ITEE ITEE-1 | Page 54

(3)Publicity rights “Publicity rights” protect the right to secure (economic) profits from a name or portrait, and are recognized for persons such as entertainers, celebrities, and athletes. Consequently, use of the name or portrait of a famous person without consent is an infringement of publicity rights. Reference Security Refer to “Chapter 9-5-3 Information security measures and information security implementation technology.” ●Act on the Prohibition of Unauthorized Computer Access The “Act on the Prohibition of Unauthorized Computer Access” was enacted in 1999. The purpose of this legislation is to prohibit unauthorized computer access. Under the legislation, unauthorized computer access of the kind described below is defined as a crime and subject to regulation.  ① Act of inputting an identification code for another person without permission Use of the user ID or password of another person without permissi on for the purpose of impersonating an authorized user and removing restrictions on use, in order to enable the use of a computer.  ② Act of inputting information or a command other than an identification code Use of an open port or security hole, and use of an unauthorized method for the purpose of intruding on a system and removing restrictions on use, in order to enable the use of a computer. Penal provisions for actions ① and ② : Penal servitude of not more than one year or fine of not more than 500,000 yen  ③ Act of facilitating unauthorized computer access Supplying a user ID or password of another person to a person other than the authorized user or administrator for the purpose of facilitating unauthorized computer access. Penal provisions for action ③ : Fine of not more than 300,000 yen Corporate and legal affairs The increasing prevalence of computer-related crime has led to increased emphasis on legislation concerning security. The “Act on the Prohibition of Unauthorized Computer Access” is a typical example of legislation that concerns security. Chapter 1 1-2-2 Laws on security Reference Identification code An “identification code” is used to identify a person, such as a user ID and password, fingerprint, voiceprint, and iris pattern. Reference Port A “port” refers to an interface that a computer uses as a gateway for network communications. Reference Protective measures against unauthorized computer access Article 5 of the Unauthorized Computer Access Law recommends that access administrators take measures to protect against unauthorized computer access. Specifically, access administrators should take the following measures. • Comprehensively manage user IDs and passwords • Close security holes (security oversights) • Use encryption and digital signatures • Set access privileges 48