You are located in service: RWTH Antivirus Protection

Terms of Use

Terms of Use

Kurzinformation

Cisco Secure Endpoint is a cloud-based anti-virus solution from Cisco that is made available to employees by RWTH Aachen University. Its use is possible on the basis of an NRW state license.

The services offered are hosted on servers located in Cisco cloud data centers and not in the RWTH Aachen University data center. RWTH Aachen University therefore has no physical access to the hardware, but only provides access to the software via a central instance.

Institutions of RWTH Aachen University can use Cisco Secure Endpoint as central anti-virus software on workstations and servers. If you as an administrator wish to use this solution in your institution, the following obligations and framework conditions apply. These are derived directly from Cisco's license conditions and measures for compliance with data protection and data security:

  • There is only authorization to use the software and services during the licensed period. All software must be deleted and services may no longer be used if RWTH Aachen or NRW terminates the contract or does not sign a follow-up contract before the end of the licensed period, depending on which event occurs first. The current contract end date is 30.09.2029.

  • The initial setup of a Cisco instance is carried out centrally by the IT Center. You are responsible for the configuration and administration of the provided instance.

  • Users must be informed by you / the institution about the transfer of data to Cisco when they are provided with a Cisco instance.

  • Inactive accounts that are no longer required must be deleted immediately.

  • As an administrator, you have the option in the cloud console of downloading individual suspicious files from affected computers for checking (“File Fetch”) and uploading them to Cisco for further analysis (“File Analysis”). This data remains visible and downloadable for all administration accounts in your institution even after the analysis has been completed in the console.

  • Please note the following information:
    • Downloading suspicious files (“File Fetch”) may only take place after prior consultation with the owner concerned
    • The transmission of strictly confidential data as a sample for analysis (“file analysis”) is not permitted due to the very high protection requirements. This includes in particular:
      • Data containing information that could lead to damage or liability for the University if published or lost, as well as personal data for which compliance with data protection regulations or the fulfillment of information obligations cannot be ensured. Examples of this are
      • Personal data (attendance lists or lists of participants at an event), in particular data on racial or ethnic origin, political opinions or religious or ideological beliefs
      • Travel or salary statements (financial data, social data, data relating to personnel files)
      • Research data that is not intended for the public domain
      • Technical data (construction plans of sensitive rooms; network plans)
      • Protected data (sick notes, draft certificates, contracts)
      • Examinations (expert opinions and corrections)
    • Data containing information that must be protected against unauthorized access. This includes, in particular, information that must be kept secret due to contractual obligations or information that is subject to a duty of confidentiality.

  • Use on private devices is not permitted

  • Use of the data to monitor employee behavior and performance is prohibited.

last changed on 11/19/2024

How did this content help you?

Creative Commons Lizenzvertrag
This work is licensed under a Creative Commons Attribution - Share Alike 3.0 Germany License