About UTokyo
Home > About UTokyo > Rules and Regulations > UTokyo Basic Policy on Information Security

UTokyo Basic Policy on Information Security

1. Basic Principle on Information Security

Collapse

To fulfill our mission to advance humanity by conducting robust research and education in the highly information-driven society of the 21st century, the University of Tokyo (hereafter UTokyo) must not only maintain its information infrastructure but also ensure the security of its information assets. The Information Security Policy stipulates necessary rules to ensure information security, consisting of the Basic Policy and the Standards for Information Security Measures. Furthermore, specific procedures are defined to ensure reliable implementation of the Information Security Policy. These measures are intended to raise awareness of the importance of information security among all users of UTokyo, and ensure the security of all information assets owned by the University.

2. Scope of the Information Security Policy

Collapse

The target users and assets of the Information Security Policy are as follows:

Users

Executives, full-time and part-time faculty and staff, students, research students (including auditing students), and other individuals approved to access information assets owned by UTokyo (collaborators, visitors, external contractors, etc.).

Assets

All information assets owned by UTokyo, including “information” and “information systems”. All types of media (magnetic, optical, printed, etc.) storing information are subject to this policy, including magnetic discs, flash drives, and handwritten notes, among others. For the time being, specimens such as DNA samples are not subject to this policy. Information systems refer to any system that handles information. They include electronic systems as well as systems that handle printed materials such as campus mail. This policy is applicable to all university-owned information assets even if they are stored in information systems outside UTokyo.

The UTokyo Information Security Policy has four main objectives:
  1. Classification and thorough management of information assets owned by UTokyo based on their level of importance
  2. Defense against breaches targeting information assets owned by UTokyo
  3. Prevention of harmful acts against information assets owned by UTokyo
  4. Implementation of early detection and prompt handling of security breaches at UTokyo

3. Basic Policy on Information Security

Collapse

3.1. Organization and management framework

The Chief Information Security Officer (hereafter CISO) oversees the entire University. The CISO makes comprehensive decisions related to information security and is responsible for information security both within and outside UTokyo. The CISO sets forth information security measures and has the authority to take steps necessary to enforce them across the University. CISO may organize necessary setups for this purpose.

3.2. Information Security Policy and Implementation Procedures

Information security reviews shall be periodically conducted to assess the current state of information asset management. Risk analysis shall be performed to establish the Standards for Information Security Measures and the Implementation Procedures. They shall be reviewed periodically.

3.3. Classification and management of information

Information shall be classified and an appropriate information management method shall be defined.

3.4. Information security of information systems

Management methods shall be defined for information systems.

3.5. Clarification of information security requirements

Information security requirements shall be defined to prevent destruction, damage, tampering, or unauthorized use of information assets, as well as service interruptions or suspension of services caused by unauthorized access, from inside or outside the University.

3.6. Human factors in information security

Rules and procedures shall be developed to ensure that the Information Security Policy is observed. In addition, education and training shall be conducted to raise awareness of and promote compliance with the Information Security Policy.

3.7. Response to information security event

Protocols shall be established to handle information security events (potential incidents and failures related to information security).

3.8. Measures against violation of the Information Security Policy

Rules shall be established to process suspected or actual violations of the Information Security Policy.

3.9. Public relations and information desk for inquiries and complaints

A system for public communications and a contact point for inquiries and complaints shall be established.

3.10. Self-assessments and information security auditing

The processes for self-assessments and information security auditing shall be determined.

3.11. Proactive security reviews

Measures shall be implemented for proactive security reviews.

3.12. Information security budget

Procedures for budget proposals related to university-wide information security shall be established.

3.13. Exceptional cases

Measures to handle exceptional cases shall be established.

Inquiries about the content of this page: Security Management TeamSend inquiry
Access Map
Close
Kashiwa Campus
Close
Hongo Campus
Close
Komaba Campus
Close