This short guide provides readers with the basics of information ethics and security. Detailed information can be found in the main content, which also includes an FAQ section. Most pages of this site is written in Japanese only at the time of this writing (Mar 4, 2016). We are working on English translation and expect to see it completed by the end of April. For the moment, most English page show its content in Japanese. Sorry for inconvenience. At a Glance Ethical and Legal Regulations Information Security Topics Notes Use of emails and the Internet Be careful not to commit or get involved in Internet fraud. To protect yourself from fraud, always check the legitimacy of the source of information you receive, and be cautious about who you share your information with. Do not send emails or use the Internet in ways that may be perceived as harassment by others. Use of SNS and blogs Be aware that what you share on social networking sites can be viewed by anyone in the world. Protection of personal data, privacy, and personal rights Protect personal data and privacy of others as well as your own. Researcher ethics Students, as members of the research community, are also expected to hold high ethical standards. Protection of information and intellectual property Be careful not to infringe copyright. Use of software Licenses must be acquired and relevant fees paid when installing and using software. Compliance with the law Failure to comply with existing laws may result in punitive measures. Tokyo Tech regulations Faculty and staff are obliged to follow Tokyo Tech regulations. Topics Notes Mobile devices When using small mobile devices that are easy to lose, take precautions not to leak information. Data backup and security updates Regularly back up the data and install security updates on your computers. Password management and hacking countermeasures Always use strong passwords and keep them secure. File sharing and network management Implement strict policies for access rights. How to deal with system failures, unauthorized access, and data leakage Contact the system administrator and the relevant departments immediately.