コンテンツ

  1. HOME
  2. Services
  3. Hosting services
  4. Manuals ・ Guidebooks
  5. Contents creation guidebook
  6. Security measure, notice for intellectual property

Security measure, notice for intellectual property

Back to the TOP of contents creation guidebook

About security measure

We will explain some cautions for security measure in using this service here. We can't support the concrete way for security measure in this contents because new method of attack is conceived everyday and strategy for that will change as well. Please refer to the professional books(latest version) for the concrete security measure of the program.

Also,IPA publish the latest information concerning information security. Please check this Website regularly.

Security for managing server

The server connected to Network all the time is operating in danger of the attack from outside. Suppose the vicious outsider hack into the server, there will be the case that user's data leaks out or is altered or deleted as well as the server itself or the website itself becomes the attacker. Also there might be the case that the function of the server becomes weak or the server shut down because the load is applied to the network or the server due to the DOS attack. Furthermore, the mail address written in the web page were recognized by the crawler and tons of spam mail will be sent to the managing mail address.

In keeping the security of the server, it's necessary to deal with the server being aware of the daily security measure.

セキュリティ対策不足による被害

We will introduce the basic things to be careful below.

  • Changing the password regularly
  • Don't tell the information to others(Don't put your information where can be seen)
  • Don't operate(install) the unnecessary server application.
  • Close the port which you don't use
  • Use the secure communication or authentication by SSL or SSH
  • Don't put your mail address as is on Web(@has to be graphic for instance)

The danger of the program with vulnerability

VM hosting service and webpage service support the publication of the Web application which use the program of the server side script such as PHP or CGI, however the operation of the client(enter) influence the service of the server in the Web application unlike the ordinal Web page.

Therefore once the program had vulnerability, it cause the attack by the attacker even though the management of the server is thoroughly upheld. So you will be required to be cautious not to have vulnerability on program reading the books of programming which explain the security in creating the Web application.

As the VM hosting service enables to build up and manage the server with root, users can add various software later in the server of VM, where the vulnerability of the program you use will be found. Once the vulnerability was found, the latest version(completed measure) will be published and users should update them.

.In providing VM, initially installed software(server application or OS) are checked and updated regularly. But users should manage for the one added later. Please keep in mind to check the update information and keep the version up-to-date.

Standard of information security measure in Kyoto University

We fix the standard of information security measure in Kyoto University. Please be cautious of the security measure concerning the managing VM or the Web page etc. Please refer to the Office of Information Security Management page for the details of security measure rules in Kyoto University.

コンテンツ作成ガイドTOPに戻る

About intellectual property

We will explain some cautions about intellectual property rights in publishing the information using this service. If you treated the intellectual property right in wrong way there might be the case that it will develop into criminal case as well as having financial damage such as being claimed for damages or losing the opportunity for acquisition of rights.

Cautions for the infringement of copyright

You are not allowed to use the works with copyright without permission in publishing web page. And you are not allowed to create and publish the copy of the works or the parody without permission. The copyright occurs automatically as of the publishing of the work and the terms for subject of protection is fixed as follows.

  1. 50 years after the death of author
  2. 50 years after published in case the author is unknown ,has an assumed name, or is under the name of a corporate body
  3. Only for movie, 70 years after published

There's no problem in using the works which has no copyright anymore or copyright-free materials. Also you can refer the works with copyright in writing where to come from, however it has to be performed in the correct range in a purpose.(You are not allowed to do that in case that the text and the quotation turned to the opposite way in quantity and quality such as most of the published text consist of quotation.)

Users can add various software in the server of VM because VM hosting service enables users to build up and manage the server with root. Be sure not to use the unauthorized copy with software for business nor to boss which violates the licensed agreement because they are also the infringement of copyright.

Notice of the information service concerning the design or the patent before application

There are the institute of industrial property such as patent in Japan and most of the country adopt the institute called first file system. This system is not judged the time for completing the invention etc but judged the admission of the right based on the time for application.

Therefore acquisition of the rights should meet the criteria of "not be known in public" "not be conducted in public" "not be written in the distributed publications". It will be judged as known in public and can't get the acquisition of right in case the information for the accomplishment of invention was on public before the application.

In having the information about the research to be acquired of industrial property, please be sure not to publish them until the completion of application. Also, you are required to refrain from storing these information in VM managing as network server as much as you can.

Back to the TOP of contents creation guidebook

 

Copyright © Institute for Information Management and Communication, Kyoto University, all rights reserved.