Cyber law in Japan:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Alphen aan den Rijn
Kluwer Law Internat.
2012
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | "This book was originally published as a monograph in the International encyclopaedia of laws/Cyber law." Includes bibliographical references (p. 39-41) and index |
Beschreibung: | 220 S. |
ISBN: | 9789041139092 9041139095 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041216502 | ||
003 | DE-604 | ||
005 | 20141029 | ||
007 | t | ||
008 | 130813s2012 ne |||| 00||| eng d | ||
010 | |a 2012392059 | ||
020 | |a 9789041139092 |c pbk. : alk. paper |9 978-90-411-3909-2 | ||
020 | |a 9041139095 |c pbk. : alk. paper |9 90-411-3909-5 | ||
035 | |a (DE-599)BVBBV041216502 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-M382 | ||
100 | 1 | |a Yanaga, Masao |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyber law in Japan |c Masao Yanaga |
264 | 1 | |a Alphen aan den Rijn |b Kluwer Law Internat. |c 2012 | |
300 | |a 220 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a "This book was originally published as a monograph in the International encyclopaedia of laws/Cyber law." | ||
500 | |a Includes bibliographical references (p. 39-41) and index | ||
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
651 | 7 | |a Japan |0 (DE-588)4028495-5 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Japan |0 (DE-588)4028495-5 |D g |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026191123&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026191123 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804150651312144384 |
---|---|
adam_text | TABLE OF CONTENTS
THE AUTHOR 3
LIST OF ABBREVIATIONS 19
PREFACE 21
INTRODUCTION 23
CHAPTER 1. GENERAL BACKGROUND OF THE COUNTRY 23
§1. GEOGRAPHY AND POPULATION 23
§2. STATE ORGANS 23
§3. COURT SYSTEM 24
I. THE ORGANIZATION OF THE COURTS (COURT ACT [LAW NO. 59 OF
16 APRIL 1947], ARTICLES 6 THROUGH 32) 24
A. THE SUPREME COURT (SAIKO SAIBANSHO) 24
B. THE HIGH COURT {KOTO SAIBANSHO) 24
C. THE DISTRICT COURT (CHIHO SAIBANSHO) 24
D. THE SUMMARY COURT (KAN I SAIBANSHO) 24
E. THE FAMILY COURT (KATEI SAIBANSHO) 25
II. APPEALS IN CIVIL CASES 25
A. FIRST APPEAL (KOSO) 25
B. SECOND APPEAL (JOKOKU) 25
§4. CHARACTERISTICS OF JAPANESE LAW 26
I. PUBLIC POLICY (KOJO) AND PUBLIC MORALS (RYOZOKU) 26
II. ABUSE OF RIGHTS (KENRI RAN YO) 26
III. FIDELITY (SHINGI) AND GOOD FAITH (SEIJITSU) 26
§5. SOURCES OF LAW 27
I. THE CONSTITUTION (KEMPO) 27
II. STATUTES (HORITSU) 27
III. ORDINANCES 27
TABLE OF CONTENTS
IV. CUSTOM 27
V. CASE LAW 28
VI. JORI {RECTA RATIO) 28
CHAPTER 2. TELECOMMUNICATIONS INFRASTRUCTURE 29
CHAPTER 3. THE INFORMATION AND COMMUNICATIONS TECHNOLOGY
MARKET 30
CHAPTER 4. E-COMMERCE: FACTS AND FIGURES 31
CHAPTER 5. E-GOVERNMENT INITIATIVES 32
§1. THE NEW IT REFORM STRATEGY 32
§2.
