• 17.3.15 Labeling

    Information assets must have their document classification clearly marked on the cover page, footer, header or watermark regardless of format. Includi...

  • 17.2.9 Compliance

    Any breach of information security, or misuse of IT Resources is regarded as serious. Breaches may result in disciplinary action, up to and including ...

  • 17.2.8 General Conduct

    Beyond the policies and procedures regarding usage of the IT Resources as detailed herein, all users are expected to exercise sound judgment, and in s...

  • 39.9 定義

    | Created on

    39.9.1 職員 本規程における職員とは、本学の教職員及び本学とは雇用関係はないが、本学において研究活動...

  • 39.2 Policy for Students

    | Created on

    OIST has procedures in place that provide students with systematic review processes for resolving both non-harassment and harassment issues.  Stu...

  • 39.9 Definitions

    | Created on

    39.9.1 Employees Employees, Fellows, External Researchers, and Personnel from Staff Agencies.   39.9.2 Bullying Bullying is any ongoing a...

  • Fall 2017 Lean Startup Entrepreneurial Training Program: Final Presentations

    | Created on

    DISCOVER THE LEAN LAUNCHPAD METHODOLOGY Learn how to identify commercial opportunities that can emerge from academic research by working on a real te...

  • Fall 2017 Lean Startup Entrepreneurial Training Program: Mid-checkin

    | Created on

    DISCOVER THE LEAN LAUNCHPAD METHODOLOGY Learn how to identify commercial opportunities that can emerge from academic research by working on a real te...

  • Fall 2017 Lean Startup Entrepreneurial Training Program: 3-day Opening Session

    | Created on

    DISCOVER THE LEAN LAUNCHPAD METHODOLOGY Learn how to identify commercial opportunities that can emerge from academic research by working on a real te...

  • Intro to Entrepreneurship Training Program

    | Created on

    This introductory session in innovation and entrepreneurship will introduce participants to the concepts and principles of Lean Startup, Business Mode...