﻿<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE Law PUBLIC "-//JaLII//DTD J-STATUTE 1.0//EN" "jstatute.dtd">
<Law OriginalPromulgateDate="November 12, 2014" LawType="Act" Lang="en" Year="26" Era="Heisei" Num="104" DataInfo="Partially unenforced">
	<LawNum>Act No. 104 of November 12, 2014</LawNum>
	<LawBody>
		<LawTitle>The Basic Act on Cybersecurity</LawTitle>
		<TOC id="en_toc">
			<TOCLabel>Table of Contents</TOCLabel>
			<TOCChapter Num="1">
				<ChapterTitle>Chapter I General Provisions</ChapterTitle>
				<ArticleRange>(Articles 1 through 11)</ArticleRange>
			</TOCChapter>
			<TOCChapter Num="2">
				<ChapterTitle>Chapter II Cybersecurity Strategy</ChapterTitle>
				<ArticleRange>(Article 12)</ArticleRange>
			</TOCChapter>
			<TOCChapter Num="3">
				<ChapterTitle>Chapter III Basic Policies</ChapterTitle>
				<ArticleRange>(Articles 13 through 23)</ArticleRange>
			</TOCChapter>
			<TOCChapter Num="4">
				<ChapterTitle>Chapter IV Cybersecurity Strategic Headquarters</ChapterTitle>
				<ArticleRange>(Articles 24 through 37)</ArticleRange>
			</TOCChapter>
			<TOCChapter Num="5">
				<ChapterTitle>Chapter V Penal Provisions</ChapterTitle>
				<ArticleRange>(Article 38)</ArticleRange>
			</TOCChapter>
			<TOCSupplProvision>
				<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			</TOCSupplProvision>
		</TOC>
		<MainProvision>
			<Chapter Num="1" id="en_ch1">
				<ChapterTitle>Chapter I General Provisions</ChapterTitle>
				<Article Num="1" id="en_ch1at1">
					<ArticleCaption>(Purpose)</ArticleCaption>
					<ArticleTitle>Article 1</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at1cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In consideration of the fact that ensuring cybersecurity while securing the free flow of information is an urgent issue, due to the increasing severity of threats to cybersecurity and other changes in internal and external circumstances that are arising on a global scale, as the internet and other advanced information and telecommunications networks develop, and the use of information and communications technologies (referred to below as "information and communications technologies") prescribed in Article 2 of the Basic Act on Forming a Digital Society (Act No. 35 of 2021) expands, the purpose of this Act is to set basic principles for Japan's cybersecurity policies, clarify the responsibilities and other aspects of the national government and local governments, and provide for the formulation of a cybersecurity strategy and other matters that will become the foundation of cybersecurity policies, and also in conjunction with the same Act, comprehensively and effectively advance cybersecurity policies in ways such as establishing a Cybersecurity Strategic Headquarters, and by doing so, enhance economic and social vitality and achieve sustainable development and bring about a society which enables its people to live safely and free of anxiety, and also contribute to ensuring peace and safety in the international community and contribute to Japan's national security.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="2" id="en_ch1at2">
					<ArticleCaption>(Definitions)</ArticleCaption>
					<ArticleTitle>Article 2</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at2cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The term "cybersecurity" as used in this Act means that the necessary measures have been taken to prevent the leakage, loss, or damage of information that is recorded, sent, transmitted, or received in electronic form, magnetic form, or any other form that cannot be perceived by the human senses (referred to below as "electronic or magnetic form" in this Article) and to securely manage that information in other ways, and that the necessary measures have been taken to ensure the security and reliability of information systems and of information and communications networks (including the necessary measures to prevent damage from unauthorized activities directed at a computer through an information and communications network or through a storage medium associated with a record that has been created in electronic or magnetic form (referred to below as "electronic or magnetic recording medium"), and that these systems and networks are being properly maintained and managed.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="3" id="en_ch1at3">
					<ArticleCaption>(Basic Principles)</ArticleCaption>
					<ArticleTitle>Article 3</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at3cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In view of the importance of ensuring the free flow of information through the development of the internet and other advanced information and telecommunications networks and through the use of information and communications technologies for activities including the enjoyment of freedom of expression, the creation of innovations, and the enhancement of economic and social vitality through the use of these networks and technologies, cybersecurity policy must be advanced based on the principle of proactively responding to cybersecurity threats, through coordination among a variety of entities, such as the national government and local governments and critical social infrastructure providers (meaning those engaged in business that provides infrastructure which is the foundation of the lives of the people and economic activities, and whose functional failure or deterioration would cause an enormous impact to them; the same applies below).</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch1at3cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity policy must be advanced based on the principle of raising the awareness of each individual member of the public regarding cybersecurity and encouraging each individual member of the public to take voluntary actions, and positively promoting actions to establish resilient systems which can prevent any damage caused by threats against cybersecurity and quickly recover from damage or failure.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="3" id="en_ch1at3cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity policy must be advanced based on the principle of developing the internet and other advanced information and telecommunications networks, and positively promoting actions to establish a vital economy and society through the utilization of information and communications technologies.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="4" id="en_ch1at3cl4">