PRIORITY POLICY PROGRAMME
2007 35
§3. A NEW STRATEGY IN INFORMATION AND COMMUNICATIONS
TECHNOLOGY 36
SELECTED BIBLIOGRAPHY 39
PART I. REGULATION OF THE ICT MARKET 43
CHAPTER 1. REGULATORY FRAMEWORK OF THE ICT SECTOR 43
§1. TELECOMMUNICATIONS BUSINESS ACT 43
I. REGISTRATION REQUIREMENT 43
A. REGISTRATION 43
B. APPLICATION AND REGISTRATION 43
C. REFUSAL TO REGISTER 44
D. REVOCATION OF REGISTRATION 45
E. STRIKING OUT THE RECORD 45
F. SUCCESSION 45
G. SUSPENSION AND DISCONTINUATION OF BUSINESS 46
II. NOTIFICATION REQUIREMENT 46
III. TARIFFS AND INTERCONNECTION 47
A. TARIFFS 47
B. DUTY TO PROVIDE SERVICES 50
C. CATEGORY I DESIGNATED TELECOMMUNICATIONS FACILITIES 51
D. CATEGORY II DESIGNATED TELECOMMUNICATIONS FACILITIES 52
E. ORDER TO REOPEN NEGOTIATIONS FOR INTERCONNECTION
OR INTERCONNECT 53
IV. TELECOMMUNICATIONS FACILITIES 54
A. MAINTENANCE OF TECHNICAL CONDITIONS 54
TABLE OF CONTENTS
B. ADMINISTRATIVE RULES OF TELECOMMUNICATIONS FACILITIES FOR
TELECOMMUNICATIONS BUSINESS 55
C. CHIEF TELECOMMUNICATIONS ENGINEER 56
D. STANDARDS FOR TELECOMMUNICATIONS NUMBERS 57
§2. RADIO LAW 57
I. LICENSE 57
II. APPLICATION FOR A LICENSE FOR SPECIFIED RADIO STATIONS 58
III. APPLICATION FOR A LICENSE FOR RADIO STATIONS 58
IV. LICENSE AND EXAMINATION 58
A. PROVISIONAL LICENSE 58
B. EXAMINATION STANDARDS 59
C. DISQUALIFICATION 59
D. INSPECTION AFTER PROVISIONAL LICENSING 59
E. SIMPLIFIED LICENSING PROCEDURE 59
F. OTHER REQUIRED PROCEDURES 60
1. PROCEDURE REQUIRED TO MEET RADIO REGULATIONS OF THE
INTERNATIONAL TELECOMMUNICATION UNION 60
2. QUALIFICATION OF A RADIO OPERATOR 60
3. CERTIFICATION OF CONFORMITY WITH TECHNICAL REGULATIONS
FOR SRE 60
CHAPTER 2. REGULATION OF COMPETITION IN THE ICT MARKET 61
§1. OVERVIEW OF COMPETITION REGULATION IN JAPAN 61
I. UNREASONABLE RESTRAINT OF TRADE AND PRIVATE MONOPOLIZATION 61
II. UNFAIR TRADE PRACTICES 62
A. CONCERTED REFUSAL TO DEAL 62
B. OTHER REFUSAL TO DEAL 62
C. DISCRIMINATORY PRICING 62
D. DISCRIMINATORY TREATMENT ON TRANSACTION TERMS 63
E. DISCRIMINATORY TREATMENT IN A TRADE ASSOCIATION 63
F. UNJUST LOW PRICE SALES 63
G. UNJUST HIGH PRICE PURCHASE 63
H. DECEPTIVE CUSTOMER INDUCEMENT 63
I. CUSTOMER INDUCEMENT BY UNJUST BENEFITS 63
J. TIE-IN SALES 63
K. DEALING ON EXCLUSIVE TERMS 64
L. RESALE PRICE RESTRICTION 64
M. DEALING ON RESTRICTIVE TERMS 64
N. ABUSE OF DOMINANT BARGAINING POSITION 64
O. INTERFERENCE WITH A COMPETITOR S TRANSACTION 65
P. INTERFERENCE WITH INTERNAL OPERATION OF A COMPETING
COMPANY 65
III. INJUNCTION AND DAMAGES 65
§2. EXEMPTIONS 66
TABLE OF CONTENTS
§3. FACILITATING COMPETITION IN THE TELECOMMUNICATION
SERVICE MARKET 66
I. DEREGULATION OF TELECOMMUNICATIONS CHARGES 66
II. KDD REGULATIONS 66
III. INTERCONNECTION OF NETWORKS 66
IV. ACCESS CHANNEL TECHNOLOGY 66
V. RESTRICTIONS ON INTERNATIONAL TRAFFIC ROUTING 67
