quickly. Further information can be found at Wikipedia.

In reality the programme should have access to the table with the encrypted passwords, as otherwise it would not be able to compare the generated otherwise it would not be able to compare the generated passwords with the real passwords.

Top of page

2. good passwords

A good password fulfils the following requirements:

  1. it contains at least one uppercase and one lowercase letter letters, at least one number and at least one special character. special character.

  2. it is at least twelve (preferably 14) characters long.

  3. it does not appear in any dictionary without taking into account numbers and special characters and capitalisation in any dictionary (not even in foreign-language dictionaries). foreign-language dictionaries).

  4. if you change the password, change at least three characters. three characters.

**Keep your password secret! A password that you reveal to other people or write down or write it down and keep it near your computer is not a good password! is not a good password!

You can memorise complicated passwords using mnemonic phrases, e.g. the mnemonic phrase “My new password is now 12 characters long” could replace the good password password “M#nP%ij12Z;l” (initial letters of words and special characters after capital letters). capital letters). Do not use well-known literature quotations as as mnemonics, as these are also known to the cracker programmes. programmes.

Top of page

3. change password

Under UNIX operating systems (Solaris, Linux, Cygwin) the password is changed in a command line window with the command passwd. First you must enter your old password to authenticate yourself and then enter the new password. After you have entered the new password again for confirmation the new password for confirmation to rule out typing errors, the password is changed by the system. You will not receive an echo for characters entered, so you will not see anything when you type your password. password. The system will still recognise your password. UNIX prevents another user from entering the length of your password. user can spy out the length length of your password to make it easier to break it. easier to break.

Under Microsoft Windows 10 you must select Accounts in the Settings. There you can then click on Sign-in options. In the “Password” field, click on “Change”. Now enter your old password for authentication and enter the new password twice to avoid typing errors. Leave the field for the password hint empty, as the hint is is visible to all users of the computer and would allow them to guess the password. would allow them to guess the password. The “Settings” can be found by clicking with the right mouse button on right mouse button on Start (bottom left in the menu bar) and then clicking on click on “Settings”.

If the user logs in via the Novell Client for Windows (generally Windows computers in the computer computers in the computer rooms), press the “<Ctrl keys “” at the same time. The window “Novell Client for Windows” window opens. Select “Change password”. Now click once on the name of the server in front of your user name and then enter your old password for authentication and enter the new password twice twice to avoid typing errors. It will take a few seconds before the new password can be used on all computers.

If the user logs in on a Windows server (generally Windows computers in the computer rooms), press the the computer rooms), press once simultaneously the keys “” at the same time. The window “Windows Security” window opens. Select “Change password…” and then enter your old password your old password for authentication and enter the new password twice twice to avoid typing errors. It will take a few seconds, before the new password can be used on all computers.

Top of page

Oct 16, 2025

E Mail

Content

1. overview 2. spam email 3. Mozilla 4. Microsoft 5. Novell GroupWise 2018 WebAccess Client

1. overview

This document presents security-relevant settings for various various email programmes are presented. The email programmes that are used on computers at Fulda University of Applied Sciences must be configured accordingly. If on a computer at Fulda University of Applied Sciences is using an email programme that is not included in this document, the corresponding settings in the programme must be settings in the programme must be made in the same way and the name of the the name of the programme must be communicated to the IT Security Officer of the university must be informed.

An email should only ever be sent as normal text, as the HTML code may contain malicious functions that compromise the computer. compromise the computer. Never click on HTML or Office documents in attachments if the email does not originate from a trustworthy source. If you want to send a formatted text, you should send it as an attachment and explicitly refer to this attachment in your email. in your email.

**Remember that the sender addresses of emails can be forged and that malware emails are becoming increasingly sophisticated. are already very often sent in good German or English and have a sender address that is known to the recipient. There are now even more sophisticated forgeries that reply to reply to e-mails that have actually been sent to the fake sender. actually sent once. This is made possible by the fact that e-mails are read by infected computers and at least partially partially transmitted to criminals so that they can information about the sender, recipient, subject and possibly even the message itself the message itself and use it for their malware email. In this way, the acquaintances of the first victim can then be attacked, as the malware email is very credible as a reply to an email of their own.