						<ParagraphNum>(4)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity policy must be advanced through international cooperation based on the principle of Japan assuming a leading role in formulating and developing an international cybersecurity framework, in consideration of the fact that responding to cybersecurity threats is a common issue throughout the international community, and that Japan's economy and society operate within the context of internationally close and interdependent relationships.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="5" id="en_ch1at3cl5">
						<ParagraphNum>(5)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity policy must be advanced taking into consideration the basic principles of the Basic Act on Forming a Digital Society.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="6" id="en_ch1at3cl6">
						<ParagraphNum>(6)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity policy must be advanced with due consideration to not unjustly infringing on the rights of the people.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="4" id="en_ch1at4">
					<ArticleCaption>(Responsibilities of the National Government)</ArticleCaption>
					<ArticleTitle>Article 4</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at4cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is responsible for formulating and implementing comprehensive cybersecurity policies in line with the basic principles prescribed in the preceding Article (referred to below as "basic principles").</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="5" id="en_ch1at5">
					<ArticleCaption>(Responsibilities of Local Governments)</ArticleCaption>
					<ArticleTitle>Article 5</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at5cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>Local governments are responsible for formulating and implementing independent cybersecurity policies in line with the basic principles, taking into consideration of the appropriate division of roles with the national government.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="6" id="en_ch1at6">
					<ArticleCaption>(Responsibilities of Critical Social Infrastructure Providers)</ArticleCaption>
					<ArticleTitle>Article 6</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at6cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In line with the basic principles, a critical social infrastructure provider is to deepen their interest in and understanding of the importance of cybersecurity and to endeavor independently and actively to ensure cybersecurity, while also endeavoring to cooperate in the implementation of the cybersecurity policy that the national government or local governments implements, to provide their services in a stable and appropriate manner.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="7" id="en_ch1at7">
					<ArticleCaption>(Responsibilities of Business Entities Related to Cyberspace and Other Business Entities)</ArticleCaption>
					<ArticleTitle>Article 7</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at7cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In line with the basic principles, business entities related to cyberspace (meaning those engaged in business regarding the maintenance of the internet and other advanced information and telecommunications networks, the utilization of information and communications technologies, or business relating to cybersecurity; the same applies below) and other business entities are to endeavor independently and actively to ensure cybersecurity, while also endeavoring to cooperate with the cybersecurity policy that the national government or local governments implement, in the course of their business activities.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch1at7cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>Suppliers of the information systems, or computers or programs that constitute a part of those systems, information and communications networks, or electronic or magnetic recording medium (referred to below as "information systems, etc." in this paragraph) are to endeavor, in order to prevent damage to the information systems, etc. that they have supplied due to threats to cybersecurity, to support the measures taken by the users of information systems, etc. to ensure cybersecurity, including designing and developing information systems, etc. that take into consideration the measures taken by the users to ensure their security and reliability, and continuously providing the necessary information for their proper maintenance and management.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="8" id="en_ch1at8">
					<ArticleCaption>(Responsibilities of Educational and Research Organizations)</ArticleCaption>
					<ArticleTitle>Article 8</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at8cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In line with the basic principles, universities and other educational and research organizations are to independently and actively endeavor to ensure cybersecurity, foster human resources related to cybersecurity, carry out research on cybersecurity, and disseminate the results, while endeavoring to cooperate with the cybersecurity policy that the national government or local governments implement.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="9" id="en_ch1at9">
					<ArticleCaption>(Efforts of the People)</ArticleCaption>
					<ArticleTitle>Article 9</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at9cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In line with the basic principles, the people are to endeavor to deepen their interest in and understanding of the importance of cybersecurity and pay necessary attention to ensuring cybersecurity.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="10" id="en_ch1at10">
					<ArticleCaption>(Legislative Measures)</ArticleCaption>
					<ArticleTitle>Article 10</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at10cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government must take legislative, financial, or tax measures or any other measures that are necessary to implement the cybersecurity policy.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="11" id="en_ch1at11">