VI. NTT 67
VII. LIBERALIZATION OF SERVICES 67
VIII. FOREIGN INVESTMENT 67
IX. DESIGNATED FACILITIES 67
§4. PROVISION OF TECHNOLOGICAL INFORMATION ON PLATFORM
SOFTWARE 68
§5. SOFTWARE LICENSING AGREEMENTS 71
CHAPTER 3. REGULATION OF CRYPTOGRAPHY AND OTHER DUAL USE
GOODS 74
CHAPTER 4. LEGAL STATUS OF STANDARDIZATION 75
§1. INDUSTRIAL STANDARDIZATION LAW 75
§2. JAPANESE INDUSTRIAL STANDARDS 75
§3. JIS MARKING SYSTEM 75
§4. JAPANESE INDUSTRIAL STANDARDS COMMITTEE 76
§5. AMENDMENTS TO THE INDUSTRIAL STANDARDIZATION LAW IN 1997 76
I. SPEEDING-UP OF JIS DEVELOPMENT PROCESS 76
II. JAPAN ACCREDITATION SYSTEM FOR PRODUCT CERTIFICATION BODIES
OF JIS MARK (JASC) 76
III. JAPANESE NATIONAL LABORATORY ACCREDITATION (JNLA) SYSTEM 77
CHAPTER 5. LEGAL STATUS OF OUT-OF-COURT DISPUTE SETTLEMENT
IN THE ICT SECTOR 78
§1. ARBITRATION 78
§2. CONCILIATION 78
TABLE OF CONTENTS
§3. CONSULTATION 78
§4. OUT-OF-COURT DISPUTE SETTLEMENT FOR THE ICT SECTOR 79
PART II. PROTECTION OF INTELLECTUAL PROPERTY IN THE ICT SECTOR 81
CHAPTER 1. APPLICATION OF COPYRIGHT IN THE AREA OF ICT 81
§1. WORK , PROGRAMME AND DATABASE 81
§2. AUTHOR S RIGHT 81
§3. DERIVATIVE WORK 82
§4. DURATION OF COPYRIGHT 82
§5. INFRINGEMENT AND INJUNCTION 83
§6. ACTS DEEMED AS INFRINGING 83
§7. DAMAGES 84
CHAPTER 2. LEGAL PROTECTION OF SOFTWARE 86
§1. COPYRIGHT 86
I. COPYRIGHT PROTECTION 86
II. EMPLOYEE S WORK 88
III. PROGRAM REGISTRATION 89
A. REGISTRATION 89
B. PROGRAM REGISTER 89
C. PROCEDURE FOR PROGRAM REGISTRATION 89
D. DESIGNATED REGISTRATION BODY 89
IV. SPECIAL PROVISION REGARDING INFRINGEMENT 90
§2. PATENT 90
I. SOFTWARE-RELATED INVENTIONS AND PATENTABILITY 90
II. GUIDELINE FOR SOFTWARE-RELATED INVENTIONS 91
III. 2002 AMENDMENTS TO THE PATENT ACT 93
IV. NON-OBVIOUSNESS 93
A. APPLICATION TO OTHER FIELDS 94
B. ADDITION OF A COMMONLY KNOWN MEANS OR REPLACEMENT BY
EQUIVALENT 94
C. IMPLEMENTATION BY SOFTWARE OF FUNCTIONS THAT ARE OTHERWISE
PERFORMED BY HARDWARE 94
D. SYSTEMATIZATION OF HUMAN TRANSACTIONS 94
E. REPRODUCTION OF A KNOWN EVENT IN COMPUTERIZED VIRTUAL SPACE 95
TABLE OF CONTENTS
F. DESIGN MODIFICATION ON THE BASIS OF KNOWN FACTS OR CUSTOMS 95
V. PATENT APPLICATION 95
A. APPLICANT 95
B. FIRST-TO-FILE RULE 96
C. PATENTEE S RIGHT 96
D. EFFECT OF REGISTRATION 96
E. PERMITTED EXPLOITATION 97
F. JOINT OWNERSHIP 97
G. EXCLUSIVE LICENSE 97
H. NON-EXCLUSIVE LICENSE 98
I. PLEDGE ON A PATENT 98
J. INFRINGEMENT 98
K. PENAL PROVISION 99
CHAPTER 3. LEGAL PROTECTION OF DATABASES 100
CHAPTER 4. LEGAL PROTECTION OF COMPUTER CHIPS 102
§1. PROTECTION OF TOPOGRAPHY 102
§2. EFFECT OF REGISTRATION 102
§3. PERMITTED EXPLOITATION 103
§4. JOINT OWNERSHIP 103
§5. EXCLUSIVE LICENSE 103
§6. NON-EXLCUSIVE LICENSE 104
§7. PLEDGE ON A TOPOGRAPHY RIGHT 104
§8. INFRINGEMENT 104
§9. COMPENSATION 106
§10. PENAL PROVISION 106
