Act on Prohibition of Unauthorized Computer Access



Similar documents
Act on Regulation of Transmission of Specified Electronic Mail ( Act No. 26 of April 17, 2002)

Law Concerning Electronic Signatures and Certification Services (Unofficial Translation)

ACT ON ELECTRONIC SIGNATURES AND CERTIFICATION BUSINESS Act No. 102 of May 31 of 2000

ARTICLE IV: SECURITY ALARM SYSTEMS

Act on Regulation of Commodity Investment (Article 2 unenforced, etc.)

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC. CHAPTER I GENERAL PROVISIONS

Offenders Rehabilitation Services Act

BYLAW BEING A BYLAW OF THE TOWN OF OKOTOKS IN THE PROVINCE OF ALBERTA FOR THE PURPOSE OF REDUCING FALSE ALARMS

How To Pay A Customer In European Currency (European)

ARTICLE XI ALARM SYSTEMS

Madison Police Department

PLEASE NOTE. For more information concerning the history of this Act, please see the Table of Public Acts.

CHAPTER 6.60 SECURITY SYSTEMS SECTION:

ALARM BUSINESSES. Chapter 129 ALARM BUSINESSES

First Section General Provisions (Articles 1 to 8)

Bill for the Protection of Women and Family Members Against Domestic Violence

ELECTRICAL CONSTRUCTION BUSINESS ACT

CHAPTER II ALARMS AND ALARM SYSTEMS

Money Lending Business Act

Gas Business Act Act No. 51 of March 31, 1954

ARTICLE 705 Curfew. "Minor" shall mean and include any unmarried person under the age of eighteen (18) years.

ELECTRONIC TRANSACTIONS LAW N0 (85) OF Article (1)

FREEDOM OF INFORMATION ACT

Protection from Harassment Bill

Regulations on Administration of Foreign Law Firms' Representative Offices in China

(Act No. 66 of May 23, 1986) Chapter I General Provisions

(No ) (Approved December 27, 2011) AN ACT

Boise Municipal Code. Chapter 6-15 FALSE SECURITY ALARMS

COMPUTER MISUSE AND CYBERCRIME ACT

Chapter 5.58 SECURITY ALARM SYSTEMS

THE CERTIFIED PUBLIC ACCOUNTANTS LAW (As amended, last amendment being on July 26, 2005)

Personal Data Protection LAWS OF MALAYSIA. Act 709 PERSONAL DATA PROTECTION ACT 2010

CYBERCRIMES IN JAPAN: RECENT CASES, LEGISLATIONS, PROBLEMS AND PERSPECTIVES 1

Royal Decree No. 66/2014. To Promulgate the Consumer Protection Law

INTRUSION ALARM SYSTEMS

Act on Background Checks

Foreign Exchange Transactions Act of South Korea. Act No.5550,Sep.16,1998

PATENT ATTORNEY ACT Article 1 (Purpose) Article 1-2 Article 2 (Business) Article 3 (Qualifications) Article 4 (Disqualifications)

[Brought into force by appointed day notice on 16 th June 2003.]

The Electronic Transactions Law Chapter I Title and Definition

THE REGULATION OF INTERCEPTION OF COMMUNICATIONS BILL, 2007 ARRANGEMENT OF CLAUSES. PART I - PRELIMINARY

Terms and Conditions Governing GoRemit Overseas Remittance Transactions

Regulations on Administration of Internet News Information Services

CHAPTER I. GENERAL PROVISIONS

LEGAL AID ACT ARRANGEMENT OF SECTIONS PART I. Establishment of Legal Aid Council. 1. Legal Aid Council. 2. Membership of the Council, etc.

CHAPTER OPERATION OF COMMERCIAL AND RESIDENTIAL ALARM SYSTEMS

Casino, Liquor and Gaming Control Authority Act 2007 No 91

Pest Control Products Act

First Regular Session Sixty-ninth General Assembly STATE OF COLORADO INTRODUCED HOUSE SPONSORSHIP

CHAPTER 95: ALARM SYSTEMS

Riverside Community College District Policy No General Institution

Liquor Control (Supply and Consumption) Bill

SUPREME COURT OF PENNSYLVANIA DOMESTIC RELATIONS PROCEDURAL RULES COMMITTEE RECOMMENDATION 140

CREDIT REPORTING PRIVACY CODE (CR Code) Draft v.3.1

Law to Promote Specified Nonprofit Activities

Act on Promotion of Information and Communication Network Utilization and Information Protection

[Translation] 1. Audit Practice Standards for Internal Control Systems

Federal Law no. 6. Issued on 7/11/2010. Corresponding to 28 Shawwal 1431 H.