If possible, never click on links in e-mails, as the displayed and trustworthy text may conceal a completely may conceal a completely different address (instead of “https://…/download/bericht.pdf” for example “https://…/download/malware.exe”). In the meantime attempts are now also being made to send malware, for example as an encrypted ZIP archive, for example, for which the password for decryption is decryption password is provided in the email. In this way this way, an anti-virus programme can detect the malware software in the attachment of the email, while the recipient recipient can open the archive and execute the malware (the anti-virus programme may still be able to prevent the malware from being executed).

**Check links in emails very carefully, before clicking on them (as a rule, the address is displayed in the address is usually displayed in the lower status bar of the email client when you mouse pointer over the link) if clicking on the link is absolutely necessary. link is absolutely necessary. **Check the file type of an attachment and never click on executable files (.exe, .bat, .com, .msi, …). **Prohibit macros in Office documents (Office_Macros_deactivate.pdf) and do not allow them under any circumstances, if an Office document received as an attachment requires it. **Ask the sender of the email by telephone, whether they have sent you the message with the attachments if you are unsure before you use an attachment or click on a link. click on a link.

Be particularly careful if you receive files with the following file name extensions in an email attachment as such files may contain malware.

File File name extension
Macro-enabled Microsoft Word documents or templates up to Word 2003 .doc, .dot
Macro-enabled Microsoft Word documents or templates from Word 2007 .docm, .dotm
Macro-enabled Microsoft Excel workbooks, extension modules (add-in) or templates up to Excel 2003 .xls, .xla, .xlt
Macro-enabled Microsoft Excel workbooks, Binary workbooks, extension modules (add-in) or Templates from Excel 2007 .xlsm, .xlsb, .xlam, .xltm
Macro-enabled Microsoft PowerPoint presentations, extension modules (add-in) or templates up to PowerPoint 2003 .ppt, .ppa, .pot
Macro-enabled Microsoft PowerPoint presentations, screen presentations, slides, extension modules (add-in) or templates from PowerPoint 2007 .pptm, .ppsm, .sldm, .ppam, .potm
Executable programmes .com, .exe, .msc, .msi, .mst, .scr
Executable script files .bat, .cmd, .js, .jse, .ps1, .vba, .vbe, .vbs, .ws, .wsf, .wsh
Shortcuts .lnk
Control Panel Programs, Windows Jobs, ActiveX Controls, Registry Entries, System Device Drivers, Microsoft Compiled/Compressed HTML Help Files, Microsoft HTML Applications, Program Information Files, Shell Command Files .cpl, .job, .ocx, .reg, .sys, .chm, .hta, .pif, .scf
(encrypted) archives (especially if you are given the password to open the archive in the email) .zip, .jar, .cab, .gz, .7z, .tgz

You should configure Windows in such a way that file name extensions are also displayed in the file manager (Windows Explorer) (they are not displayed by default). Click with right-click on the Windows icon in the bottom left-hand corner of the corner of the screen, select the entry Search, enter the value Explorer options in the search field and then click on the entry then click on the entry Explorer Options Control Panel. In the new window, select the View tab and uncheck the the entry Hide extensions for known file types. for known file types*. Then click on Apply and then on OK.

Some email programmes allow you to request automatic confirmations for the receipt of the email. This feature can be misused for spam e-mail, as the sender of the *e-mail of the email then knows that the address is still in use and is ideally suited for spam e-mail. You should therefore switch off this mechanism should therefore be switched off. If you want to allow confirmations for confirmations for the receipt of a message, you should in any case that you are asked before the confirmation is sent. is sent.

Never save passwords in programmes or files files because you are too comfortable to enter the password each time. each time. As malware can find and collect passwords stored in plain text can find and collect passwords stored in plain text, you invite all potential “hackers” to misuse your user ID. misuse your user ID. Security is increased if you store all passwords with a master password. However, the encrypted passwords can also be collected and possibly “cracked” on powerful computers be “cracked” by trial and error.

Session logs are stored in cookies, which are not required for email. For this reason, this service should be switched off for mail & news groups. *Cookies can also be misused to create a profile of the user. profile of the user, which can then be used for targeted can then be used for targeted spam e-mails.

Since an email should only contain normal text, JavaScript and JavaScript* and plugins for emails should be switched off for security reasons. If you require active elements you need active elements, you should send them as an attachment in a file and explicitly refer to the attachment.

