English / 日本語
By using the JDCat analysis tool, you agree to the following precautions and disclaimer.
Definition
- The term "this service" means all services provided by National Institute of Informatics (NII) under the cs.rcos.nii.ac.jp domain.
- The term "runtime environment" means the container environment created by user using this service listed at https://jupyter.cs.rcos.nii.ac.jp/hub/home .
Disclaimer
Please be aware of the following points before using this service.
This service is provided on a best-effort basis. NII does not guarantee the reliability of this service. There is a possibility that the service may stop or that the runtime environment may be lost.
- Runtime environments created on this service are not permanently retained. Runtime environments that have not been used for a certain period of time will be deleted, including the data stored in them, by NII's administrators.
- NII's technicians may examine the user's work history and stored data when necessary.
- NII is not responsible for any consequences resulting from your use or inability to use this service.
Incident Response Policy
The following actions are considered to be abuse.
- Establishing a crawler using this service to generate high frequency/volume communications to a third party's web server.
- Establishing a web server using this service to enable the transmission of data to an unspecified third party.
- Establishing a mail server using this service to send e-mails to unspecified third parties.
- Any other acts that NII deems to cause trouble to a third party.
- Mining of virtual currency using this service.
- Use of P2P file sharing software using this service.
- Other acts that NII recognizes as causing trouble to other users of this service.
The following response policy is provided in case problems occur due to the intentional or negligent actions of the users.
- NII will record the user's behavior on this service. Specifically, the following information will be logged.
- User information obtained from IdP (eduPersonPrincipalName, mail).
- Login time, logout time.
- Unique ID, IP address, and port number of the container.
- Other information necessary for follow-up investigation.
- When NII detects that a user is using the service illegally, NII will take the following actions.
- Temporarily prohibit the user from using the System.
- Maintain a log of the user's activities.
- Notify the department in charge of GakuNin at the institution to which the user belongs, and provide them with the log.
If you receive a notification that a user at your institution is using the service illegally, please cooperate with the following measures.
- Take the same action against the user as you would have taken if the user had committed the same act on your system.
- Report the status of the action to NII.
NII will decide whether or not to allow the user to resume using this service based on the status of the reported action.