ITU-T Country Profiles Japan

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CYBERWELLNESS PROFILE

JAPAN
BACKGROUND
Total Population: 126 435 000 Internet users, percentage of population: 86.25%
(data source: United Nations Statistics Division, December 2012) (data source: ITU Statistics 2013)

1. CYBERSECURITY

1.1 LEGAL MEASURES

1.1.1 CRIMINAL LEGISLATION


Japan has a specific legislation pertaining to cybercrime. It is mandated through the following legal instrument:
-Unauthorized Computer Access Law 2000.

1.1.2 REGULATION AND COMPLIANCE


Specific legislation and regulation related to cybersecurity has been enacted through the following instruments:
-Electronically Recorded Monetary Claims Act -Telecommunications Business Law
-Act on Regulation of Transmission of Specified Electronic Mail -Act on the Protection of Personal Information
-Law Concerning Electronic Signatures and Certification Business
-Basic Act on the Formation of an Advanced Information and Telecommunications Network Society.

1.2 TECHNICAL MEASURES

1.2.1 CIRT
Japan has an officially recognized and legally mandated government CERT (JPCERT/CC).

1.2.2 STANDARDS
Japan has an officially approved national (and sector specific) cybersecurity framework for implementing
internationally recognized cybersecurity standards through the following instrument:
-Technical Standards for Information Security Measures for the Central Government Computer Systems (April 2012).

1.2.3 CERTIFICATION
The Management Standards for Information Security Measures for the Central Government Computer Systems is the
framework for certification and accreditation of national agencies and public sector professionals.

1.3 ORGANIZATION MEASURES

1.3.1 POLICY
The Basic Policy of Critical Information Infrastructure Protection and Information Security Strategy for Protecting the
Nation (2015) in Japan are the officially recognized national and sector-specific cybersecurity policy and strategy in
Japan.

1.3.2 ROADMAP FOR GOVERNANCE


The Information Security 2012 Annual Plan is the officially recognized national or sector-specific governance
roadmap for cybersecurity in Japan.

1.3.3 RESPONSIBLE AGENCY

1
In Japan the National Information Security Center (NISC) is the officially recognized agency responsible for
implementing a national cybersecurity strategy and policy.
Other agencies include the following:
-Information Security Policy Council (ISPC) -National Policy Agency
-Ministry of Economy, Trade and Industry (METI) -Ministry of Internal Affairs and Communications (MIC)
-Ministry of Defense.

1.3.4 NATIONAL BENCHMARKING


Japan does not have any national benchmarking and referential to measure cybersecurity development.

1.4 CAPACITY BUILDING

1.4.1 STANDARDISATION DEVELOPMENT


Japan has in place an Information Security Research and Development Strategy for cybersecurity standards, best
practices and guidelines.

1.4.2 MANPOWER DEVELOPMENT


The officially recognized national or sector-specific educational and professional training programs for raising
awareness with the general public, promoting cybersecurity courses in higher education and promoting certification
of professionals in either the public or the private sectors are:
-Information Security Human Resource Development Program -NISC Information Security Awareness Month
-Information Security Outreach and Awareness Program -JPCERT/CC.

1.4.3 PROFESSIONAL CERTIFICATION


Although Japan is home to 22 members of FIRST it does not have an officially recognized national or sector-specific
body responsible for certification of professionals.

1.4.4 AGENCY CERTIFICATION


Japan does not have any officially recognized national or sector-specific body responsible for certifying agencies.

1.5 COOPERATION

1.5.1 INTRA-STATE COOPERATION


Japan currently partners with the US, Israel and the UK on cybersecurity matters.

1.5.2 INTRA-AGENCY COOPERATION


The Ministry of Defense Information sharing programs and the METI Cybersecurity Information Sharing Partnership
Japan (J-CSIP) serve as a framework for sharing cybersecurity assets between agencies.

1.5.3 PUBLIC SECTOR PARTNERSHIP


The officially recognized body for information sharing between the public and private sector is (JPCERT/CC) which
shares information with domestic vendors particularly of the private sector. The METI Cybersecurity Information
Sharing Partnership Japan (J-CSIP) is also responsible for sharing cybersecurity assets between the public and private
sector.

1.5.4 INTERNATIONAL COOPERATION


Japan is part of the ASEAN and APCERT. In place also is an International Strategy on Cybersecurity.

2
2. CHILD ONLINE PROTECTION

2.1 NATIONAL LEGISLATION


Specific legislation on child protection has been enacted through the following instruments:
-Articles 174 and 175 of the Criminal Code.
-Article 7 of the Act on Punishment of Activities relating to Child Prostitution and Child Pornography, and the
Protection of Children.
-The Act on Development of an Environment that Provides Safe and Secure Internet Use for Young People.

2.2 UN CONVENTION AND PROTOCOL


Japan has acceded, with no declarations or reservations to articles 16, 17(e) and 34(c), to the Convention on the
Rights of the Child.
Japan has acceded, with no declarations or reservations to articles 2 and 3, to the Optional Protocol to The
Convention on the Rights of the Child on the Sale of Children, Child Prostitution and Child Pornography.

2.3 INSTITUTIONAL SUPPORT


The following are the officially recognized and legally mandated support institutions in Japan:
- NISC - EMA - JISPA -JPCERTCC.

2.4 REPORTING MECHANISM


Harmful and illegal content online can be filled and reported at the Internet Report Centre in Japan.

-----------------------------------------------------------------------------------------------------------------------------------------------------------
DISCLAIMER: Please refer to http://www.itu.int/en/Pages/copyright.aspx
More information is available on ITU website at http://www.itu.int/en/ITU-D/Cybersecurity/Pages/default.aspx
Last updated on 22th January 2015

You might also like