					<ArticleCaption>(Development of Administrative Organizations)</ArticleCaption>
					<ArticleTitle>Article 11</ArticleTitle>
					<Paragraph Num="1" id="en_ch1at11cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In implementing the cybersecurity policy, the national government is to endeavor to develop administrative organizations and to improve administrative management.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
			</Chapter>
			<Chapter Num="2" id="en_ch2">
				<ChapterTitle>Chapter II Cybersecurity Strategy</ChapterTitle>
				<Article Num="12" id="en_ch2at1">
					<ArticleTitle>Article 12</ArticleTitle>
					<Paragraph Num="1" id="en_ch2at1cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government must establish a basic plan for cybersecurity (referred to below as the "cybersecurity strategy") to comprehensively and effectively promote the cybersecurity policy.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch2at1cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The cybersecurity strategy is to provide for the following matters:</Sentence>
						</ParagraphSentence>
						<Item Num="1">
							<ItemTitle>(i)</ItemTitle>
							<ItemSentence>
								<Sentence>basic guidelines for the cybersecurity policy;</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="2">
							<ItemTitle>(ii)</ItemTitle>
							<ItemSentence>
								<Sentence>information concerning the ensuring of cybersecurity within national administrative organs and other related organs;</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="3">
							<ItemTitle>(iii)</ItemTitle>
							<ItemSentence>
								<Sentence>information concerning the promotion of ensuring cybersecurity in critical social infrastructure providers, the associations that they form, and local governments (referred to below as "critical social infrastructure providers and other related entities"); and</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="4">
							<ItemTitle>(iv)</ItemTitle>
							<ItemSentence>
								<Sentence>beyond what is stated in the preceding three items, matters necessary to comprehensively and effectively promote cybersecurity policies.</Sentence>
							</ItemSentence>
						</Item>
					</Paragraph>
					<Paragraph Num="3" id="en_ch2at1cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Prime Minister must request a cabinet decision on the proposed cybersecurity strategy.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="4" id="en_ch2at1cl4">
						<ParagraphNum>(4)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>When the cybersecurity strategy is established, the national government must report it to the Diet without delay and make it public through the use of the internet and other appropriate means.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="5" id="en_ch2at1cl5">
						<ParagraphNum>(5)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The provisions of the preceding two paragraphs apply mutatis mutandis in the case of amendments to the cybersecurity strategy.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="6" id="en_ch2at1cl6">
						<ParagraphNum>(6)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government must endeavor to take necessary measures for implementing the cybersecurity strategy smoothly, such as appropriating the necessary funding in the budget each fiscal year, to the extent that national finances allow, to ensure necessary funding for the costs needed to implement the cybersecurity strategy.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
			</Chapter>
			<Chapter Num="3" id="en_ch3">
				<ChapterTitle>Chapter III Basic Policies</ChapterTitle>
				<Article Num="13" id="en_ch3at1">
					<ArticleCaption>(Ensuring Cybersecurity at National Administrative Organs and Related Organs)</ArticleCaption>
					<ArticleTitle>Article 13</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at1cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>Regarding cybersecurity at national administrative organs, incorporated administrative agencies (meaning incorporated administrative agencies prescribed in Article 2, paragraph (1) of the Act on General Rules for Incorporated Administrative Agencies (Act No. 103 of 1999); the same applies below), special corporations (meaning a corporation directly incorporated by law or incorporated by a special law through a special incorporation procedure which is subject to Article 4, paragraph (1), item (viii) of the Act for Establishment of the Ministry of Internal Affairs and Communications (Act No. 91 of 1999); the same applies below), etc., the national government is to provide necessary measures including: formulating common standards regarding cybersecurity measures for national administrative organs, incorporated administrative agencies and designated corporations (special corporations and authorized corporations (meaning a corporation incorporated by a special law which needs the approval of a governmental entity for their incorporation and associated matters; the same applies in Article 33, paragraph (1)) which are designated by the Cybersecurity Strategic Headquarters as ones for which the national government needs to further enhance measures which it is providing to ensure cybersecurity, in consideration of the impact on the people's living conditions and economic activities accrued in the case in which cybersecurity in the corporations is not ensured; the same applies below); the collaborative use of information systems among national administrative organs; monitoring and analysis of malicious activities against information systems of national administrative organs, incorporated administrative agencies or designated corporations through information and communications networks or electronic or magnetic recording media; cybersecurity exercises and training at national administrative organs, incorporated administrative agencies and designated corporations; responses to cybersecurity threats in cooperation, communication and coordination with relevant domestic and foreign parties; the sharing of information regarding cybersecurity among national administrative organs, incorporated administrative agencies, special corporations, etc.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="14" id="en_ch3at2">
