Safe and Secure Use of the Information Systems (Details Regarding)

 
Details Regarding Brochure “Safe and Secure Use of the Information Systems”

Go To Japanese Page / Japanese Brochure / Chinese Brochure

This page provides details regarding the brochure “Safe and Secure Use of the Information Systems” created by the Office for Information Infrastructure Planning, Organization for Information Infrastructure at the University of Tsukuba.

Updated in April, 2024

Table of Contents

Details for Page 1.

Guidelines you must follow to use the information systems in the University of Tsukuba.

When using the University of Tsukuba’s information systems (networks, computers, etc.), there are several guidelines you must follow; you can find more information regarding these guidelines below. Regarding the brochure’s check-list, some of the most important items are explained here; however, there are many other guidelines that need to be observed. Please use the university’s information systems while following these guidelines.

Back to TOC

Details for Page 2.

I have completed the “INFOSS Information Ethics” Course.

Please complete the “INFOSS Information Ethics” Course to obtain more details regarding this brochure and a deeper understanding of the explanations it contains. To take the course or verify your completion of the course, please refer to INFOSS Information Ethics Course.

Back to TOC

I regularly update Windows and use all software programs in their most recent version.

You must stop using unsupported version of the software programs immediately and replace them with their most recent version. Instructions for updating certain software programs can be found below.

There are two types of updates for macOS and Windows: security updates and feature updates. You must always perform security updates as soon as they are available. However, in the case of feature updates, you should install them only after the anti-virus software is capable of supporting these updates.

Back to TOC

I have installed an anti-virus software program. In addition, I automatically update the virus definition files to protect the computer from viruses.

antivirus.png

The University of Tsukuba has purchased a site license of an antivirus software program. With the new license, the antivirus can be installed on up to three personal devices. The devices can be a combination of Windows machines, Macintosh machines and mobile terminals, such as iOS or Android. The total number of installations must be less than 4. For more information, please refer to the following:

Back to TOC

Details for Page 3.

When I use the internet, I pay close attention to fraud.

SAFE LIVING – How to Live a Pleasant Student Life”, published by the Office of Student Welfare, contains various important points you need to have in mind, not only when using the information systems belonging to our university, but also in your daily life.

Phishing e-mails are typically sent to large numbers of unspecified users, so others may have received similar e-mails to the ones you received. The following web page publishes such phishing e-mails. If you receive a suspicious e-mail, you may check whether similar ones appear on this web page. However, please note that it may take some time before the e-mails are published.

Some suspicious e-mails for a targeted attack are sent to steal information within a specific organization. Since only persons in that organization can receive these e-mails (called targeted attack e-mails), if you receive a suspicious email, you should check if your colleagues received similar ones. Moreover, if you carefully read the contents of the targeted attack e-mails, you can find some typically suspicious characteristics. You can learn how to identify targeted attack e-mails from the following web pages.

Even though your computer is not actually infected with a virus, a rogue security software fraud will freqeuntly display warning messages that are trying to trick you into buying rogue security software programs or fake technical support contracts. You can learn about support fraud techniques and how to deal with them by following the links below.

The following document offers helpful information in order not to fall victim to “one-click fraud”.

If you are faced with a situation involving fraud and you find it difficult to judge it by yourself, do not attempt an easy solution. Please contact your friends or faculty members or contact one of the consultation services listed below.

Back to TOC

I never give my password to anyone.

pass1.png

You should never give your password to anyone or write it down for other people to find. You should also make sure that no one is watching while you input your password. Please be very careful and do not let anyone steal your password.

When using the network and logging into various information systems, please make sure that your password is not revealed to anyone. In e-mails or on the web in general the information is basically transmitted unencrypted. Please make sure not to transmit your password or other personal information unencrypted.

Furthermore, on computers in public places, such as internet cafes, key-loggers (programs that record all the keys entered) might be installed. Please do not enter sensitive information on computers whose integrity is not guaranteed.

Back to TOC

I never use other people’s passwords and user names.

The law regarding unauthorized computer access forbids not only logging in with other people’s username and password, but also providing other people’s user names and passwords to a third party as encouragement of unauthorized access.

Back to TOC

I have set up a password which is hard to break.

pass2.png

The following document offers helpful information on how to set up a password that is difficult to guess.

You can use the following links to change your password for two of the information systems used in the University of Tsukuba.

When you use your personal device, you can use a password manager to automatically generate strong passwords and automatically input stored passwords. Some operating systems and web browsers provide password management functions; it is a good idea to check whether these functions can be used on your device.

Back to TOC

Details for Page 4.

I always manage personal information carefully and I always take measures to prevent information leakage.

The following document (in Japanese) reports on the importance of personal information protection. If you improperly handle personal information, you may cause a great deal of trouble for many people and this can lead to loss of social trust not only in our university, but also in you. Please understand the importance of personal information protection as a problem for each person, and be careful when handling personal information.

Back to TOC

pass3.png

As a member of the University of Tsukuba, I act responsibly and ethically when posting information on social networking sites and the Internet in general.

The University of Tsukuba has established the guidelines for use of social media and provides a guidebook for use of social media.

You may get into trouble if you post information that only the people inside your organization know or if you confess criminal activities online. You should be aware that anyone can see the information (personal or not) that you post on the Internet, and act responsibly and ethically.

Back to TOC

I never duplicate any copyrighted materials or make them available to a third party on the network.

copyright.png

Please have in mind the following guidelines regarding transmission of information on the web from the University of Tsukuba.

You may also be punished for downloading any kind of copyrighted material (not only digital audio or visual recordings) when you are aware that it was uploaded infringing copyright. For more information, please refer to the following:

Back to TOC

I do not have any file exchange software program installed.

File-sharing software programs are designed for exchanging files over the network. Although they are expected to be used for distribution of free programs or in other beneficial ways, it is often the case that they are used for distributing various works without the author’s consent.

The University of Tsukuba forbids the use of any file exchange software program inside the campus network, including on the users’ personally owned computers. There is a system in place that blocks the use of file exchange software 24 hours a day and if you violate these rules, you may be punished by the authorities of the university.

The following represent examples of file-sharing software programs:
Xunlei, BitTorrent, μTorrent, LimeWire, Cabos, BitComet, Vuze (Azureus), Transmission, eDonkey, WinMX, Share, Winny, PerfectDark, etc.
If any of these programs are installed on your computer, please uninstall them immediately. In the following links you can read more information on how to uninstall these programs.

If you have a legitimate reason to use a file exchange software program inside the university campus, please contact us.

Back to TOC

I never download software programs of unknown origin.

Before you download software programs, you must check that a legitimate provider or distributor provides the web page. It is dangerous to use software programs offered by web pages of unknown origin, as this increases the risk of infecting your computer with a virus.

When you install apps on your smart phone, make sure you get these apps only from official stores, such as Google Play and App Store.

Back to TOC

Contact us if you find any problems.

Please contact us immediately if you find security vulnerabilities and defects in the information systems of the University of Tsukuba, infringement of copyright, leaking of classified or personal information, release of classified information or personal information about faculty members of the University of Tsukuba through the information systems outside the university, and unauthorized use of contents owned by the University of Tsukuba.

Contact information

University of Tsukuba Information Security Incident Response Team (ISIRT)

  • Tel: 029-853-2070 (Japanese Only)
  • e-mail: incident [at] cc.tsukuba.ac.jp