(3)Publicity rights
“Publicity rights” protect the right to secure (economic) profits from a
name or portrait, and are recognized for persons such as entertainers, celebrities, and athletes. Consequently, use of the name or portrait of a famous person without consent is an infringement of publicity rights.
Reference
Security
Refer to “Chapter 9-5-3 Information
security measures and information
security implementation technology.”
●Act on the Prohibition of Unauthorized Computer Access
The “Act on the Prohibition of Unauthorized Computer Access” was
enacted in 1999. The purpose of this legislation is to prohibit unauthorized
computer access. Under the legislation, unauthorized computer access of
the kind described below is defined as a crime and subject to regulation.
① Act of inputting an identification code for another person without permission
Use of the user ID or password of another person without permissi on for
the purpose of impersonating an authorized user and removing restrictions
on use, in order to enable the use of a computer.
② Act of inputting information or a command other than an identification code
Use of an open port or security hole, and use of an unauthorized method
for the purpose of intruding on a system and removing restrictions on use,
in order to enable the use of a computer.
Penal provisions for actions ① and ② : Penal servitude of not more
than one year or fine of not more than 500,000 yen
③ Act of facilitating unauthorized computer access
Supplying a user ID or password of another person to a person other than
the authorized user or administrator for the purpose of facilitating unauthorized computer access.
Penal provisions for action ③ : Fine of not more than 300,000 yen
Corporate and legal affairs
The increasing prevalence of computer-related crime has led to increased
emphasis on legislation concerning security.
The “Act on the Prohibition of Unauthorized Computer Access” is a
typical example of legislation that concerns security.
Chapter 1
1-2-2 Laws on security
Reference
Identification code
An “identification code” is used to identify a person, such as a user ID and
password, fingerprint, voiceprint, and
iris pattern.
Reference
Port
A “port” refers to an interface that a
computer uses as a gateway for network communications.
Reference
Protective measures against
unauthorized computer access
Article 5 of the Unauthorized Computer
Access Law recommends that access
administrators take measures to protect
against unauthorized computer access.
Specifically, access administrators
should take the following measures.
• Comprehensively manage user IDs
and passwords
• Close security holes (security oversights)
• Use encryption and digital signatures
• Set access privileges
48