					<ArticleCaption>(Ensuring Cybersecurity at Critical Social Infrastructure Providers and Other Related Entities)</ArticleCaption>
					<ArticleTitle>Article 14</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at2cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>Regarding cybersecurity at critical social infrastructure providers and other related entities, the national government is to organize and analyze information to prevent damage to computers associated with their important facilities, and is to take necessary measures including the formulation of standards, exercises and training, the promotion of information sharing and other voluntary efforts.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="15" id="en_ch3at3">
					<ArticleCaption>(Facilitation of Voluntary Activities of Private Enterprises, Educational and Research Organizations, and Other Organizations)</ArticleCaption>
					<ArticleTitle>Article 15</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at3cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In view of the fact that the information related to the intellectual property of private enterprises such as small and medium-sized enterprises or of educational and research organizations such as universities is critical for enhancing Japan's international competitiveness, the national government is to provide necessary measures, including promoting their voluntary activities for cybersecurity by increasing interest in and understanding of the importance of cybersecurity, offering consultation on cybersecurity, and providing necessary information and advice.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch3at3cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>Considering that it is important for each member of the public to voluntarily endeavor to ensure cybersecurity, the national government is to provide necessary measures, including offering consultation on cybersecurity and providing necessary information and advice on actions such as appropriate choices concerning products and services in the daily use of computers, the internet or other advanced information and telecommunications networks.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="16" id="en_ch3at4">
					<ArticleCaption>(Coordination with Diverse Entities)</ArticleCaption>
					<ArticleTitle>Article 16</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at4cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is to enhance coordination among relevant administrative organs, and is to take necessary measures to enable diverse entities, such as the national government, local governments, critical social infrastructure providers, and business entities related to cyberspace, to work on cybersecurity policies in mutual coordination.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="17" id="en_ch3at5">
					<ArticleCaption>(Cybercrime Control and Prevention of Spread of Damage)</ArticleCaption>
					<ArticleTitle>Article 17</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at5cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is to take necessary measures to control crimes related to cybersecurity and prevent the spread of damage caused by these crimes.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="18" id="en_ch3at6">
					<ArticleCaption>(Response to Incidents Which May Critically Impact Japan's Safety)</ArticleCaption>
					<ArticleTitle>Article 18</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at6cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is to take necessary measures to improve and strengthen systems at the relevant bodies, and to strengthen mutual coordination and clarify the division of roles among the relevant bodies for responding to incidents related to cybersecurity that might critically affect Japan's safety.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="19" id="en_ch3at7">
					<ArticleCaption>(Enhancement of Industrial Development and International Competitiveness)</ArticleCaption>
					<ArticleTitle>Article 19</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at7cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In consideration of the fact that it is critical for Japan to have self-reliant capabilities to ensure cybersecurity, the national government is to take necessary measures related to cybersecurity, including the promotion of advanced research and development, technological advancements, the development and recruitment of human resources, the strengthening of the market environment and the development of new businesses through the improvement of competitive conditions, the internationalization of technological safety and reliability standards and the participation in frameworks for mutual recognition of those standards, to create new business opportunities, develop sound businesses, and enhance international competitiveness, so that the cybersecurity sector can become a "growth industry" which creates employment opportunities.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="20" id="en_ch3at8">
					<ArticleCaption>(Promotion of Research and Development)</ArticleCaption>
					<ArticleTitle>Article 20</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at8cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In consideration of the fact that it is critical for Japan to maintain self-reliant technological cybersecurity capabilities, the national government is to take necessary measures related to cybersecurity, including the improvement of the cybersecurity research environment, the promotion of basic research on technological safety and reliability, the promotion of research and development for core technologies, the development of skilled researchers and engineers, the strengthening of coordination among national research institutes, universities, the private sector, and other relevant parties, and international coordination for research and development, to promote research and development for cybersecurity and its technological and other relevant demonstrations, and to have the relevant cybersecurity results publicized.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="21" id="en_ch3at9">
					<ArticleCaption>(Development of Human Resources)</ArticleCaption>
