Setting up a MySQL database

See Form

Please fill out directly on computer and print. 
Illegible forms could be incorrectly processed or not processed.

After printing
Please sign, have your advising institution stamp it, and send it to us in one of the following ways

Active help
If you’re logged in to the intranet, personal data - if they are saved - will be filled in automatically (name, e-mail, ...).

Content

Database Name
Please choose the name you would like which is related to the project. Please do not use technology-related names such as joomla, wordpress, typo3, ...


Submission: Fax:0711/459-23449 | Photo/Scan: kim-software@uni-hohenheim.de | personal: IT-Service-Desk |Postal address: University of Hohenheim, KIM (630), D-70593 Stuttgart

Signature and stamp

I hereby confirm that I will adhere to the regulations in the currently valid version of the State Data Protection Act (Landesdatenschutzgesetz, LDSG), in particular regarding the requirement to data privacy (Sec. 6 LDSG) and the technical and organizational measures on data protection (Sec. 9 LDSG) (Baden-Württemberg State Data Protection Officer: www.baden-wuerttemberg.datenschutz.de).

I shall follow the user regulations described below and immediately inform KIM when the project ends.

User Policy

User regulations
The user shall respect the KIM user regulations, the user regulations of the DFN organization communication services (Verein zur Förderung eines deutschen Forschungsnetzes e. V.), the Federal Data Protection Act (BDSG), and the netiquette (rules of conduct for network services).

Software use
The user recognizes the licence rights of the software manufacturer whose products are made available by KIM. Legally protected software may not be copied or modified. The detailed licence regulations may be viewed in the KIM.

Protecting your user account
You must keep the password for the database secret. The user must ensure that unauthorized persons do not obtain access to the database. (Don’t forget to log out, do not use trivial passwords.)

Limits for use
The use of the database for commercial or private purposes is prohibited.

System log
System-specific user activities will be logged insofar as this is necessary to maintain operational security and to ensure these regulations are followed. The log is not analysed or evaluated in any other way.

Violations
If you violate these regulations, your access rights may be revoked.

Personal data
Collecting, saving, and processing personal data is subject to the provisions of the Data Protection Act. If you have concrete questions, you should contact the Central Data Protection Office of the Baden-Württemberg universities, ZENDAS.

Liability
KIM is not liable for the loss of data or if unauthorized persons access the data.

Data back-up
The data saved in the database will usually be backed up daily. If problems arise, it is possible to restore the last available back-up of the database. Changes and new entries which were made after the time of the back-up, are then lost.


Do you have questions or comments about this site? contact form