CHAPTER 5. OTHER INTELLECTUAL PROPERTY RIGHTS IN THE
ICT SECTOR 107
§1. UTILITY MODEL 107
I. UTILITY MODEL AND INVENTION 107
10
TABLE OF CONTENTS
II. UTILITY MODEL RIGHT 108
III. EXCLUSIVE LICENSES 108
IV. NON-EXCLUSIVE LICENSE 108
V. INFRINGEMENT 108
A. INJUNCTION 108
B. ACTS DEEMED AS INFRINGING 109
C. CALCULATION OF DAMAGES 109
D. PRESUMPTION OF DAMAGES 109
§2. DESIGN 109
I. SCOPE OF PROTECTION 109
II. REGISTRATION APPLICATION 110
III. SECRET DESIGNS 111
IV. EMPLOYEES DESIGN 111
V. DESIGN RIGHT 111
VI. PERMITTED EXPLOITATION 112
VII. JOINT OWNERSHIP 112
VIII. EXCLUSIVE LICENSE 112
IX. NON-EXCLUSIVE LICENSE 112
X. PLEDGE ON A DESIGN 113
XI. EFFECT OF REGISTRATION 113
XII. INFRINGEMENT 113
XIII. PENAL PROVISION 114
CHAPTER 6. INTERNET DOMAIN NAME REGISTRATION 115
§1. INTERNET DOMAIN NAME REGISTRATION 115
§2. JP DOMAIN NAME DISPUTE RESOLUTION PROCEEDING 116
§3. TRADEMARKS, TRADE NAMES AND DOMAIN NAMES 117
§4. UNFAIR COMPETITION ACT AND DOMAIN NAMES 119
PART III. ICT CONTRACTS 121
CHAPTER 1. HARDWARE CONTRACTS 122
§1. NOTIFICATION OF ACTIONS 122
§2. WARRANTY 122
§3. TIME OF ACCEPTANCE OF PRODUCTS 124
§4. DISCLAIMER AND LIABILITY LIMITATION 124
11
TABLE OF CONTENTS
§5. EXPORTS OUTSIDE THE COUNTRY 125
CHAPTER 2. SOFTWARE CONTRACTS 126
§1. SOFTWARE LICENSING AGREEMENTS 126
I. CONDITIONS OF LICENSE 126
A. RESTRICTIONS ON INSTALLATION 126
B. RESTRICTIONS ON REPRODUCTION 126
C. PROHIBITION TO PROVIDE TO A THIRD PARTY 126
D. RESTRICTION ON ALTERNATION 126
E. ASSIGNMENT OF THE LICENSEE S RIGHT AND KNOW-HOW 127
F. PROHIBITION OF REVERSE ENGINEERING 127
II. NOTIFICATION OF ACTIONS 127
IH. WARRANTY 128
IV. DISCLAIMER AND LIABILITY LIMITATION 128
§2. SOFTWARE DEVELOPMENT AGREEMENT 128
I. EXAMINATION AND TEST 128
II. GRANT OF RIGHTS 129
III. WARRANTY 129
IV. OTHERS INTELLECTUAL PROPERTY 130
V. CONFIDENTIALITY AGREEMENTS 131
VI. SUBCONTRACT 131
CHAPTER 3. TURNKEY CONTRACTS 132
§1. AREA FOR INSTALLATION 132
§2. INDEMNIFICATION 132
§3. TRAINING 132
CHAPTER 4. DISTRIBUTION AGREEMENTS 134
§1. MASTER DISTRIBUTORSHIP AGREEMENT 134
§2. MINIMUM QUANTITIES 134
§3. PROPERTY RIGHTS 134
§4. CONFIDENTIALITY AGREEMENT 135
§5. EXPORTS OUTSIDE THE COUNTRY 135
§6. DISCLAIMER AND LIABILITY LIMITATION 135
12
TABLE OF CONTENTS
CHAPTER 5. MAINTENANCE CONTRACTS 136
§1. HARDWARE MAINTENANCE AGREEMENT 136
I. SCOPE OF SERVICES 136
II. SOLE MAINTENANCE PROVIDER 136
III. DISCLAIMER AND LIABILITY LIMITATION 136
§2. SOFTWARE SUPPORT AND MAINTENANCE AGREEMENT 137
I. SCOPE OF SERVICES 137
II. SUPPORT LIMITATION 137
III. SOURCE CODE 137
IV. DISCLAIMER AND LIABILITY LIMITATION 138
CHAPTER 6. FACILITIES MANAGEMENT 139
CHAPTER 7. NETWORK SERVICES 140
§1. ADMINISTRATIVE CONTROL 140
I. LIMITATION OF LIABILITY 140
§2. LIMITATION OF LIABILITY AND DISCLAIMER 141
I. DISCLAIMER 142
II. THE VALIDITY OF DISCLAIMER 142