					<ArticleTitle>Article 21</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at9cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In close coordination and cooperation with universities, colleges of technology, specialized training colleges, private enterprises, and other relevant entities, the national government is to take necessary measures to ensure appropriate employment conditions and treatment of the workforce in the field of cybersecurity, and by doing so, enabling their duties and work environments to become attractive enough to match their importance.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch3at9cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In close coordination and cooperation with universities, colleges of technology, specialized training colleges, private enterprises, and other relevant entities, for the purposes of recruitment, development, and quality improvement of cybersecurity-related human resources, the national government is to take necessary measures, including the utilization of a qualification scheme and training of young technical experts.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="22" id="en_ch3at10">
					<ArticleCaption>(Promotion of Education and Learning, Public Awareness Raising)</ArticleCaption>
					<ArticleTitle>Article 22</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at10cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is to take necessary measures, including the promotion of education and learning, public awareness activities, and the dissemination of knowledge in the field of cybersecurity, to deepen interest and understanding regarding cybersecurity among the people on a broad scale.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch3at10cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The national government is to take necessary measures, including the implementation of events for public awareness and the dissemination of information on cybersecurity, and the designation of the period to promote cybersecurity activities in a focused and effective manner, to contribute to the promotion of the measures referred to in the preceding paragraph.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="23" id="en_ch3at11">
					<ArticleCaption>(Promotion of International Cooperation)</ArticleCaption>
					<ArticleTitle>Article 23</ArticleTitle>
					<Paragraph Num="1" id="en_ch3at11cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>In order for Japan to play an active role in the international community in the field of cybersecurity and promote Japan's international interests, the national government is to advance international cooperation relating to cybersecurity, including through independent participation in the formulation of international rules, by building relationships of trust and promoting information-sharing on an international level, by providing active support for capacity building in developing regions' cybersecurity response and other such international technological cooperation, and through crime control; and is also to take the necessary measures for deepening other countries' understanding of cybersecurity in Japan.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
			</Chapter>
			<Chapter Num="4" id="en_ch4">
				<ChapterTitle>Chapter IV Cybersecurity Strategic Headquarters</ChapterTitle>
				<Article Num="24" id="en_ch4at1">
					<ArticleCaption>(Establishment)</ArticleCaption>
					<ArticleTitle>Article 24</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at1cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Cybersecurity Strategic Headquarters (referred to below as the "Headquarters") is established under the Cabinet to effectively and comprehensively advance cybersecurity policies.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="25" id="en_ch4at2">
					<ArticleCaption>(Affairs under Jurisdiction of the Headquarters)</ArticleCaption>
					<ArticleTitle>Article 25</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at2cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Headquarters is responsible for the following affairs:</Sentence>
						</ParagraphSentence>
						<Item Num="1">
							<ItemTitle>(i)</ItemTitle>
							<ItemSentence>
								<Sentence>preparing a draft of the cybersecurity strategy and promoting its implementation;</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="2">
							<ItemTitle>(ii)</ItemTitle>
							<ItemSentence>
								<Sentence>establishing the standards of cybersecurity measures for national administrative organs, incorporated administrative agencies and designated corporations, and promoting the implementation of the evaluation (including audit) of measures based on the standards and other measures taken</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="3">
							<ItemTitle>(iii)</ItemTitle>
							<ItemSentence>
								<Sentence>establishing the standards for policies implemented by national administrative organs to ensure cybersecurity at critical social infrastructure providers and other related entities (including surveys on the state of cybersecurity assurance at critical social infrastructure providers and other related entities for establishing the standards), evaluating policies based on the standards, and promoting the implementation of other policies based on the standards;</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="4">
							<ItemTitle>(iv)</ItemTitle>
							<ItemSentence>
								<Sentence>evaluating the state of cybersecurity assurance at national administrative organs, incorporated administrative agencies, and designated corporations (including monitoring and analyzing unauthorized activities against information systems that are conducted through an information and telecommunications network or electronic or magnetic recording medium, and evaluating measures against critical cybersecurity-related incidents (including investigations into the causes of those incidents));</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="5">
							<ItemTitle>(v)</ItemTitle>
							<ItemSentence>
								<Sentence>beyond the affairs stated in the preceding items, engaging in research and deliberation on proposals for major cybersecurity policies; establishing cross-departmental plans; making guidelines for estimates of relevant administrative organs' expenditures and establishing the basic principles for implementing their policies; promoting the implementation of those policies, through measures such as evaluating them; and carrying out overall coordination.</Sentence>
