| Site Map | JAPANESE |
東工大ポータル

Agreements on Tokyo Tech Information and Communication Infrastructure

On the use of Tokyo Tech Information infrastrucrure, I will obey "the Tokyo Tech Information Ethics Policy & the Tokyo Tech Security Policy" given in Guidelines for Information Ethics and Security, the Guideline for the Tokyo Tech Information Infrastructure Use and Dealing with Communication Records.



*For those who forget a password of Matrix/OTP Auth., please refer to this page.

Guideline for the Tokyo Tech Information Infrastructure Use

Those who violate the following regulation, will be temporarily suspended from using Tokyo Tech Information Infrastructure. The countermeasure against the violation will be finalized by the Tokyo Tech Information Ethics Committee.

  1. Do not lend or share login or authentication information (login ID, password, matrix, etc.) with others;
  2. Make sure that there is no security problem when connecting your computer to Tokyo Tech Information Infrastructure;
  3. Do not take any action that overloads Tokyo Tech Information Infrastructure;
  4. Do not use P2P software or equivalents for communication;
  5. Do not carry out intentional cyber attacks;
  6. Do not violate Intellectual Property Rights;
  7. Do not engage in defamation or harassment;
  8. Do not perform pyramid schemes or other fraud acts;
  9. Do not act against good public order and customs.

Dealing with Communication Records

Keep the following communication records to maintain the security and also to cope with the possible troubles caused in and outside of campus:

  1. Access dates;
  2. Connection user name (computer log-in ID);
  3. IP address or MAC address;
  4. Web access records (URL);
  5. Information required in our security facilities;