Japan: Cybersecurity

Key cybersecurity statutes, regulations and adopted international standards

The Basic Act on Cybersecurity

The Basic Act on Cybersecurity (the BAC) comprehensively and effectively promotes cybersecurity measures, defines the basic principles, and establishes the cyber security strategy headquarters (CSHQ) as the competent authority. Article 2 of the BAC defines cybersecurity as the measures that are needed to be taken to safely manage information, such as:

  • the prevention of leakage, loss of, or damage to information that is stored, sent, transmitted or received by electronic or magnetic means;
  • guaranteeing the safety and reliability of information systems, and information and telecommunications networks; and
  • ensuring that those states are appropriately maintained.

It includes not only countermeasures against cyberattacks but also countermeasures against internal fraud and system failures. No specific obligations with respect to cybersecurity are imposed on private companies under the BAC. Rather, a number of disparate laws prescribe the statutory and regulatory requirements applicable to cybersecurity as defined in the BAC. We outline key statutes and regulations in the section below (although this does not cover all statutory and regulatory requirements).

The Act on the Protection of Personal Information

The Act on the Protection of Personal Information (the APPI) mainly aims at protecting personal information. A business operator that processes personal data must take necessary and appropriate actions to ensure the security of that data, including preventing the leakage, loss of or damage to any personal data (article 20).

Anyone who uses or discloses personal information contained in a database that they use in relation to their business for the purpose of seeking their own or a third party’s illegal profits is subject to imprisonment for up to one year or a fine of up to 500,000 yen; a corporate body whose employee commits the crime in the course of performing his or her duties as an employee is also subject to a fine of up to 500,000 yen.

Further, under the latest amendments to the APPI, which were promulgated on 12 June 2020, the fine will be increased to up to 1 million yen for a natural person and 100 million yen for a corporate body. The amendments regarding penalties will come into force on 12 December 2020. Other amendments will come into force by 12 June 2022.

Right of privacy

The APPI is an administrative regulation, so it does not provide for a data subject’s statutory right to receive compensation for a breach of the APPI. However, the right of privacy has been acknowledged under case law and a data subject may bring a tort claim based on the violation of his or her right of privacy. If a tort claim is granted, in addition to actual damages, compensation may be awarded for emotional distress to the extent deemed reasonable. Under Japanese law, no punitive damages are awarded.

The Telecommunication Business Act

Under the Telecommunication Business Act (the TBA), the secrecy of communications handled by a telecommunications carrier may not be violated (article 4). There is a prohibition against obtaining, using and providing information that is protected under this principle unless the communicating parties give consent or the action meets certain requirements to establish the absence of illegality. The secrecy of communications includes:

  • the contents of individual communications; and
  • all of the following information in connection with individual communications, the knowledge of which enables inference of the contents:
    • the date and time of communication;
    • the location of communication;
    • the name, address and location of the communicating parties;
    • codes for identifying the parties, such as telephone numbers;
    • and the frequency of communication (Tokyo District Court judgment on 30 April 2002).

The Unfair Competition Prevention Act

The Unfair Competition Prevention Act (the UCPA) protects ‘trade secrets’ (defined below) and ‘data for limited provision’ (article 2). A trade secret is a production method, sales method, or any other technical or operational information useful for business activities that is controlled as a secret and is not publicly known. Data for limited provision means technical or business data that is handled as data to be provided to specific persons and is accumulated in substantial quantities by electronic, magnetic or other methods that cannot be recognised by human perception. The UCPA stipulates civil measures, including compensation and injunctive relief for:

  • the acquisition of trade secrets or data for limited provision by theft, fraud, duress, or other wrongful means;
  • using or disclosing trade secrets or data for limited provision acquired by such wrongful means; and
  • other unfair competition regarding trade secrets or data for limited provision.

The UCPA also imposes criminal sanctions on unfair competition regarding Trade Secrets.

Other criminal law

There are criminal sanctions for those who create, provide, use or store ‘improper command records’, namely electronic records that send improper commands to computers, such as computer viruses or malware. These are imposed under articles 168-2 and 168-3 of the Penal Code. The penalties for violation are imprisonment of up to three years or a fine of up to 500,000 yen (article 168-2); and imprisonment of up to two years or a fine of up to 300,000 yen (article 168-3).

The Act on the Prohibition on Unauthorised Computer Access (the APUCA) imposes criminal sanctions on anyone who remotely accesses a computer without authorisation. The penalties are imprisonment for up to three years or a fine of up to 1 million yen (article 3 and article 11).

International standards

There is no comprehensive obligation to comply with international standards. However, some companies are certified under Information Security Management System (ISMS) certified under ISO/IEC 27001:2013. It is also becoming more common for companies to refer to the SP800 series guidelines, published by the National Institute of Standards and Technology (NIST).

Under the Instalment Sales Act, business operators handling credit card numbers must take measures to protect those numbers; some operators have therefore adopted the Payment Card Industry Data Security Standard (PCI-DSS).

