Revocation of the Account

In the event of (repeated) violations of the Operating and User Regulations or the "Supplementary Guidelines Concerning TUGnet" or in the event of justified suspicion of misuse of the account by unauthorized persons, the user's authorization to use the account will be revoked.

  • In case of an abused account, this is done by blocking the account in TUGRAZonline and changing the password.
    The account will then remain blocked until it has been clarified how the account could have been misused (phishing, malware, …) and the cause has been remedied. After that the account will be unlocked in TUGRAZonline, the user has to set a new password in the usual way.
  • In case of an internal computer by blocking this computer until the problem is solved (the IT officers will be informed, in case of recurrence also the head of the organizational unit and in case of legally relevant incidents also the legal department).
  • In case of an external access at the n.th violation without exception by blocking the access account for the duration of 2n-1 weeks.
  • A block is not automatically lifted, the blocked user must contact the IT support after the blocking period (see above) has expired and the reason for the block has been removed!
    The block will also be imposed if the violation of the rules of operation and use is unintentional.
    Mail requests before the end of the blocking period generally increase the duration of the block by 1 day.

Explanation of reasons for blocking

A computer infected with viruses or worms is a violation of §3 and §4 of the "Supplementary Guidelines concerning the TUGnet".
Incorrectly configured outgoing mail server / SMTP worm:
If we notice that a computer repeatedly tries to send emails directly (i. e. not via our SMTP server), then we have to assume that this computer is either misconfigured or infected with "malware". The assigned account will be blocked until the malware suspicion is clarified.

Offering copyrighted data violates §3.

Annotation:
Many users of so-called file-sharing programs (P2P) do not realize that they are simultaneously and illegally offering the downloaded data for download as well - since the rights holders or their legal representatives object to this on an almost daily basis, and since this is a detriment to other users (e.g., due to extreme bandwidth wastage, for example, in WLAN), P2P data transfer has been prevented by means of IPS.