							</ItemSentence>
						</Item>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at2cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In preparing a draft of the cybersecurity strategy, the Headquarters must hear the opinions of the National Security Council in advance.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="3" id="en_ch4at2cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>In the following cases, the Headquarters must hear the opinions of the Cybersecurity Promotion Expert Council in advance:</Sentence>
						</ParagraphSentence>
						<Item Num="1">
							<ItemTitle>(i)</ItemTitle>
							<ItemSentence>
								<Sentence>when it intends to prepare a draft of the cybersecurity strategy;</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="2">
							<ItemTitle>(ii)</ItemTitle>
							<ItemSentence>
								<Sentence>when it intends to establish the standards referred to in paragraph (1), item (ii) or (iii);</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="3">
							<ItemTitle>(iii)</ItemTitle>
							<ItemSentence>
								<Sentence>when it intends to compile the results of the evaluation referred to in paragraph (1), item (ii) or (iii).</Sentence>
							</ItemSentence>
						</Item>
					</Paragraph>
					<Paragraph Num="4" id="en_ch4at2cl4">
						<ParagraphNum>(4)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Headquarters is to work in close coordination with the National Security Council on critical issues concerning cybersecurity in the context of national security.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="26" id="en_ch4at3">
					<ArticleCaption>(Organization)</ArticleCaption>
					<ArticleTitle>Article 26</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at3cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Headquarters consists of the Chief of the Cybersecurity Strategic Headquarters, the Deputy Chief of the Cybersecurity Strategic Headquarters, and the members of the Cybersecurity Strategic Headquarters.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="27" id="en_ch4at4">
					<ArticleCaption>(Chief of the Cybersecurity Strategic Headquarters)</ArticleCaption>
					<ArticleTitle>Article 27</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at4cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The person in charge of the Headquarters is referred to as the Chief of the Cybersecurity Strategic Headquarters (referred to below as the "Chief"), and the Prime Minister serves in that capacity.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at4cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Chief engages in the overall management of the Headquarters' affairs and directs and supervises personnel at the Headquarters.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="3" id="en_ch4at4cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>If the Chief finds it necessary based on the evaluation provided for in Article 25, paragraph (1), items (ii) through (v), or the materials, data, etc. provided pursuant to the provisions of Article 32 or 33, the Chief may make recommendations to the head of the relevant administrative organ.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="4" id="en_ch4at4cl4">
						<ParagraphNum>(4)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>After making the recommendations pursuant to the provisions of the preceding paragraph, the Chief may request a report from the heads of the relevant administrative organs regarding the measures taken based on the recommendations.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="28" id="en_ch4at5">
					<ArticleCaption>(Deputy Chief of the Cybersecurity Strategic Headquarters)</ArticleCaption>
					<ArticleTitle>Article 28</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at5cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Deputy Chief of the Cybersecurity Strategic Headquarters (referred to below as the "Deputy Chief") is assigned to the Headquarters, and a Minister of State serves in that capacity.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at5cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Deputy Chief assists the Chief's duties.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="29" id="en_ch4at6">
					<ArticleCaption>(Members of the Cybersecurity Strategic Headquarters)</ArticleCaption>
					<ArticleTitle>Article 29</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at6cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The members of the Cybersecurity Strategic Headquarters are assigned to the Headquarters (referred to as "members" in the following paragraph).</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at6cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>All Ministers of State other than the Chief and the Deputy Chief serve as members.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="30" id="en_ch4at7">
					<ArticleCaption>(Cybersecurity Promotion Expert Council)</ArticleCaption>
					<ArticleTitle>Article 30</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at7cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Cybersecurity Promotion Expert Council (referred to below as the "Expert Council" in this Article) is established in the Headquarters.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at7cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Expert Council takes charge of the following affairs:</Sentence>
						</ParagraphSentence>
						<Item Num="1">
							<ItemTitle>(i)</ItemTitle>
							<ItemSentence>
								<Sentence>stating its opinions to the Chief pursuant to the provisions of Article 25, paragraph (3);</Sentence>
							</ItemSentence>
						</Item>
						<Item Num="2">
							<ItemTitle>(ii)</ItemTitle>
							<ItemSentence>
								<Sentence>beyond what is stated in the preceding item, studying and deliberating important cybersecurity policies, and, when it finds necessary, stating its opinions to the Chief.</Sentence>
							</ItemSentence>
						</Item>
					</Paragraph>
					<Paragraph Num="3" id="en_ch4at7cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The members of the Expert Council are appointed by the Prime Minister from among persons with relevant expertise in cybersecurity.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="31" id="en_ch4at8">
