| Site Map | JAPANESE |

Agreements on Tokyo Tech Information and Communication Infrastructure

On the use of Tokyo Tech Information infrastrucrure, I will obey "the Tokyo Tech Information Ethics Policy & the Tokyo Tech Security Policy" given in Guidelines for Information Ethics and Security, the Guideline for the Tokyo Tech Information Infrastructure Use and Dealing with Communication Records.

*For those who forget a password of Matrix/OTP Auth., please refer to this page.

Guideline for the Tokyo Tech Information Infrastructure Use

Those who violate the following regulation, will be temporarily suspended from using Tokyo Tech Information Infrastructure. The countermeasure against the violation will be finalized by the Tokyo Tech Information Ethics Committee.

  1. Use one's own account only
    (do not use others' account or do not let anyone use your account);
  2. Verify that there is no security problem when connecting your computer to Tokyo Tech Information Infrastructure;
  3. Do not violate Intellectual Property Right;
  4. Do not act against good public order and customs;
  5. Do not perform fraud acts, such as pyramid scheme;
  6. Do not engage in defamation or harassments;
  7. Do not deliver intentional attack;
  8. Do not use P2P software such as indicated in this list;

Dealing with Communication Records

Keep the following communication records to maintain the security and also to cope with the possible troubles caused in and outside of campus:

  1. Access dates;
  2. Connection user name (computer log-in ID);
  3. IP address or MAC address;
  4. Web access records (URL);
  5. Information required in our security facilities;