2. Goal, Scope of Application and Users
3. Use of Private Devices for Business purposes
4. Use of Business Devices for Private Purposes
5. Rules for all Users of the TU Braunschweig IT Infrastructure
The use of mobile IT end devices is a matter of course today and continues to increase. In addition to private use, there is a wide range of applications in the professional environment. Colleges and universities have recognised the advantages of mobile devices and are using them to support and optimise business processes and for mobile working. Students use mobile devices for personal organisation and for a variety of processes and services related to their studies. The increasing prevalence, the ever-growing range of functions of mobile devices and the self-evident, ever-deeper integration into existing processes also bring with them downsides: the more these devices are integrated into the system landscape and business processes of the university and the more important they become, the greater their potential risk to the university. On the one hand, this concerns IT security and, on the other, the risk that official university information is only stored on a mobile device and not on the university's storage space. This means that data security is not guaranteed and the availability of data for authorised departments is not ensured.
Privately purchased (mobile) devices are often also used for business purposes. As a rule, these devices are not designed by the manufacturer for professional use (in terms of data protection and IT security). It can therefore be assumed that data security is not guaranteed. Another problem is that no clear boundaries are drawn between personal and professional applications or data
Conversely, in practice, work devices are also used for private purposes (e. g. email traffic). As access to business devices by the department is always permitted in principle, precautions must be taken to ensure that the rights of the data subjects are not violated in accordance with the EU GDPR.
The goal of this policy is to ensure that all organisational units at TU Braunschweig use IT devices that are secured and maintained in accordance with the state of the art. This also includes private (mobile) IT devices used for business purposes and business devices with proportionate private use.
In the context of this policy, 'mobile IT devices' refer to hardware that can directly or indirectly transfer data to other network-connected systems and is not permanently installed at a fixed location. This includes notebooks, laptops, tablets and smartphones.
Improper handling of IT and communication systems exposes TU Braunschweig to unforeseeable risks, which can have considerable consequences. In the case under consideration here, these could include the compromise of systems, (sub)networks or services offered by malware. The implementation of the requirements significantly supports the IT security of TU Braunschweig.
A further goal of this policy is to ensure that members of TU Braunschweig comply with legal regulations when using official devices using private data or private devices using official data, in particular with regard to data protection laws and the EU General Data Protection Regulation (EU GDPR), and thus avoid legal violations.
The following rules are intended to minimise the risk to IT operations as far as possible, to make work on and with the IT infrastructure of TU Braunschweig as secure as possible and to impair the efficiency of IT-supported work processes as little as possible.
A prerequisite for the business use of private devices as well as for the private use of business devices is the individual signing of the corresponding supplementary agreement between TU Braunschweig and the members and affiliates in accordance with the basic regulations of TU Braunschweig.
To simplify the scope of application, the following illustration can be used for orientation:
The use of private devices for business purposes is only permitted with the prior approval of the OU management. The approval must be documented and the OE must maintain and keep an up-to-date list of privately owned IT devices used for business purposes. The use of private devices for business purposes may only be granted if the employee has signed the supplementary agreement to the employment contract provided by the HR department on the use of private IT devices for business purposes and the private use of business IT devices, in which the details of access by the department are specified. The department must be granted permission to access business data within a reasonable timeframe. The supplementary agreement must also stipulate that the business data will be returned to the department and then securely deleted from the private device when the employee leaves the company or when the private device is sold. The supplementary agreement must also stipulate that the rules set out in this directive are also complied with on private IT devices used for business purposes (see next paragraph). Responsibility for compliance lies with the employee. The department must be able to monitor compliance with the rules (see paragraph 8. Further recommendations).
The statutory regulations on data protection and information security require that the department can ensure compliance with data protection on every IT device at all times, including private IT devices used for business purposes. In particular, this includes the obligation to demonstrably implement the rights of data subjects under the EU GDPR (right to erasure, right to rectification of incorrect data, right to information about stored personal data) on these devices as well. In accordance with the information security regulations, the department must also be able to access these IT devices at short notice in the event of information security incidents as part of security measures and for technical investigations.
