IT security and data protection

Information security is intended to ensure the confidentiality, integrity and availability of information. The guarantee of information security in IT essentially covers two areas:

Technical measures: Among other things, the use of virus scanners, spam and phishing filters, prompt security patches for operating systems, regular data backups, encryption of sensitive data, use of firewalls, authentication methods

Organisational measures: Among other things, training and awareness campaigns for users, access authorisations, documentation and procedural guidelines.


Almost every member of this university now uses a PC workstation or mobile device to process a wide variety of information and - in some cases - personal data in order to carry out their daily work. It is more or less taken for granted that the IT working environment and the required data are available, the information is reliable, and the data is protected against unauthorized access.

Unfortunately, it can be seen that these self-evident facts are increasingly being called into question by - in some cases criminal - attacks of various kinds. The focus of constantly changing and increasingly subtle attack methods is not only on IT infrastructures (networks, servers), but also on IT users themselves. Skillful manipulation of individuals is used as a "door opener" to launch a successful attack. In the case of a successful attack, the circle of victims usually extends far beyond the manipulated person.

In order not to leave you "out in the cold" in this increasingly problematic scenario, the university offers a new portal with self-training courses on the topic of information security and data protection for all university employees, in addition to the other training documents which you will find in the bar on the right.

Online courses:

IMPORTANT: Log in with <login name> or <login name>, depending on your duty station.

Information Security Question Time

In addition to self-study, the data center regularly offers a question and answer session on the topic of information security. Here, questions can be asked about the training courses or general questions about information security in daily work.

The question hour takes place on the first Monday of each month at 1 pm via BigBlueButton. The participation link will be visible after registration (login button at the top right of this page).

If you are planning to implement new processes or software and have questions about information security you can also contact informationssicherheit(at)


Data protection
  • What are personal data?
  • What may be collected?
  • How and for what purpose may it be processed?
  • How long may data be stored?
  • By whom may it be viewed
    Data security

    Risk analysis and risk assessment

    • Procedure for assessing the risk situation

    Hazards and risks

    • Presentation of concrete attack scenarios

    Protective measures

    • Procedures and behaviour around my data
      • from loss,
      • from unintentional or unauthorized change,
      • to protect against unauthorised inspection
    Opening hours

    IT-ServicePoint: Room G9
    Mo.-Fr.:    9:15 - 11:45 hour
    Mo.-Th.: 13:45 - 16:00 hour

    IT-Workspaces: Rooms G01, G03, G04, G12, G13, G14
    [24/7] - at night, on sundays and public holidays with your student card / staffmember card

    Questions? Suggestions? Critisism?

    Please send an E-Mail to help[at]


    Contact addresses

    back-to-top nach oben