**Never open the attachment of an email before you have checked it for it for viruses, worms, Trojans, … **.

In the settings instructions from chapter 3 onwards “Edit > … > …” means that in the corresponding entry in the menu bar at the top of the programme programme window (e.g. “Edit” or “Extras”) and then “Extras”) and then with an entry in the menu, a tab or another tab or another element that has the corresponding label. corresponding labelling.

Top of page

2. spam e-mail

You can find a good overview of this topic at for example at Wikipedia. At Fulda University of Applied Sciences, spam e-mails are filtered by a spam filter using the keyword “” in the subject: or subject: field field. In very rare cases it can happen that a normal email may be classified as spam. You should note the following for spam e-mail:

  1. do not allow any (automatic) confirmations so that your email address does not register as an active email address “reports” to the sender and you will then receive receive more spam e-mail afterwards.

  2. delete the email without reading or replying to it. reply to it.

  3. do not click on any attachments from spam e-mail.

  4. do not under any circumstances click on any web addresses addresses in the spam e-mail that you can supposedly use to avoid such avoid such e-mails in the future, as this will only only “register” an active e-mail address and receive even more spam e-mails in the near future.

  5. never use your e-mail address for competitions or similar competitions or similar, as this may result in you receiving spam e-mails*. Set up a free e-mail address for such things with any provider for such things, which you can then which you can then delete.

  6. disguise your email address on your web pages, so that it is not found by search programmes and then added to be added to spam address lists.

Top of page

3. Mozilla

3.1. Thunderbird 91.x

Thunderbird wants to save large attachments on a cloud storage server on the Internet and only specify the address of the file in the email. This means that very large files can be sent by email without any problems but you have no influence on what happens to the file on the *server on the server (duration of storage, data protection, etc.), etc.).

You can click with the right mouse button in the “title bar” (the background at the top next to the “Tab”) and select “Menu bar” to get the “old” display, in which you then click on “Tools > Settings” in the menu bar. “Extras > Settings” in the menu bar. Alternatively you can click on the icon with the three horizontal lines in the top right corner horizontal lines and then click on “Settings”. The following selection instructions require an open settings window open. The following settings should should be made:

  1. select “General” on the left-hand side.
  • On the right-hand side at the end of the “Read & View” section under “Define the handling of acknowledgements of receipt (MDN) in Thunderbird”, click on “Receipt notifications…” and then select “Never send a confirmation of receipt” select.

  • On the right-hand side in the section “Thunderbird updates” section, under “Allow Thunderbird “Allow Thunderbird to install updates automatically (recommended: increased security)” should be selected or be selected.

  1. select “Compose” on the left-hand side.
  • On the right-hand side in the “HTML options” section, click on “Behaviour when sending HTML messages:” click on “Sending options…” and then in the section “Text format” section, select the action “Send messages Send as plain text if possible” in the “Text format” section. For “When sending messages in HTML format to recipients who cannot or do not want to receive HTML or do not want to:” select the entry “Convert messages to plain text text”.

  • On the right-hand side, in the section “Attachments” section, tick the box next to “Offer upload for files larger than xx MB” should be removed.

  1. on the left-hand side, select “Data protection & security” on the left-hand side.
  • On the right-hand side in the “Email content” section section, the tick in front of “Allow external content in " should be missing or removed.

  • On the right-hand side in the “Web content” section the following settings should be made.

    • The ticks in front of “Remember visited websites and links and links visited” and “Accept cookies from websites cookies” should be missing or removed.

    • Before “Send websites a “Do Not Track” message that your online activities should not be tracked” should be should not be tracked” should be ticked or be ticked.

  • On the right-hand side, in the section “Passwords” section, all saved “Passwords” can be deleted via “Saved Passwords…” can be deleted. You should never passwords should ever be saved.

  • On the right-hand side, in the section “Data collection by Thunderbird and its use”, the following settings should be should be made.

    • The tick in front of “Allow Thunderbird to send data on technical details and interactions to Mozilla” should be missing or removed.

    • The tick in front of “Automatically send unsent crash reports automatically by Thunderbird” should be missing or removed. removed.

  • On the right-hand side, in the “Security” section the following settings should be made.

    • A tick should be placed in front of “Check messages for fraud attempts (phishing) " should be ticked or set. be set.

    • Before “Enable antivirus software, quarantine incoming messages. quarantine incoming messages.” should be ticked or be set.

