Regulations for Access to and Use of the Guest Network at Ringberg Castle (Institute)
1. Area of application
(1) These regulations apply both to non-Institute computers which have access to the
guest network as well as to computer facilities made available by the Institute and used
to access the guest network. Computers which are not the property of the Institute may
only be connected to the guest network with the permission of the Institute.
(2) All users of guest networks are obliged to comply with these regulations, irrespective
of their legal relationship with the Max Planck Society (MPS).
2. Access rights
(1) There is no legal entitlement to access guest networks or use computer facilities
made available by the Institute and connected to the Institute guest network.
(2) Users who breach these regulations are liable to have their right of access
permanently or temporarily withdrawn or subsequently restricted. Persons concerned will
be afforded an opportunity to respond before access is withdrawn.
3. Duties of users
(1) Users shall refrain from any and all unlawful acts (e.g. downloading or uploading
material that is protected by copyright). In addition users shall refrain from any and all
acts that are likely to prejudice the interests or reputation of the MPS or third parties or
otherwise cause harm to the MPS or third parties (e.g. downloading or uploading
(2) The computer facilities made available by the Institute must be treated with care. It
is prohibited to make any changes to the installation or configuration of computers and
networks or manipulate the hardware or interfere in any way with the software
installation. In the event of functional defects or serious faults, the IT department must
be notified immediately.
(3) Users are obliged to install an up-to-date virus scanner and a firewall to protect their
non-Institute computers against malware. Users must provide proof of such protection on
request. Where necessary the IT department will provide appropriate software protection
within the meaning of Sentence 1 of this Paragraph.
(4) Users are obliged to use their non-Institute computers on the network solely via the
guest log-in approved in conjunction with their rights of access. This log-in must not be
disclosed for use by third parties. Similarly the guest network may only be accessed from
computers made available by the Institute via the guest log-in approved in conjunction
with the right of access, or in the configuration specified by the Institute.
(5) Users are in particular obliged
a) to use the guest network solely in accordance with these regulations;
b) to refrain from any action likely to interfere with due and proper operation;
c) to refrain from using chargeable services at the expense of the MPS;
d) not to offer any services that may be accessed via the Internet;
e) to observe the legal/contractual requirements to protect the rights of third parties
when using the guest network; it is in particular prohibited to use of peer-to-peer
services, file hosting/share hosting or Usenet services to distribute or download content
that is protected by copyright;f) to observe the provisions of the law, in particular criminal law, copyright legislation
and regulations for the protection of minors.
4. Logging and analysis
(1) The following user data are logged: User ID and/or MAC address, IP addresses of
sender and recipient, types of services used (e.g. http, ftp, telnet) and timestamp. Logs
are retained for a period of two months. However this period will be extended if there are
grounds to suspect any misuse of the guest network. In such case the requisite logs will
be retained until such suspicion has been clarified and investigations completed.
(2) Where necessary the data logs will be analysed for the following purposes
to guarantee due and proper system operation;
b) for resource planning and system administration purposes;
c) to protect the personal data of other users;
d) for billing purposes;
e) to identify and eliminate faults;
f) to combat misuse if there is evidence that the guest network is being or has been used
in contravention of these regulations.
5. Liability of users
Users shall be liable for any loss, damage or detriment suffered by the MPS either as a
result of their improper or unlawful use of the guest network – whether via a non-
Institute computer or via computer facilities made available by the Institute - or due to a
negligent failure on the part of users to fulfil their obligations arising from these
(2) Users shall be liable for any acts committed by third parties insofar as the user shall
have facilitated the same as a result of a negligent breach of these regulations.
(3) Users shall not however be liable for compensation pursuant to Paras. 1 and 2
provided that they have taken commensurate care in complying with these regulations
and the loss or impairment would have occurred even despite this care.
(4) Users must indemnify the MPS against all claims made by third parties against the
MPS as a result of a negligent breach of the obligations arising from these regulations.
(5) In the event that notice is given by the MPS to cease and desist on pain of
prosecution, this shall also include the imposition of such contractual penalty as shall be
due in the event of conduct pursuant to Paras. 1 and 2.
(6) The MPS reserves the right to take legal action against users who breach the terms of
6. Limited liability on the part of the Max Planck Institute
(1) No liability is assumed for access to the guest network, irrespective of whether via a
non-Institute computer or via computer facilities made available by the Institute. In
particular, there is no expressed or implied guarantee that the guest network will be
available at all times, either in full or without defect.
(2) The Institute shall not be liable for any loss or damage – whether direct or indirect –
in connection with such use other than in the event of wilful or gross negligence on the
part of the Institute. Limited liability does not apply in case of loss of life, physical injury
or impairment of health as a result of a negligent breach of duty on the part of the
Institute or a wilful or negligent breach of duty by a legal representative or vicarious
agent of the Institute.