Regulatory bodies responsible for enforcing cybersecurity rules

The CSHQ and the NISC

The Cybersecurity Strategy Headquarters (CSHQ) established under article 25 of the BAC and its secretariat, the National Centre of Incident Readiness and Strategy for Cybersecurity (NISC), are responsible for the promotion of cybersecurity policy. However, while the NISC has the authority to oversee government agencies, it does not have jurisdiction over private companies.

The Personal Information Protection Commission

By contrast, the Personal Information Protection Commission (PPC), in principle, has enforcement powers, by issuing guidance and advice, mandatory reporting obligations, recommendations and orders.

The PPC may issue the following administrative sanctions when a business operator fails to comply with its obligations under the APPI, including article 20, which stipulates the necessary and appropriate actions to ensure the security of that personal data:

  • the PPC may render issue guidance or advice to the business operator (article 41);
  • the PPC may recommend that the business operator cease the violation and take other necessary measures to correct it (article 42.1); or
  • the PPC may order the business operator to take certain necessary measures (article 42.2 and 42.3).

The Ministry of Internal Affairs and Communications

The Ministry of Internal Affairs and Communications (MIC) has administrative jurisdiction over information and communication-related laws, including the TBA. The MIC promotes cybersecurity measures mainly focused on cloud services and the security of information and communication networks, including 5G and IoT devices.

When a telecommunications carrier breaches the secrecy of communications with respect to its telecommunications activities, it must without delay report the incident to the MIC, including the reasons or causes of the breach, and must submit a detailed report to the MIC within 30 days of becoming aware of such violation the breach (article 28 of the TBA).

The Ministry of Economy, Trade and Industry

The Ministry of Economy, Trade and Industry (METI) is an administrative authority in charge of the UCPA. It publishes guidelines on the UCPA, such as the Management Guidelines for Trade Secrets and the Handbook for Protecting Confidential Information. However, the METI has no powers to enforce the UCPA. The METI promotes cybersecurity measures with the aim of influencing Japanese industry, including the information processing industry.

Law enforcement agencies

The Prosecutors’ Office, police, and the National Police Agency have powers to enforce cybercrime laws by conducting investigations and arrests. Criminal penalties are usually imposed only on individuals (eg, directors, officers and employees), but some provisions impose criminal penalties on companies.

Obligations on companies to protect IT systems and data from cyberthreats

Obligations to ensure the security of personal data

As described above, a business operator that processes personal data must take necessary and appropriate actions to ensure the security of personal data (article 20 of the APPI). The PPC publishes guidelines for the handling of personal data. The guidelines provide examples of the approved handling measures, such as establishing a basic policy and internal rules, and the implementing organisational, personal, physical and technical security measures.

In addition to the APPI, various other laws have provisions aimed at protecting certain personal data from cyberthreats. For example:

  • credit card information (the Instalment Sales Act);
  • information on the physical and mental condition of workers (the Industrial Safety and Health Act);
  • customer information of financial institutions (eg, the Banking Act); and
  • ‘My Number’, the individual number assigned to each person in Japan (the Act on the Use of Numbers to Identify a Specific Individual in the Administrative Procedure).

Cybersecurity Management Guidelines

Cybersecurity Management Guidelines (most recent version as of November 2017) have been jointly issued by the METI and the Independent Administrative Agency Information-technology Promotion Agency (IPA). While the guidelines are not legally binding, they are observed on a voluntary basis by many companies in implementing cybersecurity measures. The guidelines set out three principles that should be observed by companies that have a dedicated IT department and are using IT to protect against cyberattacks. The guidelines also set out 10 key recommendations for those in charge of IT security, for example, a chief information security officer (CISO):

  • recognise cybersecurity risks and develop company-wide measures;
  • build a structure or process for cybersecurity risk management;
  • secure resources (eg, budget and employees) to execute cybersecurity measures;
  • understand possible cybersecurity risks and develop plans to deal with those risks;
  • build a structure to deal with cybersecurity risks;
  • publish a cybersecurity measures framework (PDCA) and action plan;
  • develop an emergency response system (emergency contacts, initial action manual and Computer Security Incident Response Team (CSIRT)) and execute regular hands-on drills;
  • develop a system to recover from the damages caused by an incident;
  • ensure that entities in the company’s entire supply chain, including business partners and outsourcing companies for system operations, implement security measures; and
  • collect information on cyberattacks by participating in information-sharing activities and develop an environment to use that information.

The IPA has issued a Cybersecurity Management Guideline Practice Edition that contains ideas, implementation procedures and practical examples to help implement the 10 recommendations.

Common standards on information security measures of government entities

The CSHQ and the NISC jointly issued the Common Standards on Information Security Measures of Governmental Entities under article 26(1) of the BAC. The standards are a unified framework for improving the level of information security of governmental entities and define the baseline for information security measures to ensure a higher level of information security. Although these standards do not apply to private companies, some entities refer to these standards for their information security measures.