CHAPTER 8. GOVERNMENT CONTRACTS 143
§1. TENDERING PROCEDURES 143
I. THREE PROCEDURES AVAILABLE FOR GOVERNMENT PROCUREMENT 143
A. OPEN TENDERING PROCEDURES 143
B. SELECTIVE TENDERING PROCEDURES 144
C. LIMITED (SINGLE) TENDERING PROCEDURES 144
II. NOTIFICATION OF THE REQUEST FOR MATERIALS 144
III. PROCUREMENT VALUED AT NO LESS THAN 800,000 SDR 145
IV. MEETINGS ON GOVERNMENT PROCUREMENT 146
V. COLLECTION AND DISSEMINATION OF INFORMATION 146
VI. QUALIFICATION FOR PARTICIPATING IN TENDER PROCEDURES 147
§2. UNFAIR BIDS 148
§3. PERFORMANCE BOND 149
§4. LIMITATION OF LIABILITY 149
PART IV. ELECTRONIC TRANSACTIONS 151
13
TABLE OF CONTENTS
CHAPTER 1. LEGAL STATUS OF ELECTRONIC TRANSACTIONS 151
§1. CONTRACT FORMATION 151
I. GENERAL PRINCIPLES OF CONTRACT FORMATION 151
II. EXCEPTIONS TO THE POSTAL RULE IN E-COMMERCE 152
III. WRITING REQUIREMENT 152
§2. RECORD KEEPING 153
I. RECORD-KEEPING REQUIREMENT 153
II. ELECTRONIC LEDGER STORAGE ACT 153
III. COMMERCIAL CODE AND COMPANIES ACT 2005 155
§3. EVIDENTIARY ISSUES 156
CHAPTER 2. REGULATION OF ELECTRONIC SIGNATURES AND
CERTIFICATION SERVICES 157
§1. REGULATION OF ELECTRONIC SIGNATURES 157
§2. REGULATION OF ELECTRONIC CERTIFICATION SERVICES 157
I. PRIVATE SECTOR 157
A. A LAW CONCERNING ELECTRONIC SIGNATURES AND CERTIFICATION
SERVICES 157
B. APPLICATION FOR ACCREDITATION 158
C. DISQUALIFICATION 158
D. REQUIREMENTS FOR ACCREDITATION 159
E. RENEWAL OF ACCREDITATION 159
F. SUCCESSION 159
G. BUSINESS CLOSING 160
H. DUTY OF AN ACCREDITED CERTIFICATION SERVICE PROVIDER 160
I. MARK 160
J. REVOCATION OF ACCREDITATION 161
K. ACCREDITATION OF A FOREIGN CERTIFICATION SERVICE 161
L. DESIGNATED INVESTIGATING ORGANIZATION 161
M. LIABILITY 164
II. ELECTRONIC CERTIFICATION SERVICES BASED ON THE COMMERCIAL
REGISTRY 164
§3. ELECTRONIC NOTARY 165
CHAPTER 3. LEGAL ASPECTS OF ELECTRONIC BANKING 167
§1. PAYMENT AND SETTLEMENT SYSTEM IN JAPAN 167
I. BOJ-NET 167
II. ZENGIN DATA TELECOMMUNICATIONS SYSTEM 168
III. FOREIGN EXCHANGE YEN CLEARING SYSTEM 168
14
TABLE OF CONTENTS
§2. SOME ISSUES CONCERNING ELECTRONIC BANKING 168
I. UNAUTHORIZED TRANSFERS 169
A. FUNDS TRANSFERS 169
B. ELECTRONIC BANKING 169
II. INCOMPLETE DECLARATION OF INTENT 170
III. NETWORK LIABILITY 171
CHAPTER 4. PROTECTION OF USERS OF ELECTRONIC SERVICES 172
§1. RIGHT TO REVOKE 172
I. CONSUMER CONTRACTS ACT 172
II. LAW CONCERNING THE EXCEPTIONS TO THE CIVIL CODE 174
§2. STANDARD CONTRACTS OR GENERAL CONDITIONS 175
I. GENERAL 175
II. SELF-REGULATION IN E-COMMERCE INDUSTRY 176
III. CONSUMER CONTRACTS ACT 176
IV. ACT ON SPECIAL COMMERCIAL PRACTICES 178
V. INTERNET AUCTION 178
PART V. NON-CONTRACTUAL LIABILITY 179
CHAPTER 1. NEGLIGENCE 179
§1. GENERAL 179
§2. FAULT 179
§3. UNLAWFULNESS 179
§4. BURDEN OF PROOF 180
§5.
SCOPE OF
LOSS
TO BE COMPENSATED
180
