In effect from february 3, 2000

Unauthorized Computer Access Law

Law No. 128 of 1999

Husei access kinski hou

(Prohibition of acts of unauthorized computer access)

Article 3. No person shall conduct an act of unauthorized computer access.
2. The act of unauthorized computer access mentioned in the preceding paragraph means an act that falls under one of the following items:
(1) An act of making available a specific use which is restricted by an access control function by making in operation a specific computer having that access control function through inputting into that specific computer, via telecommunication line, another persons identification code for that access control function (to exclude such acts conducted by the access administrator who has added the access control function concerned, or conducted with the approval of the access administrator concerned or of the authorized user for that identification code);
(2) An act of making available a restricted specific use by making in operation a specific computer having that access control function through inputting into it, via telecommunication line, any information (excluding an identification code) or command that can evade the restrictions placed by that access control function on that specific use (to exclude such acts conducted by the access administrator who has added the access control function concerned, or conducted with the approval of the access administrator concerned; the same shall apply in the following item);
(3) An act of making available a restricted specific use by making in operation a specific computer, whose specific use is restricted by an access control function installed into another specific computer which is connected, via a telecommunication line, to that specific computer, through inputting into it, via a telecomminucation, any information or command that can evade the restriction concerned.

(Prohibition of acts of facilitating unauthorized computer access)
Article 4.
No person shall provide another person's identification code relating to an access control function to a person other than the access administrator for that access control function or the authorized user for that identification code, in indicating that it is the identification code for which specific computer's specific use, or at the request of a person who has such knowledge, excepting the case where such acts are conducted by that access administrator, or with the approval of that access administrator or of that authorized user.

(Penal provisions)
Article 8.
A person who falls under one of the following items shall be punished with penal servitude for not more than one year or a fine of not more than 500,000 yen:
(1) A person who has infringed the provision of Article 3, paragraph 1;

Article 9. A person who has infringed the provision of Article 4 shall be punished with a fine of not more than 300,000 yen.

Penal Code Article 258.

Damage to Documents in Public Use
A person who damages documents or electronic-magnetic record in public official use shall be punished with imprisonment for not less than three month or more than seven years.

Penal Code Article 259

Damage to Documents in Private Use
A person who damages documents or electro-magnetic record in private use and owned by another person who proves a right or duty shall be punished with imprisonment for not more than five years.