City of Chilliwack. Bylaw No A bylaw to regulate the use of security and fire alarm systems

on Electronic Signature and change to some other laws (Electronic Signature Act) The Parliament has hereby agreed on this Act of the Czech Republic:

Act on Asbestos Health Damage Relief

Order for Enforcement of the Act on Prevention of Transfer of Criminal Proceeds

This chapter shall be known and cited as the alarm systems code. The provisions of this chapter shall apply to the incorporated area of the city.

RULES OFTHE COURT OF ARBITRATION IN MATTERS CONCERNING INTERNET DOMAIN NAMES AT THE POLISH CHAMBER OF INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS


COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

CHAPTER 21:03 GOLD TRADE ACT

The Board of Supervisors of the County of Riverside ordain as follows:

TELECOMMUNICATIONS BUSINESS ACT

Terms and Conditions of International Money Transfer Transactions by Card Members

CONTENT OF THE AUDIT LAW

The Credit Reporting Act

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of No.266-FZ) Chapter 1.

HOUSE OF REPRESENTATIVES 147th GENERAL ASSEMBLY HOUSE BILL NO. 327

TRADE UNIONS ACT (CHAPTER 333, SECTION 55) TRADE UNIONS REGULATIONS

STATE OF CONNECTICUT REGULATION of the DEPARTMENT OF CONSUMER PROTECTION (NAME OF AGENCY)

NATIONAL UNIVERSITY CORPORATION HOKKAIDO UNIVERSITY TANGIBLE RESEARCH AND DEVELOPMENT RESULTS HANDLING REGULATIONS

Electricity Business Act

Employment Security Act (Act No. 141 of 1947)

For the purpose of this chapter the following definitions shall apply:

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

Comment [1]: BDERIV. Comment [2]: EDERIV

THE COMPUTER MISUSE AND CYBERCRIME ACT I assent ARRANGEMENT OF SECTIONS

Terms and Conditions of International Money Transfer Transactions

The Electronic Transactions Act, Chapter I Preliminary Provisions Title and commencement. Interpretation

Application for Permission to Manufacture Class I Specified Chemical Substances. Date: YYYYMMDD

Basic Law on Intellectual Property (Law No.122 of 2002) (Provisional Translation)

Transcription:

Act on Prohibition of Unauthorized Computer Access (Act No. 128 of August 13, 1999) (Purpose) Article 1 The purpose of this Act is to prevent computer-related crimes committed via telecommunications lines and maintain telecommunicationsrelated order as realized by means of Access Control Features by prohibiting acts of unauthorized computer access and stipulating penalties therefor and assistance measures to be taken by Prefectural Public Safety Commissions to prevent the recurrence of such acts, thereby contributing to the sound development of an advanced information and telecommunications society. (Definitions) Article 2 (1) The term "Access Administrator" as used in this Act means a person who manages the operation of a computer connected to a telecommunications line (hereinafter referred to as a "Specified Computer") in relation to its use (limited to the kind realized via the telecommunications line concerned, hereinafter referred to as "Specified Use"). (2) The term "Identification Code" as used in this Act means a code allocated to a person who, with regard to the Specified Use of a Specified Computer, has been 1

granted permission from the Access Administrator with authority over said Specified Use (hereinafter referred to as an "Authorized User") or the actual Access Administrator (hereafter in this paragraph referred to as an "Authorized User, etc.") so as to enable the Access Administrator concerned to identify this particular Authorized User, etc. as distinguished from all other Authorized Users, etc. In concrete terms, an Identification Code may be any of the following or a combination of any of the following and another code: (i) A code the content of which must not, according to the instructions of the Access Administrator concerned, be revealed to a third party without reason (ii) A code that has been generated from an image of the whole or a part of the body of the Authorized User, etc. concerned or said user's voice using a method specified by the Access Administrator concerned (iii) A code that has been generated from the signature of the Authorized User, etc. concerned using a method specified by the Access Administrator concerned (3) The term "Access Control Feature" as used in this Act means a feature that has been added to a Specified Computer subject to Specified Use or another Specified Computer connected thereto via a telecommunications line by the Access Administrator with authority over the Specified Use of the Specified Computer concerned to automatically control said Specified Use. An Access Control Feature is to be designed to remove all or part of the restrictions imposed on said Specified Use upon confirming that a code input into the Specified Computer associated therewith by a person wishing to engage in said Specified Use is identical to the identification code associated with said Specified Use (including a combination of a code generated from the identification code using a method specified by the Access Administrator concerned and a part of the identification code concerned; the same applies in 2

