Network Terms of Use

Read and follow the below rules and regulations regarding the use of computers and networks on campus at the University of Tokyo. These rules and regulations are applied to the use of personal computers, workstations, servers, and other computing facilities, including your own personal computer(s).

1. Set your computer(s) to automatically receive security and critical updates.

2. Install virus detection software on your computer and keep the virus definitions up to date all the time to avoid the most recent virus-related problems. Licensed virus detection software is available from the University of Tokyo. Please ask the lab staff where to obtain this software if you are interested. NOTE: Users are not allowed to connect computers to UT-net without installing virus detection software and the most recent virus definitions.

3. Do not share your assigned account name and password with anyone else. Keep your password secure. Appropriate passwords consist of letters, numbers, and special characters. In addition, these passwords should not be taken from words or phrases in any dictionaries. Examples of inappropriate passwords: “honda” (identical to the account name), “honda123” (account name and numbers), “123456,” “test123,” “opensesame,” and “qwerty” (keyboard layout).

4. Read the “Utilization Rules and Regulations for Electronic Journals” before accessing online journals. The Rules and Regulations are available at the following URLs:
a. http://ejournal.dl.itc.u-tokyo.ac.jp/index_e.html
b. http://ejournal.dl.itc.u-tokyo.ac.jp/keikoku_e.pdf

The following downloads are prohibited:

  • Systematic and programmatic downloading
  • Downloading a large amount of data in a short time

NOTE: Repeating these prohibited downloads may lead to a cancellation of the right to use electronic journals assigned to the University of Tokyo, and may negatively affect all individuals at the University of Tokyo.

5. Do not use peer-to-peer (P2P) software for personal use while on UT-net. Frequently used P2P software includes eDonkey (eMule,FlashGet), Gnutella (LimeWire,cabos), Tor, MXIE, AresGalxy, and Xunlei.

NOTE: P2P packet traffic on UT-net is monitored and tracked at all times, and P2P software users will be asked to elaborate on their intended use.

6. Other dos and dont’s:
When you use the internet on campus, always keep in mind that you must be responsible for all your behavior. Inappropriate behavior can cause serious problems for you and for the university. For example:

a. Using illegal (even possibly illegal) software.

b. Visiting inappropriate websites.

c. Providing inappropriate information through the internet. This behavior is strictly prohibited.

Any other similar activities, even if not specifically listed above, are also not permitted.

See also: http://www.cie.u-tokyo.ac.jp/RulesPertain.html