§6. EMPLOYER S LIABILITY 180
CHAPTER 2. LIABILITY OF NETWORK OPERATORS 182
CHAPTER 3. LIABILITY OF SERVICE PROVIDERS 181
§1. BEFORE 2001 LEGISLATION 181
§2. ISP S
LIABILITY LIMITATION AND SENDER DATA DISCLOSURE ACT
184
CHAPTER 4. PRODUCT LIABILITY 186
15
TABLE OF CONTENTS
§1. CIVIL CODE 186
I. INCOMPLETE PERFORMANCE 186
II. SELLER S LIABILITY FOR HIDDEN DEFECTS 186
III. TORTS 187
§2. PRODUCT LIABILITY ACT 187
PART VI. PRIVACY PROTECTION 189
CHAPTER 1. REGULATION OF PERSONAL DATA PROCESSING 189
§1. PROTECTION OF PERSONAL INFORMATION HELD BY ADMINISTRATIVE
ORGANS 189
§2. CREDIT DATA PROTECTION 190
§3. MITI
GUIDELINES
191
§4. JIS Q 15001 191
§5. PRIVACY PROTECTION MARK SYSTEM 195
§6. PERSONAL INFORMATION PROTECTION ACT 197
I. DEFINITION 197
II. DUTIES OF PERSONAL INFORMATION SERVICE BUSINESSES 197
III. THE COMPETENT MINISTER S AUTHORITY 199
CHAPTER 2. PROTECTION OF TELECOMMUNICATIONS PRIVACY 201
§1. STATUTORY PROVISIONS 201
§2. SELF-REGULATION 201
PART VII. COMPUTER-RELATED CRIME 203
CHAPTER 1. GENERAL LEGAL DEVELOPMENT 203
CHAPTER 2. APPLICATION OF SUBSTANTIVE CRIMINAL LAW IN
THE AREA OF ICT 205
§1. FORGING DOCUMENTS 205
§2. FORGERY OR UNAUTHORIZED ALTERATION OF SECURITIES 206
§3. DESTRUCTION OF ELECTRO-MAGNETIC RECORDS 207
16
TABLE OF CONTENTS
§4. COMPUTER SABOTAGE 207
§5. PROPERTY CRIMES 208
§6. ELECTRONIC CERTIFICATION 208
I. APPLICATION FOR UNTRUE ELECTRONIC CERTIFICATION 208
II. ILLEGAL USE OF MARK OF AN ACCREDITED CERTIFICATION SERVICE
PROVIDER 208
§7. UNAUTHORIZED COMPUTER ACCESS 209
§8. ASSISTING UNAUTHORIZED COMPUTER ACCESS 210
§9. ASSISTANCE PROVIDED BY A PUBLIC SAFETY COMMISSION 210
CHAPTER 3. APPLICATION OF CRIMINAL PROCEDURE LAW IN THE
AREA OF ICT 212
§1. SEARCH AND SEIZURE 212
§2. WIRETAPPING 213
I. BEFORE 1999. 213
II. THE LAW CONCERNING THE WIRETAPPING OF COMMUNICATIONS
FOR THE INVESTIGATION OF CRIMES 213
§3. ELECTRO-MAGNETIC RECORD AND EVIDENCE 213
CONCLUSIONS 215
INDEX 217
17
|
any_adam_object | 1 |
author | Yanaga, Masao |
author_facet | Yanaga, Masao |
author_role | aut |
author_sort | Yanaga, Masao |
author_variant | m y my |
building | Verbundindex |
bvnumber | BV041216502 |
ctrlnum | (DE-599)BVBBV041216502 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01647nam a2200409zc 4500</leader><controlfield tag="001">BV041216502</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141029 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130813s2012 ne |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2012392059</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789041139092</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-90-411-3909-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9041139095</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">90-411-3909-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041216502</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yanaga, Masao</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber law in Japan</subfield><subfield code="c">Masao Yanaga</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Alphen aan den Rijn</subfield><subfield code="b">Kluwer Law Internat.