Information Infrastructure Initiative, Kyushu University

Online Classes and Teleconferences

I. Kyushu University's Basic Policy on Online Class and Teleconference Tools.

1. Reminders about sending and recording photos and video during online classes and teleconferences
2. Teleconferencing tools provided by Kyushu University Information Infrastructure Initiative
3. Security measures and precautions for handling confidential information when using teleconferencing tools. (Last Updated on November 11, 2021)

The current support status as of November 11, 2021, is as follows.

  • Examples of teleconferencing tools that support encryption among participants
    • Webex Meetings
    • Zoom
  • Examples of teleconferencing tools that do not support encryption among participants
    • Microsoft Teams, etc.

Working from Home

I. Notices Related to Working from Home

1. Notice: Handling of work issues related to the novel coronavirus disease (COVID-19) for faculty and staff members

II. Notice: Operation of the Office Remote Work System

1. Handling of administrative work systems, etc. while working from home
2. Handling of data and information for Kyushu University administrative staff working from home
3. Rules for taking information (physical documents) out of the office for working from home
4. Guidelines for the operation of information classification and handling restrictions
5. Security when working from home
6. Guide to using the Office Remote Work System

Regulations, Guidelines, etc.

I. Kyushu University Code of Information Ethics

II. Kyushu University Information Security Policy

III. Guidelines for information classification and handling restrictions stored by Kyushu University

1. Guidelines for classification and handling restriction labeling of information stored in information systems
2. Guidelines for information handling procedures at Kyushu University
3. Guidelines for the operation of information classification and handling restrictions
4. Security measures for handling confidential information when using teleconferencing tools
5. Information Security Guide

Procedures for responding to an information security incident >>