I. Purpose of computing resources
The purpose of the computing resources (q.v.) at Heidelberg University is to further the institutional mission of the University. By using one of the University's computing resources, the user is agreeing to adhere to and be bound by the principles and conditions outlined below.
II. Conditions of use
The computing resources of Heidelberg University are available for use by University students, faculty, staff and other members of the Heidelberg community. Persons who are not affiliated with the University should not seek to use these resources. [footnote]
Computing resources at Heidelberg are intended to be used for educational purposes and to carry out the legitimate business of the University. Appropriate uses of these resources include instruction, independent study, authorized and independent research and the official work of University offices, departments and recognized student and campus organizations. These resources may not be used by members of the University community for commercial purpose or personal financial gain.
All use of campus computing resources must be in accordance with the above guidelines; users must also adhere to the University's computing ethics code outlined below.
III. Computing ethics code
Computing resources at Heidelberg are shared by the entire University community. Sharing of these resources means sharing of responsibility and the exercise of good judgment. Users are expected to exercise responsible, ethical behavior when using the computing resources of the University. Such behavior includes the following.
A. Use of authorized resources only
Members of the University community must only use those computing resources and computer accounts which have been authorized for their use by the University. Each user is responsible for all activities which take place associated with the use of his or her account(s). Resources may be used only for their authorized purpose, in a manner consistent with the mission of the institution.
Users must not under any circumstances attempt to use a computer account or computer resource for which they have not been granted access. The use of or attempt to access unauthorized computing resources is prohibited.
B. Maintenance of resource integrity
Members of the University community to whom authorized facility access or access to specific computer accounts has been granted may not authorize others to use those accounts or resources for any reason. It is expected that authorized users will take all necessary precautions (e.g. regular password maintenance, file protection measures and disconnection from accounts or resources when not in use) to prevent unauthorized resource access.
The University reserves the right to prohibit specific network applications which could have a detrimental effect on the network's health, performance or ability to meet the needs of all network users. This includes, but is not limited to, certain types of peer-to-peer (P2P) file sharing and other similar activity.
Attempts to compromise the security or negatively impact the performance of any University computing resource or to access any unauthorized data on such resources are prohibited. "Computing resource" refers not only to computer hardware and software, but to the computer network as well. The University reserves the right to utilize network scanning, security and vulnerability analysis tools at any time to help protect the integrity of the network.
C. Copyright and license compliance
Members of the University community are expected to abide by all laws of national and international copyright and software license when using campus computing resources.
Some software programs and other computer media are protected by copyright and other laws, including but not limited to software license agreements and contractual licensing. Users may not copy, attempt to copy, distribute, attempt to distribute or plagiarize copyrighted or licensed resources in violation of University licenses and contractual agreements or copyright law.
Downloading and other duplication of copyrighted materials is legal only with the permission of (a) the actual copyright owner, or (b) a legitimate claim of "fair use." Therefore, it is the University's policy that music and/or video files may not be downloaded or otherwise copied from the Internet illegally.
D. Appropriate use and computing etiquette
Users may not use computing resources irresponsibly or in an attempt to needlessly affect the work of others. Electronic mail and other programs designed to facilitate communication should be used courteously; unsolicited, annoying or obscene messages should not be sent to users of the University's systems or of any other computing network.
Shared resources, such as disk space, printing devices, paper and processing units, are limited. Users are expected to keep their use of such items within reasonable limits.
In terms of disk space, users should limit the size of the data they accumulate on shared systems. When system managers request that unnecessary data be removed, compliance is expected. Users who subscribe to electronic discussion lists or email services which allow the accumulation of large volumes of mail should unsubscribe from such lists or stop their service when they will be unable to login for long periods of time (e.g. vacations).
Shared printing resources are to be used courteously; large printouts of unnecessary material, or repeated printing of materials such as rough drafts and electronic mail messages, are to be avoided. The duplication process is best served by photocopy machines and offset presses, not computer printers.
Users who have been granted access to timesharing processors are expected to be conscientious in their use of those resources; intentional attempts to degrade the performance of a system or to deprive others of system resources or facility access will not be tolerated.
When users attempt to access computing networks external to Heidelberg University, they may do so only in compliance with the acceptable use policies of those networks and any applicable local, state, and federal laws.
IV. Violations of policy
Any violations of the conditions of use or computing ethics code described above may be grounds for discipline as specified in the University code of conduct and/or prosecution as permitted under local, state and federal laws.
V. Limit of liability
Heidelberg University makes no representations concerning the availability of service of its computing resources, the privacy of material on those resources or the integrity or retrievability of material placed on those resources. Heidelberg University is not responsible for any damages resulting from the receipt and/or transmission of any electronic information. The University reserves the right to collect, process and retain appropriate information pertaining to the users, usage, integrity and security of its computing resources.
The University reserves the right to change or amend this statement of computing and network policy at any time.
VI.Terms and definitions
The term computing resource refers to any portion or whole component(s) of (a) the Heidelberg University computing centers; (b) hardware, software or peripheral devices belonging to the University or connected to a University network; (c) data and data storage facilities maintained or owned by the University or connected to a University network; and (d) networking devices or transmission media owned or operated by the University.
 This clause does not preclude the ability to access resources that Heidelberg has made publicly available through means such as the Internet.