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">220 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book was originally published as a monograph in the International encyclopaedia of laws/Cyber law."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 39-41) and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Japan</subfield><subfield code="0">(DE-588)4028495-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Japan</subfield><subfield code="0">(DE-588)4028495-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026191123&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026191123</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | Japan (DE-588)4028495-5 gnd |
geographic_facet | Japan |
id | DE-604.BV041216502 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:42:19Z |
institution | BVB |
isbn | 9789041139092 9041139095 |
language | English |
lccn | 2012392059 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026191123 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | 220 S. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Kluwer Law Internat. |
record_format | marc |
spelling | Yanaga, Masao Verfasser aut Cyber law in Japan Masao Yanaga Alphen aan den Rijn Kluwer Law Internat. 2012 220 S. txt rdacontent n rdamedia nc rdacarrier "This book was originally published as a monograph in the International encyclopaedia of laws/Cyber law." Includes bibliographical references (p. 39-41) and index Recht (DE-588)4048737-4 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Japan (DE-588)4028495-5 gnd rswk-swf Japan (DE-588)4028495-5 g Internet (DE-588)4308416-3 s Recht (DE-588)4048737-4 s 1\p DE-604 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026191123&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Yanaga, Masao Cyber law in Japan Recht (DE-588)4048737-4 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4308416-3 (DE-588)4028495-5 |
title | Cyber law in Japan |
title_auth | Cyber law in Japan |
title_exact_search | Cyber law in Japan |
title_full | Cyber law in Japan Masao Yanaga |
title_fullStr | Cyber law in Japan Masao Yanaga |
title_full_unstemmed | Cyber law in Japan Masao Yanaga |
title_short | Cyber law in Japan |
title_sort | cyber law in japan |
topic | Recht (DE-588)4048737-4 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Recht Internet Japan |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026191123&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yanagamasao cyberlawinjapan |