					<ArticleCaption>(Entrustment of Affairs)</ArticleCaption>
					<ArticleTitle>Article 31</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at8cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The Headquarters may entrust a part of its affairs to the persons specified in each of the items according to the category of affairs stated in the following items:</Sentence>
						</ParagraphSentence>
						<Item Num="1">
							<ItemTitle>(i)</ItemTitle>
							<ItemSentence>
								<Column Num="1">
									<Sentence>affairs stated in Article 25, paragraph (1), item (ii) (limited to those relating to audits prescribed in the same item (limited to those related to incorporated administrative agencies and designated corporations)), affairs stated in item (iii) of that paragraph (limited to those related to investigations prescribed in that item), or affairs stated in item (iv) of that paragraph (limited to those related to investigations prescribed in that item (limited to those related to incorporated administrative agencies and designated corporations)):</Sentence>
								</Column>
								<Column Num="2">
									<Sentence>the Information-Technology Promotion Agency or other corporations specified by Cabinet Order as having sufficient technical capability and expert knowledge and experience concerning cybersecurity-related measures and being capable of reliably implementing the relevant affairs;</Sentence>
								</Column>
							</ItemSentence>
						</Item>
						<Item Num="2">
							<ItemTitle>(ii)</ItemTitle>
							<ItemSentence>
								<Column Num="1">
									<Sentence>affairs stated in Article 25, paragraph (1), item (iv) (limited to those related to the monitoring and analysis of activities prescribed in that item):</Sentence>
								</Column>
								<Column Num="2">
									<Sentence>the National Institute of Information and Communications Technology, the Information-Technology Promotion Agency, or other corporations specified by Cabinet Order as having sufficient technical capability and expert knowledge and experience concerning the monitoring and analysis of the activities and being capable of carrying out the affairs reliably.</Sentence>
								</Column>
							</ItemSentence>
						</Item>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at8cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>An officer or employee of a corporation that has been entrusted with affairs pursuant to the provisions of the preceding paragraph or a person who had been in that position, must not divulge or misappropriate any secrets learned in connection with those affairs under that entrustment, without justifiable grounds.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="3" id="en_ch4at8cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>An officer or employee of a corporation entrusted with affairs pursuant to the provisions of paragraph (1) who engages in the affairs under the entrustment, is deemed to be an official engaged in public services pursuant to laws and regulations, regarding the application of the Penal Code (Act No. 45 of 1907) or other penal provisions.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="32" id="en_ch4at9">
					<ArticleCaption>(Submission of Materials)</ArticleCaption>
					<ArticleTitle>Article 32</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at9cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>The heads of relevant administrative organs must provide the Headquarters with materials or information related to cybersecurity that is beneficial to the performance of the affairs under its jurisdiction in a timely manner, as prescribed by Headquarters.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at9cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>Beyond what is provided for in the preceding paragraph, as requested by the Chief, the heads of the relevant administrative organs must cooperate with the Headquarters, by activities such as providing materials or information related to cybersecurity that is necessary for the performance of the affairs under its jurisdiction, or by explaining those materials or information.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="33" id="en_ch4at10">
					<ArticleCaption>(Submission of Materials and Other Cooperation)</ArticleCaption>
					<ArticleTitle>Article 33</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at10cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence Num="1">If the Headquarters finds it necessary for carrying out the functions under its jurisdiction, in relation to the measures which the Headquarters takes in coordination with the national government, or other cybersecurity measures for preventing the spread of damage caused by threats against cybersecurity and promoting a quick recovery from any damage, it may request the submission of the necessary materials, presentation of the necessary opinions, provision of the necessary explanations or any other cooperation from the following persons: the heads of local governments or incorporated administrative agencies; the deans or the presidents of national university corporations (meaning national university corporations prescribed in Article 2, paragraph (1) of the National University Corporation Act (Act No.112 of 2003)); the heads of inter-university research institute corporations (meaning inter-university research institute corporations provided for in Article 2, paragraph (3) of that Act); the president of the Japan Legal Support Center (meaning the Japan Legal Support Center provided for in Article 13 of the Comprehensive Legal Support Act (Act No. 74 of 2004)); the representatives of special corporations or authorized corporations designated by the Headquarters; and the representatives of the relevant entity facilitating cybersecurity-related communication and coordination with related domestic and foreign parties.</Sentence>
							<Sentence Num="2">In this case, the relevant person must respond to the request, unless there is a justifiable reason for not doing so.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at10cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence Num="1">If the Headquarters finds it necessary for carrying out the functions under its jurisdiction, the Headquarters may ask for the cooperation referred to in the preceding paragraph from the representatives of the critical social infrastructure providers and the associations that they have organized.</Sentence>