    • Before “Confirm current validity of certificates by querying the OCSP server” must be ticked or set.

  1. click again in the top right-hand corner on the icon with the three horizontal lines and then click on “Account settings” or directly on “Account settings” at the top right of the main window. Alternatively, you can also click “Extras > Account settings” if you have activated the menu bar.
  • On the left-hand side, select “Server settings” on the left-hand side.

    • In the “Security and authentication” section section, under “Connection security:”, the item “SSL/TLS” should be selected or be selected.

    • Under “Authentication method:”, the item “Password the item “Password, normal” should be selected or be selected.

  • On the left-hand side, select “Compose & Addressing” on the left-hand side.

    Remove the tick in front of “Compose messages in HTML format format”.

  • On the left-hand side, select “Outgoing mail server (SMTP)” on the left-hand side. Then in the right-hand window click once on the mail server and then select select “Edit…”.

    • Under “Connection security:” the item “STARTTLS” should be selected or be selected.

    • Under “Authentication method:”, the item “Password the item “Password, normal” should be selected should be selected or chosen.

Top of page

4. Microsoft

4.1. Outlook 2010 to 2013

After opening the settings window with “File > Options” Options” has been opened, the following settings should settings should be made:

  1. select “E-mail”.
  • In the “Compose messages” section, in the line “Compose message in this format:”, select the entry Select “Text only”.

  • In the “History” section (further down), you should in the subsection “For each message that contains the request for a read receipt” the line “Never send a read receipt” should be selected or be selected.

  1. select “People” (“Contacts” in Outlook 2010).

In the “Online status and photos” section, tick the box in front of “Show user photos if available (…)” and in front of “Only show names in contact popup (…)” (missing in Outlook 2010) should be missing or removed.

  1. select “Advanced”.

In the “More” section, the tick in front of “Allow sent emails to be analysed to identify people, people with whom you correspond frequently, … and upload this information to the Share Point standard server” should be server” should be missing or removed.

  1. “Security Centre > Settings for the Security Centre…” or “Trust Centre > Settings for the Trust Centre…” select.
  • On the left-hand side, select “Email security” on the left-hand side.

    • In the “Read as plain text” section in front of “Read standard messages in plain text format” should be ticked or set.

    • In the “Script in folders” section before “Allow script in shared folders” and before “Allow script in public folders " must not be ticked.

  • On the left-hand side, select “Automatic download” on the left-hand side.

    • Before “Do not download images in HTML messages or RSS elements not download automatically” should be ticked should be ticked or set.

    • The four items “Download …” should be be missing or removed, as sender addresses can be forged. can be falsified.

    • There should be a tick in front of “Show warning before …”. should be ticked or set.

  1. in “Start”, click on the small down arrow to the right of the icon for “Junk e-mail” (last icon in the “Delete” column). icon in the “Delete” column). In the window that opens, select “Junk e-mail options…” in the window that opens. In the new window, select the “Options” tab tab in the new window.
  • If necessary, select what should be done with spam/junk e-mail.

  • Before “Disable hyperlinks and other functions in phishing messages (recommended)” should be ticked a tick should be set or be set (is only weakly displayed in Outlook 2013, so that no tick could be set).

  • Before “Warn for suspicious domain names in e-mail addresses (recommended)” should be ticked should be ticked or set (is only weakly displayed in Outlook 2013, so that no tick could be set).

Top of page

4.2 Outlook 2016, 2019 and 365

Office 2016 products are generally updated automatically via Windows Update update. For Office 2019 and 365, the update must be initiated via an Office programme. For example, start Outlook 2019 or Outlook 365 and then select “File > Office account”. You should see “Updates are downloaded and installed automatically downloaded and installed” on the right-hand side. If you click on “Update options”, you can force a check and, if necessary, force an update by clicking on clicking on “Update now”.

After opening the settings window with “File > Options” settings window has been opened, the following settings should settings should be made:

  1. select “General” (only required for Office 2019 and Office 365 required).
  • In the “LinkedIn functions” section (at the end on the right) right-hand side), the tick in front of “Activate LinkedIn functions in my Office applications” should be missing or removed. be removed.
  1. select “Email”.
  • In the “Compose messages” section, in the line “Compose message in this format:”, select the entry Select “Text only”.

