- Information about the whole service
- Usage Fee
- Applying for Services
- for the contractor's ID
- Procedures after started using the service
- 【Limited on-Campus】申請方法
- VM Hosting service
- Hosting services
- Manuals ・ Guidebooks
- Contents creation guidebook
- Security measure, notice for intellectual property
Security measure, notice for intellectual property
We will explain some cautions for security measure in using this service here. We can't support the concrete way for security measure in this contents because new method of attack is conceived everyday and strategy for that will change as well. Please refer to the professional books(latest version) for the concrete security measure of the program.
Also,IPA publish the latest information concerning information security. Please check this Website regularly.
The server connected to Network all the time is operating in danger of the attack from outside. Suppose the vicious outsider hack into the server, there will be the case that user's data leaks out or is altered or deleted as well as the server itself or the website itself becomes the attacker. Also there might be the case that the function of the server becomes weak or the server shut down because the load is applied to the network or the server due to the DOS attack. Furthermore, the mail address written in the web page were recognized by the crawler and tons of spam mail will be sent to the managing mail address.
In keeping the security of the server, it's necessary to deal with the server being aware of the daily security measure.
We will introduce the basic things to be careful below.
- Changing the password regularly
- Don't tell the information to others(Don't put your information where can be seen)
- Don't operate(install) the unnecessary server application.
- Close the port which you don't use
- Use the secure communication or authentication by SSL or SSH
- Don't put your mail address as is on Web(@has to be graphic for instance)
VM hosting service and webpage service support the publication of the Web application which use the program of the server side script such as PHP or CGI, however the operation of the client(enter) influence the service of the server in the Web application unlike the ordinal Web page.
Therefore once the program had vulnerability, it cause the attack by the attacker even though the management of the server is thoroughly upheld. So you will be required to be cautious not to have vulnerability on program reading the books of programming which explain the security in creating the Web application.
As the VM hosting service enables to build up and manage the server with root, users can add various software later in the server of VM, where the vulnerability of the program you use will be found. Once the vulnerability was found, the latest version(completed measure) will be published and users should update them.
.In providing VM, initially installed software(server application or OS) are checked and updated regularly. But users should manage for the one added later. Please keep in mind to check the update information and keep the version up-to-date.
We fix the standard of information security measure in Kyoto University. Please be cautious of the security measure concerning the managing VM or the Web page etc. Please refer to the Office of Information Security Management page for the details of security measure rules in Kyoto University.
We will explain some cautions about intellectual property rights in publishing the information using this service. If you treated the intellectual property right in wrong way there might be the case that it will develop into criminal case as well as having financial damage such as being claimed for damages or losing the opportunity for acquisition of rights.
You are not allowed to use the works with copyright without permission in publishing web page. And you are not allowed to create and publish the copy of the works or the parody without permission. The copyright occurs automatically as of the publishing of the work and the terms for subject of protection is fixed as follows.
- 50 years after the death of author
- 50 years after published in case the author is unknown ,has an assumed name, or is under the name of a corporate body
- Only for movie, 70 years after published
There's no problem in using the works which has no copyright anymore or copyright-free materials. Also you can refer the works with copyright in writing where to come from, however it has to be performed in the correct range in a purpose.(You are not allowed to do that in case that the text and the quotation turned to the opposite way in quantity and quality such as most of the published text consist of quotation.)
Users can add various software in the server of VM because VM hosting service enables users to build up and manage the server with root. Be sure not to use the unauthorized copy with software for business nor to boss which violates the licensed agreement because they are also the infringement of copyright.
There are the institute of industrial property such as patent in Japan and most of the country adopt the institute called first file system. This system is not judged the time for completing the invention etc but judged the admission of the right based on the time for application.
Therefore acquisition of the rights should meet the criteria of "not be known in public" "not be conducted in public" "not be written in the distributed publications". It will be judged as known in public and can't get the acquisition of right in case the information for the accomplishment of invention was on public before the application.
In having the information about the research to be acquired of industrial property, please be sure not to publish them until the completion of application. Also, you are required to refrain from storing these information in VM managing as network server as much as you can.