Effect of local laws on foreign businesses

Cybercrime

As a general matter, criminal penalties will apply if a crime causes an effect in Japan, even where the active elements of the crime are committed overseas. Similarly, where a crime is governed by a treaty, the Penal Code and the APUCA apply to the perpetrator, even where the active elements of the crime are committed overseas (article 4-2 of the Penal Code and article 14 of the Act on the Prohibition on Unauthorised Computer Access). Accordingly, the Penal Code and the Act on the Prohibition on Unauthorised Computer Access are applicable when a server or a person in Japan suffers damage from cyberattacks launched from overseas. Further, the UCPA (articles 21(6), (7) and (8)) and the APPI (article 86) have extraterritorial reach.

Additionally, Japan is a signatory of the Convention on Cybercrime (2001 Budapest Convention). Japan established domestic substantive and procedural laws under the convention in 2011 and ratified the convention in 2012. Additionally, mutual legal assistance treaties (MLAT) to collect and obtain evidence within each country have been signed by Japan with the United States, South Korea, China, Hong Kong, the European Union and Russia.

Responsibilities of directors

Directors of large companies must, under the Companies Act, determine matters relevant to the establishment of an internal control system (ie, a risk management system reflecting the size and features of the company), including cybersecurity measures. Company directors may be deemed to be in breach of this obligation if no determination has been made with respect to the required matters – for example, if internal policies related to cybersecurity have not been implemented.

Further, if company directors, including directors of small or medium-sized companies, fail to implement adequate cybersecurity measures, they may be in breach of their statutory duties of due care and loyalty. In such a case, directors can be liable to their companies if the companies suffer damage. Moreover, shareholder representative lawsuits can seek compensation for damages caused to a company due to the negligent actions of directors.

Directors will also be personally liable for injury if their failure to determine the necessary matters causes damage to data subjects.

Best practices for responding to breaches

Responding to cyber incidents in relation to critical infrastructure

The term ‘critical information infrastructure operators’ is defined under article 3 of the BAC as operators of businesses that provide infrastructure foundational to life and economic activity, which could be dramatically impacted by the failure or deterioration of that infrastructure. Fourteen critical infrastructure areas are specified under the CSHQ: information and communication (eg, internet service providers, cable TV operators and broadcasters), financial services, aviation, airports, railways, electric power, gas supply, government and administration, medical services, water, logistics, chemicals, credit cards and petroleum.

Notification in the event of a cyber incident is not mandatory. However, the CSHQ’s Cybersecurity Policy for Critical Infrastructure Protection (Fourth Edition) encourages critical infrastructure operators to report, on a voluntary basis to the NISC through competent ministries and agencies, information system failures – including symptoms of these failures – as well as cyber incidents that threaten the confidentiality, integrity or availability of information.

Additionally, guidelines applicable to the financial industry require the reporting of data breaches. In the telecommunications industry, significant incidents – including cyber incidents – must be reported without delay to the MIC as described above.

Personal data breaches

A business that experiences a personal data breach is encouraged to report the matter to the PPC and to notify the affected data subjects. However, reporting and notification are not legally required under the current APPI.

While prompt reporting is desirable, no specific deadline is imposed. There is no obligation to file a report with the PPC if there has been no substantial leakage of personal data to third parties – such as where the data was encrypted – or where the breach is very minor, such as in the case of the mis-transmission of an email.

In order to prevent secondary damage and future recurrence, while not legally required, it is desirable to do the following:

  • investigate the root cause of the breach;
  • identify the scope of its impact;
  • implement measures to prevent any recurrence; and
  • promptly disclose the facts and measures taken to prevent any recurrence.

The amended APPI will introduce mandatory obligations to report data breach incidents to PPC and notify the affected data subjects in cases where the data subjects’ rights and interests are likely to be infringed.

Private redress options for unauthorised cyberactivity

A data subject can file a claim for damages under tort or contract law against a company if personal data is breached as a result of a cyberattack against the company where the company is at fault.

Security of cloud services

An outline of the Information System Security Management and Assessment Programme (ISMAP) was released in June 2020. ISMAP’s objective is to ensure security in the procurement of governmental cloud services and thereby promote the smooth use of cloud services through the registration and evaluation of cloud services that meet the government’s security requirements. The system is based on the US Federal Risk and Authorization Management Program (FedRAMP).

Cloud services that meet the registration requirements under ISMAP will be listed and published. Government agencies are expected to select from the list when procuring cloud services. While this system is intended to be used principally by government agencies, it is likely that it will also be useful for the private sector.

Information-sharing about cybersecurity

The Cybersecurity Management Guidelines described above recommend that organisations collect information on cyberattacks by participating in information-sharing activities.

In December 2018, the BAC was amended to establish the Cybersecurity Council, which aims to be a forum where national and local governmental authorities and businesses can share information on cybersecurity measures. The Cybersecurity Council was established in April 2019 and 225 entities participate as of August 2020.

Get unlimited access to all Global Data Review content