The Information Systems Division website (hereinafter referred to as the “website”) is a website operated by the RIKEN Information R&D and Strategy Headquarters (R-IH) Information Systems Division. This website is updated as quickly as possible to provide a wealth of information on the progress of various activities and measures, including ICT (Information and Communication Technology) related services at RIKEN. Some of the information transmitted from this website is subject to various rights (trademark, copyright, etc.). Please use caution when quoting, diverting, or reproducing this information.
Please be aware of the following points when using this website.
1. Use of the content available on this website
The information published on this website (hereinafter referred to as the “content”) may be freely used by anyone, including reproduction, public transmission, translation, transformation, and other adaptations, in accordance with the following usage rules. By using this content, you are deemed to have agreed to these usage rules.
Indicating the source of information
When using content, please indicate the source of the pertinent information. The following is an example of how to indicate a source.
●Example of indicating a source
Source: RIKEN Information R&D and Strategy Headquarters (R-IH) Information Systems Division (https://i.riken.jp/)
When using content that has been edited or processed, please indicate that the editing or processing has been performed in addition to the above source. Edited or processed information must not be published or used in a manner that makes it appear as if it was created by the Information Systems Division.
●Example of how to use the content after it has been edited or processed
This information was used from the RIKEN Information R&D and Strategy Headquarters (R-IH) Information Systems Division (Link of the page) and further processed accordingly.
2. Do not infringe on the rights of third parties
Some content may be copyrighted or otherwise protected by third parties (i.e., parties outside of RIKEN; same nomenclature applies below). It is the user’s responsibility to obtain permission to use content that is copyrighted by a third party or for which a third party has rights other than copyright (e.g., portrait rights in photographs, publicity rights, etc.) from the third party, unless it is clearly indicated that the rights have been handled.
Some of the content, which is owned by third parties, directly or indirectly indicates or suggests that the third parties own the rights by indicating the source, etc. However, some of the content does not clearly identify or specify the part of the content for which the third parties own the rights. It is the responsibility of the user to check the content before using it. Even content that is copyrighted by a third party may be used without the permission of the copyright holder, such as for quotation as permitted under the Copyright Act.
3. Content to which the usage rules do not apply
The usage rules do not apply to the following content.
– Symbols, logos, and character designs that represent an organization or a specific business.
– Content that clearly indicates the application of other usage rules with an explanation of specific and reasonable grounds.
The Information System Division assumes no responsibility whatsoever for any actions taken by users using the content (including the use of information edited or processed from the content). The content is subject to change, relocation, or deletion without notice.
These rules of use do not limit the use of quotations and other uses permitted under the Copyright Act. These rules were established on September 10, 2021. This site will be updated accordingly due to social conditions and technical issues.
We recommend that you use the latest version of the following browsers to view this site.
PC：Microsoft Edge、Mozilla Firefox、Google Chrome、Safari
[Note] Flip phones and their browsers, and the Internet Explorer browser are not supported.
To view PDF files, you may need to download Adobe Acrobat Reader or other compatible software.
This website uses SSL/TLS encrypted communication to improve the level of security. Information entered by users is automatically encrypted for transmission and reception, so that users’ personal information cannot be read by third parties. However, depending on the setting of the user’s browsing environment, the relevant page may not be available.