Network Committee Meeting Minutes
Internal domain allocation policy
Email address operation policy
Information security policy
Information security policy self-check and self-assessment results
FY2012
In FY2012, self-checks were conducted according to the Information Security Policy using the website access method.
FY2011
In FY2011, self-checks were conducted according to the Information Security Policy using the website access method.
FY2010
In FY2010, self-checks were conducted according to the Information Security Policy.
FY2009
In FY2009, self-checks were conducted according to the Information Security Policy.
Self-assessment is currently underway.
FY2008
In FY2008, self-checks and self-assessments were conducted according to the Information Security Policy.
FY2007
In FY2007, self-checks and self-assessments were conducted according to the Information Security Policy.
- Self-assessment questionnaire sheet (for faculty members) (Japanese), Self-assessment questionnaire sheet (for administrative staff) (Japanese)
- Department 1: Results (Japanese), Assessment sheet (Japanese)
- Department 2: Results (Japanese), Assessment sheet (Japanese)
- Department 3: Results (Japanese), Assessment sheet (Japanese)
- Department 4: Results (Japanese), Assessment sheet (Japanese)
- Department 5: Results (Japanese), Assessment sheet (Japanese)
- Department 6: Results (Japanese), Assessment sheet (Japanese)
- Department 7: Results (Japanese), Assessment sheet (Japanese)
- Department 8: Results (Japanese), Assessment sheet (Japanese)
- Department 9: Results (Japanese), Assessment sheet (Japanese)
- ICCEED: Results (Japanese), Assessment sheet (Japanese)
- Cooperative Research Facility Center: Results (Japanese), Assessment sheet (Japanese)
- Information and Media Center: Results (Japanese), Assessment sheet (Japanese)
- Administrative staff: Administrative staff Results (Japanese), Administrative managers Results (Japanese), Assessment sheet (Japanese)
- Total: Results (Japanese), Opinions (Japanese), Assessment sheet (Japanese)
Notes on Network Usage
Infringement of Copyright Using File Sharing Software
Subnet Configuration Guide
Subnetwork Management Manual
If you would like to avoid spending time on configuring subnetworks, consider using the hosting service and the routing service.
FAQ on Network Usage