CITE Mission

The Center for Information Technology, Ehime University(CITE) is a university facility for education and research that provides:

(1)The administration and management of the hardware and networking systems that sustain the following services: (2)The development and provision of basic information literacy education (3)Academic research support (4) Acquisition and dispatch of information for the regional community

About General Education “Introduction to IT Literacy” (2 credits)

Today the computer is used in every area of life, and this age is referred to as “The Information Society.” Knowledge concerning the computer is indispensable for life in such an information society. Ehime University conducts a General Education course, “Introduction to IT Literacy” (2credits) for freshman in the first semester. Please confirm the content of the class by referring to the syllabus. You SHOULD register and create an account for using the CITE computer prior to attending the information science class. The computers which you will use contain the latest in equipment, installed in Sep, 2014.They are connected to the rest of the world by the Internet. Please observe the guidelines, as you enjoy your campus life.

Operation Hours

Monday-Friday 9:00 a.m. to 21:00 p.m. (Apr ~ July / Oct ~ Jan)
Monday-Friday 9:00 a.m. to 17:00 p.m. (Aug, Sept, Feb, Mar)
Saturday, Sunday,Holiday : 10:00 a.m. to 17:00 p.m. (Apr ~ July / Oct ~ Jan)

Prerequisites for the use of CITE


Before using the computer, you are required to have a computer account. The account is created by submission of an application form and a written oath at the orientation lecture to be held during the “guidance for new students” sessions. If you lose or forget your account user ID and/or password, you cannot use the computer and also cannot attend the class effectively. As the password MUST NOT be disclosed, you will have to manage your account with extra care. The issued account is effective while attending school.

Email Address and Account

The account issued by CITE is in conjunction with your Email address. For instance, if your user ID is ‘s606123b’, your email should be ‘’. This Email address is unique all over the world and is only for you.

Caution regarding use

In the information society, security countermeasures for protecting personal information and prohibiting malignant acts is a most important issue. Ehime University decided on a security policy in 2003 and set up security countermeasures. Then, the security policy modified significantly in 2012. During the Introduction to IT Literacy class we will provide education of information literacy, but you SHOULD observe these notices and the following guidelines as you use the computers in CITE.

Guidelines for Use of Ehime University Information Systems

Violation of these guidelines may result in restrictions on use of the university’s information systems (computers and network) and other penalties as specified in separate regulations.

  1. Information systems and information must not be used for purposes other than the purposes specified. Example: Harming system programs and similar acts are prohibited. Example: Willfully damaging the information resources of others with computer viruses or other programs that may cause damage to other equipment is prohibited.
  2. Posting information prejudicial to the reputation and credit of others on bulletin boards, blogs, websites and so on is prohibited.
  3. Posting or sending information which constitutes discrimination, insults or harassment is prohibited.
  4. Posting or sending personal information or images of others without their permission, and all other infringements of privacy are prohibited.
  5. Posting or sending information which constitutes abuse of confidentiality is prohibited.
  6. Sending or receiving information which infringes intellectual property such as the work of others, including illegally uploading and downloading the work of others is prohibited. Example: Information available on the Internet must not be copied or used without permission unless the rights of the author are specifically waived.
  7. Breach of secrecy of communications is prohibited.
  8. Use of the university’s information systems for business or commercial purposes is prohibited.
  9. Monitoring communication on the network or obtaining the logs of information equipment is prohibited.
  10. Evading the access controls established in the Act on the Prohibition of Unauthorized Computer Access and acts which encourage this are prohibited.
    Example: Using the ID and password of another person to impersonate them and alter their data or infiltrate the network and damage the system is prohibited.
    Example: Using the ID and password of a third party is prohibited.
  11. Use of passwords which are not based upon the password setting policy is prohibited.
  12. Probing the system for security vulnerabilities is prohibited.
  13. Obstructing the smooth operation of the university’s information systems by denial of service attacks and other attempts to overload the system is prohibited.
  14. The transmission of information which is subject to punishment in accordance with the law, and of information which may incur civil liabilities such as compensation for damages is prohibited.
  15. Acts which encourage the above are also prohibited.
  16. Installing software and changing the settings of computers without the permission of the administrator is prohibited.