Conversely, it must be ensured that the department does not access the private data on the private IT devices without sufficient prerequisites (e. g., when assisting law enforcement authorities). This requires a visible separation between private and business data when accessing the private IT device.
The establishment of this separation, e. g. through separate folders, is the responsibility of the user. The department may have unrestricted access to all data either marked as work-related or not marked as private. When accessing the device, the department must respect the employee’s privacy.
Any access by the department to private devices used for business purposes may only occur in compliance with the four-eyes principle. The affected person must be permitted to be present during the inspection.
The private use of work devices is only permitted if this use has been approved by the head of the organisational unit. The approval must be documented, and a list of company IT devices used for private purposes must be maintained and kept up to date. Private use shall only be permitted if the employee has signed the supplementary agreement provided by the personnel office regarding the business use of private devices and the private use of business devices, which sets out the details of departmental access. It must also be stipulated that the private data is securely deleted when the employee leaves the company and when the work device is returned to the department. Responsibility for compliance lies with the employee. The department must be able to monitor compliance with the rules (see section 8. Further recommendations).
Establishing this separation, for example through separate folders, is the responsibility of the users. The department may access without restriction any data that are either marked as business-related or not marked as private.
When the department accesses a device, the employee’s privacy must be safeguarded. Any access by the department to privately used business devices may only occur in compliance with the four-eyes principle. The affected person must be permitted to attend the inspection. For devices that have not been approved for private use, the department has unrestricted access.
In order to access the IT infrastructure of TU Braunschweig, it is mandatory for all persons covered by this regulation:
The following also applies:
In addition to the above rules, the following rules are binding for all employees of TU Braunschweig, both for business mobile and non-mobile IT devices and for private mobile and non-mobile IT devices used for business purposes.
If the following rules cannot be complied with, the device in question may not be used for business purposes.
In principle, the number of exceptions to this regulation must be limited to the minimum actually necessary in order to maintain information security at the Technische Universität Braunschweig. In order for the current situation to fall within the scope of the exception, it must therefore fulfil the following definition.
"Exception": the exception meant is not that you are using a private device, but that you cannot fulfil one of the specific rules in paragraphs 3-6.
If, for technical or organisational reasons, it is necessary to deviate from the above rules (Paragraphs 3-6) for technical or organisational reasons, an informal notification to this effect must be submitted to the Designated Office CISO by a person responsible for IT coordination. This notification shall include at least:
In addition to a valid reason, it is expected that any exception will be reported before the deviation is taken up and that it will be limited in scope, duration, and extent to what is strictly necessary.
The Designated Office CISO or an authorised person is responsible for reviewing the submitted report. The Designated Office CISO examines the reason and the proposed measures in terms of necessity, technical feasibility and safety, if necessary, with the advice of the GITZ, Data Protection Management and the Data Protection Officer. Submitted reports may be returned to the creators for the purpose of supplementation, may be subject to additional conditions or may be completely refused. The Designated Office CISO regularly reports to the IT Security Board on submitted reports and decisions on exceptions.
The Designated Office CISO maintains a register to document all existing exceptions and initiates an annual review for renewal. The named contact persons are requested for an update for this purpose.
All other policies on IT security or information security and data protection as well as all other policies on the use of IT also apply accordingly to mobile devices and apply in addition to this policy.
Users whose (mobile) devices do not meet the minimum technical requirements formulated here or whose usage behaviour does not comply with the recommendation formulated here can/may be technically and/or organisationally excluded from using the university infrastructure. This also applies to the period in which any measures under labour law are examined.
This policy takes effect on the date of publication following approval by the CIO Board without signature and will be circulated within the TU Braunschweig in accordance with the distribution list. All previous versions hereby lose their validity.
This document is intended for internal use only. Forwarding to third parties requires legitimisation by the CIO Board.