Skip to main content

Japan’s Cybersecurity Policy

  • Chapter
  • First Online:
Telecommunications Policies of Japan

Part of the book series: Advances in Information and Communication Research ((AICRES,volume 1))

Abstract

This chapter provides an overview of Japan’s cybersecurity policy. After Sect. 1, which introduces the definition of cybersecurity, Sect. 2 touches on the current state of cybersecurity, tracing the changing means and objectives of cyberattacks and the corresponding approaches to cybersecurity. Section 3 considers the particular characteristics of Japan’s cybersecurity policy. In this section, the characteristics of Japan’s cybersecurity policy are discussed, focusing on the government role in the area. In Sect. 4, specific policy measures taken by the Ministry of Internal Affairs and Communications, one of the main government agencies responsible for cybersecurity policy, are introduced, in light of Sect. 3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Cyber Security Strategy Headquarters. (2018). Cybersecurity strategy (in Japanese).

    Google Scholar 

  • ICT-ISAC Japan, ACTIVE (in Japanese). Retrieved September 10, 2018, from https://www.ict-isac.jp/active/.

  • Information Technology Promotion Department, Ministry of Economy, Trade and Industry. (2016). Survey on recent trends and future forecasts of IT personnel (in Japanese).

    Google Scholar 

  • International Organization for Standardization. ISO/IEC 27001. (2013). Retrieved September 10, 2018, from https://www.iso.org/isoiec-27001-information-security.html.

  • Investigative Committee on the Data Security Breach Incident Caused by Unauthorized Access, Japan Pension Service. (2015). Report on the investigation into the data security breach incident caused by unauthorized access (in Japanese).

    Google Scholar 

  • Japan Industrial Standards Commission. (2014). JIS Q 27001:2014.

    Google Scholar 

  • Japan Internet Providers Association (JAIPA), Telecommunications Carriers Association (TCA), Telecom Services Association (TELESA), Japan Cable and Telecommunications Association (JCTA), ICT-ISAC. (2018). Guideline for properly dealing with telecommunications business cyber-attacks and secrecy of communications (in Japanese).

    Google Scholar 

  • Kamata, K. (2017). Introduction to cyber security management (in Japanese). Tokyo: Kinzai Institute for Financial Affairs Inc.

    Google Scholar 

  • Ministry of Internal Affairs and Communications. (2014). First report from the study group on properly dealing with telecommunications business cyber-attacks (in Japanese).

    Google Scholar 

  • Ministry of Internal Affairs and Communications. (2017). Results of eighth director general-level meeting of the Japan-U.S. policy cooperation dialogue on the internet economy (in Japanese).

    Google Scholar 

  • Ministry of Internal Affairs and Communications. (2018). Results of ninth director general-level meeting of the Japan-U.S. policy cooperation dialogue on the internet economy (in Japanese).

    Google Scholar 

  • Ministry of Internal Affairs and Communications. (2019). 2019 progress report on comprehensive IoT security measures (in Japanese).

    Google Scholar 

  • National Institute of Information and Communications Technology. (2018). 2017 NICTER observation report (in Japanese).

    Google Scholar 

  • National Policy Agency, Unauthorized Computer Access Act Study Group. (2012). Point-by-point digest of laws on the prohibition of unauthorized computer access (in Japanese).

    Google Scholar 

  • Natsui, T. (2012). Comparative study on cyber crime (1): DDoS attacks (in Japanese). Horitsu Ronso, 85(1), 197–231.

    Google Scholar 

  • Okamura, H. (2011). Information security law (Revised ed.) (in Japanese). Tokyo: Shojihomu CO., Ltd.

    Google Scholar 

  • The White House. (2017). U.S. Presidential Executive Order. Strengthening the cybersecurity of federal networks and critical infrastructure.

    Google Scholar 

  • Torasawa, K., Third Special Investigation Chamber, House of Councilors. (2015). Issues with cyber space laws: From the perspective of internet governance and government structures (in Japanese). Rippou to Chousa, 369, 143–156.

    Google Scholar 

  • U.S. Department of Commerce and Department of Homeland Security. (2018). Report to the president on enhancing the resilience of the internet and communications ecosystem against botnets and other automated, distributed threats.

    Google Scholar 

List of Laws

  • Act on Prohibition of Unauthorized Computer Access. Act No. 128, 1999.

    Google Scholar 

  • Japan’s Basic Act on Cybersecurity. Act No. 104, 2014.

    Google Scholar 

  • The Penal Code. Act No. 45, 1907.

    Google Scholar 

  • The Regulations for Telecommunications Facilities for Telecommunications Business. Ministry of Internal Affairs and Communications Ordinance No. 30 of 1985.

    Google Scholar 

  • Telecommunications Business Act. Act No. 86, 1984.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wataru Aikawa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aikawa, W. (2020). Japan’s Cybersecurity Policy. In: Mitomo, H. (eds) Telecommunications Policies of Japan. Advances in Information and Communication Research, vol 1. Springer, Singapore. https://doi.org/10.1007/978-981-15-1033-5_7

Download citation

Publish with us

Policies and ethics