• 17.3.18 Prevention of information leakage or manipulation in transit

    Users shall apply security controls when transmitting data of ‘confidential’ or higher classification to external parties. Such data must be en...

  • 17.3.17 E-mail

    Users are responsible for ensuring that information exchanged via e-mail is protected to a level commensurate with the classification of the informati...

  • 17.3.15 Labeling

    Information assets must have their document classification clearly marked on the cover page, footer, header or watermark regardless of format. Includi...

  • 17.2.9 Compliance

    Any breach of information security, or misuse of IT Resources is regarded as serious. Breaches may result in disciplinary action, up to and including ...

  • 17.2.8 General Conduct

    Beyond the policies and procedures regarding usage of the IT Resources as detailed herein, all users are expected to exercise sound judgment, and in s...

  • ヤーシャ・ネイマン准教授が挑む「紙一重の奇跡」

    | 作成日

      ヤーシャ・ネイマン准教授のオフィスに立ち入るのなら、時間と空間の本質についての一時間ほどの熱烈...

  • At the Razor’s Edge: Yasha Neiman

    Do not enter Professor Yasha Neiman’s office unless you are prepared for a gripping, hour-long lecture on the nature of space and time. Afire with e...

  • At the Razor’s Edge: Yasha Neiman

    | 作成日

    Do not enter Professor Yasha Neiman’s office unless you are prepared for a gripping, hour-long lecture on the nature of space and time. Afire with e...

  • ヤーシャ・ネイマン准教授が挑む「紙一重の奇跡」

    | 作成日

      ヤーシャ・ネイマン准教授のオフィスに立ち入るのなら、時間と空間の本質についての一時間ほどの熱烈...

  • 39.9 定義

    | 作成日

    39.9.1 職員 本規程における職員とは、本学の教職員及び本学とは雇用関係はないが、本学において研究活動...