Data privacy

Data privacy is an important issue for TUM. We want to make sure that you know when and what type of data is being stored and for what purposes. Personal data stored on the university web server ( is accessed only when required for technical reasons. Processing of the data is subject to the provisions of the applicable data privacy laws, in particular, the State of Bavaria Data Protection Act (BayDSG) and the German Telemedia Act (TMG).

Below is a description of the type and scope of personal data that is accessed, for what purposes and how it is utilized. This information can be called up from the website at any time. 

1. Technical implementation

The TUM web servers are operated by the Leibniz Computing Center (LRZ).
Leibniz-Rechenzentrum (LRZ)
Boltzmannstraße 1
85748 Garching b. München

2. Log

When you call up this or other web sites, your Internet browser sends specific data to our web server. The following data is temporarily stored in a log file during the connection that is established for communication between your Internet browser and our web server:

  • IP address of the computer generating the inquiry
  • Date and time of the access
  • Name, URL and size of the retrieved file
  • Access status (requested file transmitted successfully, not found, etc.)
  • Web browser and operating system identifiers (if provided by the web browser)
  • Website that was accessed (if provided by the web browser)

The data in this log file is processed as follows:

  • The log entries are constantly and automatically analyzed in order to identify and react accordingly to attacks on the web servers.
  • In individual cases, such as reported outages, errors and security incidents, a manual analysis is performed.
  • Log entries older than seven days are anonymized by shortening the IP address.
  • The anonymized logs are used to create access statistics. The software for this application is operated by LRZ.


Because the IP addresses contained in the logs are not merged with other data, LRZ is not in a position to tie this information to specific persons. 

3. Booking data

When you set up a user account, we store the following data for documentation and billing purposes and to enable your participation in the event: contact data such as your name, address, institution and e-mail address, plus your user name and password.

As an option, you can add other information to your user account, such as telephone number, fax number or title.

4. Forwarding data to third parties

If you choose "credit card" as the payment method, you will leave the TUM website and be forwarded directly to "Sparkasse S-Internetkasse" (online payment service of the Sparkasse Bank), which is responsible for handling your credit card payment.

Under the provisions of the applicable laws, TUM is also authorized to forward data to certain government entities (agencies, courts of law)

When registering for a conference, please be aware that your name, institution and country is typically visible to the other participants in their user accounts (password protected area) in order to create a list of the conference participants.

5. E-mail security 

When you send us an e-mail, your e-mail address will be used only for the purposes of corresponding with you. Please note that security gaps can occur when transmitting data over the Internet. 100 percent protection against access to data by third parties is not possible.

6. Cookies

To expand the functional scope our Internet offering and to make it easy to use, we rely to some extent on so-called cookies, which can be used to store data on your computer when you call up our website. You can deactivate cookies or configure your browser so that cookies are stored only for the duration of the online session. This can restrict the functional scope of our Internet offering however.

7. Encryption

To protect your data from unauthorized access, we use encryption on several of web pages. In this case, data is transmitted between your computer and our server (in both directions) via the Internet with 256-bit SSL encryption (secure socket layer). You can check if the current connection is secure by looking at the URL in the address bar, which always begins with https://.

8. Changes to the data privacy policies

We reserve the right to adapt our data privacy policies in order to conform to current legal requirements or to implement changes to our data privacy declaration. We encourage you to review these data privacy policies regularly to ensure that you remain up-to-date with respect to how we protect your personal data. By continuing to use the service, you agree to accept the changes to the data privacy policies.


If you still have questions related to data privacy, you can find additional information on our data privacy administrator's website.