Instructions on Use of PC Rooms
Notes on using the Computer Rooms
-
No food or drink is allowed.
If food is spilled onto a computer or keyboard, contact failures or corrosion leading to malfunction can occur. As many users share the computers in the Computer Room, one machine breakdown can inconvenience many other students. For this reason, no food or drink is allowed in the Computer Rooms. Do not bring food or drink into the Computer Rooms (However, drinks with a lid are excluded). -
No gaming is allowed.
The computers installed at Keio are to be used for educational and research purposes. You can use them to make your campus life fruitful, but gaming does not accord with these purposes. We prohibit the students from playing games on the computers in the Computer Rooms as it inconveniences many other students. -
Take full responsibility for managing your account.
Whenever using the computers in the Computer Rooms, you must enter your user name and password. The user names and passwords are used to secure your stored personal information, and each user is given a unique user name and password. Using another person's user name and password, or telling or giving your user name and password to others is considered to be misuse of the user name and password. Your user name and password are proof of your identification online. Note that unauthorized use of your user name and password may lead to your becoming unknowingly involved in incidents or crimes. -
Choose complex passwords that are difficult to crack.
As computers are developed, the speed at which passwords can be deciphered has increased, so the number of passwords that are stolen and misused continues to increase. Be sure to set passwords that are difficult to crack (such as those that contain at least 12 characters, include upper and lower case letters, numbers, and symbols) and do not use the same password in multiple places. -
Do not leave your seat unattended while using a computer.
Leaving your seat while you are logged onto a computer can give dishonest people an opportunity to steal, tamper with, or delete your data. Never leave your seat while you are logged onto a computer, and do not log onto more than one computer at a time. -
Shut down the computer properly after using it.
Do not turn off the computer by pressing the Power button. When you start using the computer, it reads the required information from the hard disk, and then it writes the information back to the hard disk when you shut it down. If you turn off the computer by pressing the Power button, the write-back process is not executed, which can damage files on the computer. -
Back up your data.
Make a backup copy of your important data, and store it on an external storage device such as a USB flash drive. Unexpected computer breakdowns or power failures may lead to damage or loss of data. The ITCs assume no responsibility for any damage or loss of personal data. -
Do not forget your belongings.
Lost items from the Computer Rooms are kept in Office of Student Services at each campus. If you forget something, contact the Student Services Office.
Notes on using the network
Do not use (*)P2P file sharing software such as BitTorrent or Winny to share copyrighted files.
It is now possible to use P2P file sharing software to share data. Using the software itself is legal, but exchanging copyrighted data violates copyright laws and the right of public transmission. P2P file sharing software is often used to share licensed software and copyrighted music, images, and movies illegally. Downloading and uploading these data files via P2P file sharing software is easy, but it is against the law. Therefore, as a general rule, the ITCs prohibit users from using P2P file sharing software.(*)P2P file sharing software
P2P stands for "peer-to-peer". Such software enables peer terminals to exchange data online.-
online.Do not illegally access computers.
-
Do not post copyrighted images, text, or other content online.
Make sure that the content that you plan to post online does not violate copyright laws. Posting celebrity photos, videos, and music data without permission may contravene laws. You must take into account the necessity of obtaining permission from the copyright holder. -
Do not send pyramid-scheme emails.
Information about money-making schemes is circulating by email or on bulletin boards. Participants in pyramid schemes often send email messages to large numbers of people. The messages instruct recipients to transfer a certain amount of money to the person at the top of the list, delete the person in the top-most position, add their account number at the bottom, and then forward the list to a large number of people. These acts violate the Act on Prevention of Pyramid Sales, and sending such emails is deemed to be illegal marketing. Be careful not to go along with such proposals. These messages often state, "This is not a pyramid scheme at all" or "This does not violate the law". You must be extremely skeptical of such statements. -
Avoid getting involved in problems on bulletin boards and SNS.
Bulletin boards and SNS are very useful as they enable people to post messages freely. However, misusing bulletin boards and SNS through actions such as posting defamatory messages or personal information about others can be illegal. Those who commit such acts may be indicted for defamation. Be careful not to get too emotional and post careless comments. -
Protect your computer from viruses.
Computers can become infected by viruses from emails, Web pages, CD-ROMs, and other media. If your computer is infected with a virus, it may send virus-infected emails to other people (in most cases without your knowledge). Viruses cause various problems such as computer malfunction and loss of data. To prevent infection, do not open unknown email attachments or files downloaded from untrustworthy sources. Install anti-virus software and check for viruses regularly. It is also important to keep your anti-virus definition files up-to-date. If you use Windows, enable Windows Update to automatically install the latest patches.
Last-Modified: May 12, 2022
The content ends at this position.