items (i) and (ii) of the following paragraph). (4) The term "Act of Unauthorized Computer Access" as used in this Act means any of the following acts: (i) An act of rendering a Specified Computer with an Access Control Feature available for Specified Use that is subject to restrictions imposed by the Access Control Feature concerned by inputting someone else's identification code associated with the Access Control Feature concerned via a telecommunications line and thus operating the Specified Computer concerned (excluding such an act engaged in by the Access Administrator who has added the Access Control Feature concerned and such an act engaged in upon obtaining permission from the Access Administrator concerned or the Authorized User to whom the identification code concerned belongs) (ii) An act of rendering a Specified Computer with an Access Control Feature available for Specified Use that is subject to restrictions imposed by the Access Control Feature concerned by inputting any information (excluding an identification code) or command suitable for evading the restrictions on said Specified Use via a telecommunications line and thus operating the Specified Computer concerned (excluding such an act engaged in by the Access Administrator who has added the Access Control Feature concerned and such an act engaged in upon obtaining permission from the Access Administrator concerned; the same applies in the following item) (iii) An act of rendering a Specified Computer available for Specified Use that is subject to restrictions imposed by the Access Control Feature of another 3

Specified Computer connected thereto via a telecommunications line by inputting any information or command suitable for evading said restrictions into said other Specified Computer via a telecommunications line and thus operating the Specified Computer concerned (Prohibition of Acts of Unauthorized Computer Access) Article 3 It is prohibited for any person to engage in an Act of Unauthorized Computer Access. (Prohibition of Acts of Obtaining Someone Else's Identification Code) Article 4 It is prohibited for any person to obtain someone else's identification code associated with an Access Control Feature for the purpose of engaging in an Act of Unauthorized Computer Access (limited to the kind specified in Article 2, paragraph (4), item (i); the same applies in Article 6 and Article 12, item (ii)). (Prohibition of Acts of Facilitating Unauthorized Computer Access) Article 5 It is prohibited for any person, unless there are justifiable grounds for refusing to do so or any other legitimate reason therefor, to supply someone else's identification code associated with an Access Control Feature to a person other than the Access Administrator associated with the Access Control Feature concerned and the Authorized User to whom the identification code concerned belongs. (Prohibition of Acts of Wrongfully Storing Someone Else's Identification Code) Article 6 It is prohibited for any person to store someone else's identification code associated with an Access Control Feature that has been wrongfully obtained for the purpose of engaging in an Act of Unauthorized Computer 4

Access. (Prohibition of Acts of Illicitly Requesting the Input of Identification Codes) Article 7 It is prohibited for any person to engage in any of the acts listed below by impersonating an Access Administrator who has added an Access Control Feature to a Specified Computer or otherwise creating a false impression of being the Access Administrator concerned. However, this does not apply if permission has been obtained from the Access Administrator concerned. (i) An act of leaving the following information accessible to the general public via automatic public transmission carried out through connection to a telecommunications line (the kind designed for on-demand activation and direct reception by the general public, excluding broadcasting or cable broadcasting): information purporting to be the Access Administrator concerned requesting an Authorized User who has been allocated an identification code associated with the Access Control Feature concerned to input the identification code concerned into a Specified Computer (ii) An act of transmitting the following information to the Authorized User concerned via an email (an email as specified in Article 2, item (i), of the Act on Regulation of Transmission of Specified Electronic Mail (Act No. 26 of 2002)): information purporting to be from the Access Administrator concerned requesting an Authorized User who has been allocated an identification code associated with the Access Control Feature concerned to input the identification code concerned into a Specified Computer (Protective Measures by an Access Administrator) 5