  • In the “History” section (further down), you should in the subsection “For each message that contains the request for a read receipt” the line “Never send a read receipt” should be selected or be selected.

  • In the “Message format” section for “When sending messages in rich text format to rich text format to internal recipients” the value “Convert to plain text format” should be selected or selected.

  1. select “People”.

In the “Online status and photos” section, tick the box in front of “Show user photos if available (…)” and “Only show names in the contact pop-up (…)” should be missing or removed.

  1. select “Advanced”.

In the “Other” or “Other” section section, the tick in front of “Allow sent emails to be analysed to identify people, people with whom you correspond frequently, … and upload this information to the Share Point standard server” should be server” should be missing or removed.

  1. select “Trust Centre” and then on the right “Settings for the Trust Centre…” on the right.
  • On the left-hand side, select “Privacy options” on the left.

    • Outlook 2016:**

      • Before “Send personal information to Microsoft to help improve Office” the tick should be missing or removed.

      • Before “Allow Office connections with Microsoft’s online services, …” the tick should be missing or removed.

    • Outlook 2019 and 365:** On the right Select “Privacy settings…”. Before “Enable optional connected experiences” the tick should be missing or removed.

  • On the left-hand side, select “Email security” on the left-hand side.

    • In the “Read as plain text” section before “Read standard messages in plain text format” and in front of “Read digitally signed messages in plain text format format” should be ticked or set.

    • In the “Script in folders” section before “Allow script in shared folders” and before “Allow script in public folders " must not be ticked.

  • On the left-hand side, select “Automatic download” on the left-hand side.

    • Before “Do not download images in standard HTML emails or RSS elements not download automatically” should be ticked should be ticked or set.

    • The four items “Downloads …” should be be missing or removed, as sender addresses can be forged. can be falsified.

    • There should be a tick in front of “Show warning before …”. should be ticked or set.

    • Before “Do not download images in encrypted or signed HTML emails” should be ticked or set. should be ticked or set.

  • On the left-hand side, select “Macro settings” on the left-hand side.

    • You must select “Deactivate all macros without notification deactivate” must be selected or selected be selected.
  1. select “Start” in the title bar of the window in the title bar of the window.
  • Outlook 2016:** In the third column, click on the last entry the last entry “Junk e-mail”.

  • Outlook 2019:** In the third column, click on the the icon for “Junk email”.

  • Outlook 365:** Click at the end of the title bar on the three dots (“More commands”) and then on the entry “Junk e-mail”.

Select the entry “Junk email options…” and then select the “Options” tab in the new window.

  • If necessary, select what should be done with spam/junk e-mail.

  • Before “Disable hyperlinks and other functions in deactivate hyperlinks and other functions in phishing messages (recommended)” should a tick should be set or be set (may only be displayed weakly, so that no tick can be set).

  • A tick should be placed in front of “Warn for suspicious domain names in e-mail addresses (recommended)” should be ticked should be ticked or set (may only be displayed weakly, so that no tick can be set).

Top of page

5. Novell GroupWise 2018 WebAccess Client

Select “Tools” from the menu bar and then select the entry “Options…”. The following settings should be settings should be made:

  1. double-click on “Environment”.
  • Select the “Layouts” tab.

    The “Default layout & font when creating” and Create” and “Default layout & font when reading” should be “Plain text” should be set or be set as the or be set.

  • Select the “Standard actions” tab.

    In the sections “External HTML images:” and “HTML scripts:” sections a dot should be set before “Always display warning” or be set.

  • Select the “Design” tab.

    If necessary, tick the box next to “Show flash preview”, if you want to read the message immediately.

  1. double-click on “Send” and then select the “Mail” tab then select the “Mail” tab.

In the “Confirmation of receipt” section, the value “None” should be fields the value “None” should be selected or selected. be selected.

Top of page

Oct 25, 2025

S/MIME

Imprint

Imprint

I object to any commercial use and disclosure of my data. of my data.

Journalistic-editorial responsibility: The IT Security Officer of Fulda University of Applied Sciences Leipziger Str. 123 D-36037 Fulda Phone: +49 (0)661 / 9640 - 1073 E-mail: isb(at)hs-fulda.de


Disclaimer

Despite careful control of the contents I do not assume no liability for the contents of external links. They do not not an offer of the Fulda University of Applied Sciences. For the content of these The operators of these pages are solely responsible for their content.