Sunteți pe pagina 1din 7

Cyber Crime Laws in Japan

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Cases in Japan
Penal Code and separate acts handle cybercrime.
Unauthorized Access Prohibition Act (revised in 2012), which bans phishing. So-called Cybercrime Penal Code, the Act for Partial Revision of the Penal Code to Respond to an Increase in International and Organized Crimes and Advancement of Information Processing (2011), which includes regulation to produce, use, obtain and keep malware. Etc.

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Japan: Cyber Crimes under the Act


Cyber Crime Description Covered under

DOS, DDOS Denial of Service

Flooding a computer With Denial of Services Attacks, DDOS is Distributed DOS attack.

Not criminal, but possible of obstruction of business

Web Defacing

Web Pages Defacing. Stealing credentials using ,Friendly and familiar Graphical user interface.

Unauthorized Access Prohibition Act Unauthorized Access Prohibition Act Not criminal but possible of Unauthorized Access Prohibition Act Unauthorized Access Prohibition Act

Spoofing

Cyber Stalking

Stealthily Following a person, tracking his internet chats.

Phishing

Bank Financial Frauds in Electronic Banking .

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Japan: Cyber Crimes under the Act


Cyber Crime Description Covered under

Intellectual Property Crime

Source Code Tampering etc.

Copyright Act Unauthorized Access Prohibition Act Unauthorized Access Prohibition Act Cybercriminal Act

Personal Data Theft

Stealing personal data .

Identity Theft Worms Trojan Horses, Virus etc. Sabotage of Computer Logic Bomb

Stealing cyberspace identity information of individual .

Different Hacking mechanisms

Taking Control of Computer With the help of malware. Attack triggers on an event

Cybercriminal Act

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Obstruction of Business by Damaging a Computer


Article 234-2 of Penal Code A person who obstructs the business of another by interfering with the operation of a computer utilized for the business of the other or by causing such computer to operate counter to the purpose of such utilization by damaging such computer or any electromagnetic record used by such computer, by inputting false data or giving unauthorized commands or by any other means, shall be punished by imprisonment with work for not more than 5 years or a fine of not more than 1,000,000 yen.

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Act on Prohibition of Unauthorized Computer Access


Article 3 No person shall engage in an act of unauthorized computer access. Article 4 (Passwords) No person shall obtain someone else's identification code [omitted].

Article 5 (Passwords) No person shall supply someone else's identification code [omitted].
Article 7 (Phishing) No person shall engage in any of the acts listed below by impersonating an access administrator who has added an access control feature to a specified computer or otherwise creating a false impression of him/her being the access administrator concerned. [omitted]

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Ban of Malware in Cybercrime Penal Code , a part of Penal Code


(Making Electromagnetic Records for unauthorized commands) Article 168-2 Without justifiable grounds, a person who has made or offered the following Electromagnetic Records or any other records for the purpose of running at a computer of another person shall be punished by imprisonment with work for not more than 3 years or a fine of not more than 500,000 yen. 1. Electromagnetic Records which input unauthorized commands to prevent such computer from operating on the purpose or to cause such computer to operate counter to the purpose for which people use such computer [omitted]
7 Copyright 2014, Oracle and/or its affiliates. All rights reserved.

S-ar putea să vă placă și