Article 8 An Access Administrator who has added an Access Control Feature to a Specified Computer is to endeavor to properly manage identification codes associated with the Access Control Feature concerned or codes used to confirm them via the Access Control Feature concerned, and is to always verify the effectiveness of the Access Control Feature concerned and endeavor to promptly take appropriate measures to protect the Specified Computer concerned from acts of unauthorized computer access, such as enhancement of the function of the Access Control Feature concerned, whenever deemed necessary. (Assistance, etc. by Prefectural Public Safety Commissions) Article 9 (1) In the event of recognizing the occurrence of an Act of Unauthorized Computer Access, a Prefectural Public Safety Commission (an Area Public Safety Commission in the case of an area in Hokkaido that does not fall under the jurisdiction of the Hokkaido Prefectural Police Headquarters (as specified in the main clause of Article 51, paragraph (1), of the Police Act (Act No.162 of 1954); the same applies hereafter in this paragraph); the same applies hereafter in this article) is to provide the Access Administrator associated with the Specified Computer that has been exposed to unauthorized access with appropriate assistance, including advice, guidance and supply of relevant data, so as to enable said administrator to take any necessary emergency measures to protect the Specified Computer concerned from further acts of unauthorized access according to the modus operandi or cause of the act of unauthorized access concerned. This is on the condition that the Access Administrator concerned has requested assistance by submitting any documents and other 6

materials useful in ascertaining the operational and management status of the Specified Computer concerned at the time of the act of unauthorized access concerned and other circumstances to prevent the recurrence of similar acts, and that such a request is deemed reasonable. (2) A Prefectural Public Safety Commission may entrust the whole or a part of the work involved in the implementation of the case analysis needed to provide the assistance prescribed in the preceding paragraph (encompassing a technical investigation and analysis of the modus operandi and cause of the Act of Unauthorized Computer Access for which the assistance concerned has been sought and other matters; the same applies in the following paragraph) to a person to be specified in the Rules of National Public Safety Commission. (3) Any person who has engaged in the work involved in the implementation of the case analysis entrusted by a Prefectural Public Safety Commission pursuant to the provision of the preceding paragraph may not divulge any secrets that said person has become privy to through this work. (4) Any necessary matters in connection with the assistance prescribed in paragraph (1), in addition to what is provided for in the preceding three paragraphs, will be prescribed by the Rules of Nationa1 Public Safety Commission. (5) In addition to what is provided for in paragraph (1), a Prefectural Public Safety Commission must endeavor to raise awareness and spread knowledge about the protection of Specified Computers with an Access Control Feature from Acts of Unauthorized Computer Access. Article 10 (1) To help protect Specified Computers with an Access Control Feature from acts of unauthorized computer access, the National Public Safety 7

Commission, Minister for Internal Affairs and Telecommunications, and Minister of Economy, Trade and Industry are to publicize the status of the occurrence of acts of unauthorized computer access and progress of research and development on technology relating to Access Control Features at least once a year. (2) To help protect Specified Computers with an Access Control Feature from Acts of Unauthorized Computer Access, the National Public Safety Commission, Minister for Internal Affairs and Telecommunications, and Minister of Economy, Trade and Industry must endeavor to assist any organizations formed by persons who engage in business activities geared towards the enhancement of Access Control Features for the purpose of assisting in measures taken by Access Administrators who have added Access Control Features to Specified Computers pursuant to the provisions of Article 8 through the supply of the necessary information and so on, provided that they are deemed to be capable of providing such assistance appropriately and effectively. (3) In addition to what is provided for in the preceding two paragraphs, the National Government must endeavor to raise awareness and spread knowledge about the protection of Specified Computers with an Access Control Feature from Acts of Unauthorized Computer Access. (Penal provisions) Article 11 Any person who has violated the provisions of Article 3 shall be punished by imprisonment with work for not more than three years or a fine of not more than 1 million yen. Article 12 Any person who falls under any of the following items shall be punished by imprisonment with work for not more than one year or a fine of 8

not more than 500,000 yen. (i) A person who has violated the provisions of Article 4 (ii) A person who has supplied the identification code of another person in violation of the provisions of Article 5 despite knowing that the recipient intends to use it for an Act of Unauthorized Computer Access (iii) A person who has violated the provisions of Article 6 (iv) A person who has violated the provisions of Article 7 (v) A person who has violated the provisions of paragraph (3) of Article 9 Article 13 Any person who has violated the provisions of Article 5 (excluding a person specified in item (ii) of the preceding article) shall be punished by a fine of not more than 300,000 yen. Article 14 The offenses specified in Article 11 and Article 12, items (i) to (iii), are governed by the provisions of Article 4-2, of the Penal Code (Act No.45 of 1907). 9