• 17.3.16 Copying

    Users and Document Management Administrators [link: 12.3.4.3.2] shall keep the number of copies of confidential information, in any combinations of me...

  • 17.3.15 Labeling

    Information assets must have their document classification clearly marked on the cover page, footer, header or watermark regardless of format. Includi...

  • 17.3.10 Protection of Information Assets

    In ensuring the basic protection of OIST information assets, users must handle Information Assets in a manner appropriate to the information classific...

  • 17.2.9 Compliance

    Any breach of information security, or misuse of IT Resources is regarded as serious. Breaches may result in disciplinary action, up to and including ...

  • 17.2.8 General Conduct

    Beyond the policies and procedures regarding usage of the IT Resources as detailed herein, all users are expected to exercise sound judgment, and in s...

  • 39.9 定義

    39.9.1 職員 本規程における職員とは、本学の教職員及び本学とは雇用関係はないが、本学において研究活動...

  • 39.2 Policy for Students

    OIST has procedures in place that provide students with systematic review processes for resolving both non-harassment and harassment issues.  Stu...

  • 39.9 Definitions

    39.9.1 Employees Employees, Fellows, External Researchers, and Personnel from Staff Agencies.   39.9.2 Bullying Bullying is any ongoing a...

  • 4.17 Reporting and Investigation procedures

    For reporting and investigation procedures in the case of any misconduct or suspicion thereof in research activities and use of research grants, see C...

  • 4.16 Provision of research facilities and services to users outside the University

    The University's research facilities and services are primarily for use in research and academic activities of the University, but when there is some ...

Search found 414 items