Rules and regulations

For all users and operators of IT systems at the TU Darmstadt, the central regulations for information security of the TU Darmstadt apply. The currently valid regulations are listed below. The guideline for information security of the TU Darmstadt (Leitlinie zur Informationssicherheit der Technischen Universität Darmstadt) forms the basis for the IT security process of the TU Darmstadt and the respective organizational structure.

Die Leitlinie zur Informationssicherheit der TU Darmstadt wurde am 15. Oktober 2020 verabschiedet. Sie bildet eine für alle Organisationseinheiten verbindliche Basis für den IT-Sicherheitsprozess der TU Darmstadt und die dafür erforderliche Organisationsstruktur.

Die Leitlinie zur Informationssicherheit der TU Darmstadt definiert Aufgaben und Verantwortlichkeiten, um die Vertraulichkeit sowie die Integrität und Verfügbarkeit der Daten und IT-Systeme unter Berücksichtigung der datenschutzrechtlichen und sonstigen gesetzlichen Vorgaben – zu erreichen.

Die Leitlinie bildet einen ersten Meilenstein in einem kontinuierlichen IT-Sicherheitsprozess für die TU Darmstadt. Weitere konkrete Schritte und Maßnahmen werden folgen.

Leitlinie zur Informationssicherheit herunterladen (opens in new tab)

Informationssicherheitsleitlinie für die Hessische Landesverwaltung, auf die die Benutzungsordnung für IT-Systeme der Technischen Universität Darmstadt verweist ist nachzulesen im Staatsanzeiger für das Land Hessen, Ausgabe 47/2021, Punkt 1082 (opens in new tab) . [Quelle: Staatsanzeiger für das Land Hessen]

Die Benutzungsordnung für IT-Systeme der TU Darmstadt wurde am 01.10.2019 vom Präsidium genehmigt und in der Satzungsbeilage 2019-V vom 19.12.2019 veröffentlicht.

Access restricted section: Log in to see this section.

Publication: December 2021

The aim of this policy is to ensure a sufficient level of security for the use of user name/password procedures. The necessary basic regulations and instructions for users and system operators are listed in the policy.

Download the password policy (opens in new tab)

Access restricted section: Log in to see this section.

Access restricted section: Log in to see this section.

Access restricted section: Log in to see this section.

E-mail services at the TU Darmstadt run in accordance with current security standards. In order to comply with these, rules are required (resolution of 25.09.2007), which are specified via implementation regulations:

All incoming and outgoing e-mails are routed through the central e-mail server of the HRZ.

Access from outside to the SMTP port of the TU Darmstadt is only possible for explicitly registered mail servers.

The computers of the TU Darmstadt are therefore largely protected against

  • incoming/outgoing virus-laden e-mails and
  • incoming spam (marking).

The Internet is protected against

  • virus-laden computers of the TU Darmstadt.

In accordance with the IT user regulations, the aforementioned security measures do not release users from their responsibility to take a critical look at e-mail attachments before opening them.

Blocking old Office formats, macros, executable files

Since viruses can easily be introduced via old Office formats and the macros they contain, it has no longer been possible to receive e-mails containing such documents since the beginning of 2020. Affected are the formats doc, .docm, .dot, .dotm, .pot, .potm, .ppa, .pps, .ppt, .pptm, .html, .htm, .xll, .xlm, .xls, .xlsb, .xlsm, .xlt, .xltm, .xlw as well as .exe.

For details see news of the HRZ from 30.03.2020 and 14.01.2020.

The HRZ offers university-wide access to the WLAN eduroam. If you operate your own WLAN at your institute or institution, please note the following:

For the operation of a wireless LAN alongside the infrastructure of the university data center, boundary conditions must be met for smooth operation and trouble-free coexistence.

The following boundary conditions apply to the operation of the WLAN infrastructure:

  • No free network access (access only with authentication).
  • Authentication is based on the user ID and not on hardware or IP addresses.
  • Data traffic is encrypted (tap-proof). No clear text passwords are allowed to pass over the network.
  • The technology supports a maximum of 3 overlapping WLAN cells next to each other (frequency range coverage).
  • The “User Regulations for IT Systems of the Technical University of Darmstadt” apply (e.g. the prohibition of passing on the user ID also applies here).
  • Individual institutes/departments of the TU Darmstadt are allowed to operate their own gateways that can be accessed via the WLAN.
  • The university computer center offers the centrally operated WLAN eduroam throughout the university. Existing institute gateways can then be included in this.
  • In case of conflict, the central WLAN operated by the HRZ has priority over an institute WLAN.
  • The WLAN must also be a separate, closed subnet in institutes.
  • No servers may be operated in the WLAN (except for the gateway).
  • Connection data (IP, user ID, time) are generally logged. Institutes that operate a corresponding gateway are also required to take appropriate measures.
  • In the 2.4 GHz range, only channels 1, 6 and 11 may be used.
  • No channel bundling may be used in the 2.4 GHz range.
  • No decentralized WLANs may be operated in the 2.4 GHz range in the reception area around lecture halls.
  • It is recommended to deactivate old coding methods, especially 802.11b.