Cyber Crime Laws Japan

download Cyber Crime Laws Japan

of 7

Transcript of Cyber Crime Laws Japan

PowerPoint Presentation

Cyber Crime Laws in Japan

#Copyright 2014, Oracle and/or its affiliates. All rights reserved.Cases in JapanPenal Code and separate acts handle cybercrime.Unauthorized Access Prohibition Act (revised in 2012), which bans phishing.So-called Cybercrime Penal Code, the Act for Partial Revision of the Penal Code to Respond to an Increase in International and Organized Crimes and Advancement of Information Processing (2011), which includes regulation to produce, use, obtain and keep malware.Etc.#Copyright 2014, Oracle and/or its affiliates. All rights reserved.Japan: Cyber Crimes under the ActCyber CrimeDescriptionCovered underDOS, DDOS Denial of Service Flooding a computer With Denial of Services Attacks, DDOS is Distributed DOS attack. Not criminal, but possible of obstruction of businessWeb Defacing Web Pages Defacing.Unauthorized Access Prohibition ActSpoofingStealing credentials using ,Friendly and familiar Graphical user interface.Unauthorized Access Prohibition ActCyber Stalking

Stealthily Following a person, tracking his internet chats. Not criminal but possible of Unauthorized Access Prohibition ActPhishingBank Financial Frauds in Electronic Banking .Unauthorized Access Prohibition Act#Copyright 2014, Oracle and/or its affiliates. All rights reserved.Japan: Cyber Crimes under the ActCyber CrimeDescriptionCovered underIntellectual Property Crime Source Code Tampering etc. Copyright ActPersonal Data Theft Stealing personal data .Unauthorized Access Prohibition ActIdentity Theft Stealing cyberspace identity information of individual .Unauthorized Access Prohibition ActWorms Trojan Horses, Virus etc. Different Hacking mechanisms Cybercriminal ActSabotage of Computer Taking Control of Computer With the help of malware. Cybercriminal ActLogic Bomb Attack triggers on an event #Copyright 2014, Oracle and/or its affiliates. All rights reserved.Obstruction of Business by Damaging a ComputerArticle 234-2 of Penal CodeA person who obstructs the business of another by interfering with the operation of a computer utilized for the business of the other or by causing such computer to operate counter to the purpose of such utilization by damaging such computer or any electromagnetic record used by such computer, by inputting false data or giving unauthorized commands or by any other means, shall be punished by imprisonment with work for not more than 5 years or a fine of not more than 1,000,000 yen.#Copyright 2014, Oracle and/or its affiliates. All rights reserved.Act on Prohibition of Unauthorized Computer AccessArticle 3 No person shall engage in an act of unauthorized computer access.Article 4 (Passwords) No person shall obtain someone else's identification code [omitted].Article 5 (Passwords) No person shall supply someone else's identification code [omitted].Article 7 (Phishing) No person shall engage in any of the acts listed below by impersonating an access administrator who has added an access control feature to a specified computer or otherwise creating a false impression of him/her being the access administrator concerned. [omitted]#Copyright 2014, Oracle and/or its affiliates. All rights reserved.Ban of Malware in Cybercrime Penal Code , a part of Penal Code(Making Electromagnetic Records for unauthorized commands)Article 168-2 Without justifiable grounds, a person who has made or offered the following Electromagnetic Records or any other records for the purpose of running at a computer of another person shall be punished by imprisonment with work for not more than 3 years or a fine of not more than 500,000 yen.1. Electromagnetic Records which input unauthorized commands to prevent such computer from operating on the purpose or to cause such computer to operate counter to the purpose for which people use such computer [omitted]#Copyright 2014, Oracle and/or its affiliates. All rights reserved.