The URZ pools are available to all students, staff and authorised guests of Leipzig University.

Guests of the University Computer Centre must apply for a login and a temporary user authorisation at the service desk. All other guests should contact their institution in this regard. Access to the pools is only permitted with a valid student or staff ID. The authorisation to use the pool or the student or staff ID card must be presented to the staff on request.

Notes on use

  1. The data processing resources of the URZ are only made available to students for the fulfilment of tasks within the student education and to employees for the fulfilment of official tasks.
  2. Access to the university network and use of the workstation computers is only permitted via the personal LOGIN. The password associated with the LOGIN identifier must be kept secret.
  3. Working with someone else's LOGIN code or passing on the LOGIN code will result in the withdrawal of the authorisation to use the system. Misuse of the DP resources (see appendix) may also lead to withdrawal of the authorisation to use or may also have legal consequences.
  4. All software provided is subject to copyright regulations. The unauthorised installation of software is prohibited. The installation request must be submitted in writing with proof of licensing to the service desk (servicedesk@uni-leipzig.de).
  5. Smoking is prohibited in the pools of the computer centre and eating and drinking is prohibited in the pools.
  6. Printing on the laser and colour printers is only permitted with special paper. This paper must be obtained from the computer centre. The costs incurred are to be borne by the user.
  7. No liability is assumed for cloakroom and other personal items.
  8. When working in the pools of the URZ, the instructions of the support staff must be followed. In addition, the pools are monitored by means of a video system. This is to support all our efforts to ensure safety, order and cleanliness.
  9. Failure to follow the instructions for use may lead to exclusion from further work with the DP resources of the University Computing Centre and to blocking of the LOGIN.

The offences listed below constitute misuse1) of the URZ's data processing resources. The following list does not claim to be complete. In each individual case, misuse may also involve the violation of criminal or civil law provisions.

  • unauthorised installation of software, use of private hardware
  • spying on data, eavesdropping on data transmissions; passing on data obtained or received without authorisation
  • the exploration of weak points in systems and the activation of software suitable for this purpose
  • violating the integrity of data by altering or deleting them; disrupting ongoing computer operations (computer sabotage); manipulating programmes or data with fraudulent intent (computer fraud); unauthorised use of computer systems and unauthorised access to network services
  • the provision and retrieval of copyright-protected data (programmes, texts, images, etc.) without the authorisation of the authorised user; the production or distribution of pirated copies
  • unauthorised storage, modification, transmission or processing of protected personal data; neglecting to exercise due diligence in the authorised processing of personal data
  • the dissemination of information of a pornographic, youth-endangering, violence-glorifying, racist nature, endangering the democratic constitutional state or public order; the processing or storage of such information with the aid of the URZ's data processing resources
  • the violation of the personal rights of an individual through the dissemination of defamatory value judgements or factual allegations
  • burdening networks by excessive dissemination (targeted or untargeted) of information (information pollution)
  • Dissemination and storage of information irrelevant to research, teaching and study; distribution of advertising that has not been expressly requested
  • Use of resources for commercial purposes
  • Modification of system software, unannounced experimentation with computer resources; use of game software
  • Disregarding provided protection and testing mechanisms against computer viruses

1) Based on the access and usage regulations for the Bavarian university networks.