皇冠足球比分

图片
  • TOP
  • Security Policy

Security Policy

Ochanomizu University‘s Information Security Policy

1.Basic Philosophy and Policy

Contributing to humanity, society, and nature through education and research is the mission of Ochanomizu University. To carry out this mission, the university retains substantial information as assets and utilizes this information on a daily basis while continuing to produce and distribute new information. A solid information infrastructure system must be established and maintained as the foundation for such activities.
Although the university's computerized information infrastructure system provides a level of convenience that is dramatically superior to previous information systems that relied on only paper and postal mail, it involves serious risks due to the dispersal of information. Each organization and organizational member at Ochanomizu University must be aware of the seriousness of these risks and take responsibility for every action they take while using the information infrastructure system.
Ochanomizu University's information security policy (hereinafter referred to as the "Policy") stipulates the operational and usage authorization within the university's information infrastructure system, thereby clarifying the responsibilities of each of the university's organizations and individual members, with the goal of establishing and maintaining an information infrastructure system that is safe and reliable.

i. Definitions of Terms

The definitions of terms used herein are identical to those used in the Information Security Policy Guidelines established by the Information Security Measures Promotion Committee on July 18, 2000.
www.kantei.go.jp/jp/it/security/taisaku/guideline.html

ii. Scope of Policy and Covered Individuals

The scope of this Policy includes all information retained by the university, all networks administered by the university, all devices (computers, memory storage devices, etc.) connected to these networks (even temporarily), and all devices (computers, memory storage devices, memory storage media, etc.) used to store the university‘s information.
Individuals covered by this Policy include faculty members (full-time or otherwise), students in both undergraduate and graduate schools, research students, auditing students, students from affiliated schools, and all other members of the university or affiliated schools as well as commissioned vendors and visiting academics using the university's networks and information.

iii. Classification and Management of Information

All information handled by the university‘s departments and organizations (administrative information, research information, and educational information) is appropriately classified into three types, specifically, private information1, information disclosed with limitations2, and public information3. Each type of information is appropriately managed according to standards based on the level of importance (degree of demand for availability, degree of demand for completeness, and degree of demand for confidentiality). All information owned by the university is assigned to an administrator. No information is allowed to exist at the university without a designated information administrator. Each information administrator is given the responsibility, obligation, and authority to manage his/her assigned information. Management standards are established in the Security Policy Implementation Procedures (hereinafter referred to as the ”Procedures“).

  • 1. Information that only the assigned information administrator is allowed to view
  • 2. Information that only users with access privileges are allowed to view
  • 3. Information that the general public is allowed to view
iv. Organizational Framework and Authority

The following information security organization was established to plan, develop, implement, manage, evaluate, and continuously review specific details based on this Policy:

(a) Chief Information Security Administrator
The chief information security administrator is responsible for overall decision making on information security throughout the entire university, both on and off the campus, and in other organizations. The vice president (the head of the Academic and Information Board) takes on this role.
The chief information security administrator notifies the university system administrator of measures that are needed to ensure the smooth operation of information systems. Any emergency measure carried out by the university system administrator becomes the responsibility of the chief information security administrator.
(b) Information Security Committee
The Information Security Committee formulates and revises important materials, including basic information security policies, for the entire university. The Information Technology Promotion Planning Office doubles as the committee, with the head of the office acting as chairman. The committee educates and promotes awareness about information security in all departments while enforcing compliance with security policies.
(c) University System Administrator
The university system administrator manages the university's information infrastructure system by leading the System Administration Committee. In addition, the university system administrator assists the chief information security administrator in implementing information system management throughout the entire university. The university system administrator is authorized to take emergency measures during emergencies, regardless of the department. The head of the Information, Media and Education Square assumes this role.
(d) Department System Administrator
The department system administrator sets up the university system administrator and the System Administration Committee and communicates with both while maintaining and strengthening information security through technical research and deliberation as well as the implementation of measures aimed at ensuring that the department's information systems run smoothly. In times of emergency, the department system administrator is authorized to carry out emergency measures, but only within the department in question.

2. Information Security Measures

Information security measures are carried out after all physical, human, and technical security perspectives have been taken into consideration. Refer to the Procedures for details.

i. Physical Security
(a) Installation Sites and Administrators

Critical information system devices and memory storage media, including server consoles, must be installed within a controlled area (a place separated physically and monitored 24 hours a day by monitoring equipment and for which a record of authentication and room entry/exit is kept). Equipment administrators must be assigned to these information system devices and controlled installation areas. An equipment administrator is authorized to manage specific equipment and areas and is responsible for carrying this out. Physical locations inside such controlled areas must not be opened to anyone other than the equipment administrator(s) assigned to the server equipment in question.

(b) Master Copies and Completeness of Information

Master copies of information for which completeness must be maintained are to be stored in a form that cannot be overwritten to guarantee the authenticity of these master copies. The information administrator for each type of information is responsible for this guarantee.

(c) Information Backups and Availability

Data stored in server devices and other such locations must be backed up on a regular basis. The back-up schedule is to be determined based on the importance of the server device in question. The media on which data is to be backed up must be stored inside a controlled area in a room for which entry and exit is managed through authentication. The equipment administrator is responsible for these backups.

(d) Information Deletion and Confidentiality
Information eventually becomes unnecessary as time passes. The information administrator is responsible for deleting information that is no longer needed while giving consideration to the maintenance of confidentiality. This responsibility is particularly important when the information is private in nature. The information administrator must establish rules for the number of years that managed information is to be kept before being deleted. Information devices and storage media will eventually grow old and require disposal. The disposal of information devices and storage media (including the deletion of stored information) is the responsibility of the equipment administrator and requires the approval of the information administrator.
ii. Personnel Security
(a) Awareness of Responsibilities by the Entire Membership

The entire membership of the university must be aware that anyone can either cause or suffer from information security problems. To avoid both, all members of the university must be aware of their responsibilities with respect to maintaining the information infrastructure and acquire the knowledge and maintain the skills necessary to do so. All use