							<Sentence Num="2">In this case, the persons that have been requested to do so are to endeavor to meet that request.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="3" id="en_ch4at10cl3">
						<ParagraphNum>(3)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>If the Headquarters finds it particularly necessary for carrying out the functions under its jurisdiction, it may request the cooperation referred to in paragraph (1) from persons other than those prescribed in the preceding two paragraphs.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="34" id="en_ch4at11">
					<ArticleCaption>(Cooperation for Local Governments)</ArticleCaption>
					<ArticleTitle>Article 34</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at11cl1">
						<ParagraphNum>(1)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>If a local government finds it necessary for formulating or implementing the policy prescribed in Article 5, it may request the Headquarters to provide information and other cooperation.</Sentence>
						</ParagraphSentence>
					</Paragraph>
					<Paragraph Num="2" id="en_ch4at11cl2">
						<ParagraphNum>(2)</ParagraphNum>
						<ParagraphSentence>
							<Sentence>If the Headquarters is requested to provide cooperation under the preceding paragraph, it is to endeavor to meet the request.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="35" id="en_ch4at12">
					<ArticleCaption>(Administrative Affairs)</ArticleCaption>
					<ArticleTitle>Article 35</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at12cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>Administrative affairs concerning the Headquarters are processed by the Cabinet Secretariat and administered by the Cabinet Cyber Officer.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="36" id="en_ch4at13">
					<ArticleCaption>(Competent Minister)</ArticleCaption>
					<ArticleTitle>Article 36</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at13cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>The competent minister under the Cabinet Act (Act No. 5 of 1947) for matters related to the Headquarters is the Prime Minister.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
				<Article Num="37" id="en_ch4at14">
					<ArticleCaption>(Delegation to Cabinet Orders)</ArticleCaption>
					<ArticleTitle>Article 37</ArticleTitle>
					<Paragraph Num="1" id="en_ch4at14cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>Beyond what is provided for in this Act, Cabinet Order prescribes the necessary matters relating to the Headquarters.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
			</Chapter>
			<Chapter Num="5" id="en_ch5">
				<ChapterTitle>Chapter V Penal Provisions</ChapterTitle>
				<Article Num="38" id="en_ch5at1">
					<ArticleTitle>Article 38</ArticleTitle>
					<Paragraph Num="1" id="en_ch5at1cl1">
						<ParagraphNum></ParagraphNum>
						<ParagraphSentence>
							<Sentence>A person who has violated the provisions of Article 31, paragraph (2) is punished by imprisonment for not more than one year or a fine of not more than 500,000 yen.</Sentence>
						</ParagraphSentence>
					</Paragraph>
				</Article>
			</Chapter>
		</MainProvision>
		<SupplProvision id="en_s1">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s1at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s1at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence Num="1" Function="Main">This Act comes into effect on the date of promulgation;</Sentence>
						<Sentence Num="2" Function="Proviso">provided, however, that the provisions of Chapters II and IV as well as Article 4 of the Supplementary Provisions come into effect on the day specified by Cabinet Order within a period not exceeding one year from the date of promulgation.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="2" id="en_s1at2">
				<ArticleCaption>(Review)</ArticleCaption>
				<ArticleTitle>Article 2</ArticleTitle>
				<Paragraph Num="1" id="en_s1at2cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>For cybersecurity incidents classed as emergencies specified in Article 21, paragraph (1) of the Act on the Peace and Independence of Japan and Maintenance of the Security of the Nation and the People in Armed Attack Situations, etc., and Survival-Threatening Situations (Act No.79 of 2003), and other malicious activities against computers through information and communications networks or electronic or magnetic recording media, the national government is to review, from a broad point of view, measures aimed at further strengthening the capability of the defense of infrastructure which is the foundation of the peoples' living conditions and economic activities, and for which the functional failure or deterioration of the infrastructure would risk enormous impacts on the people.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 66 of September 11, 2015" id="en_s2">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s2at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s2at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>This Act comes into effect on April 1, 2016.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 76 of September 30, 2015" id="en_s3">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s3at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s3at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>This Act comes into effect on the day specified by Cabinet Order within a period not exceeding six months from the date of promulgation.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 31 of April 22, 2016" id="en_s4">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s4at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s4at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence Num="1" Function="Main">This Act comes into effect on the day specified by Cabinet Order within a period not exceeding six months from the date of promulgation;</Sentence>
						<Sentence Num="2" Function="Proviso">provided, however, that the provisions of the following Article and Article 3, Article 5 and Article 6 of the Supplementary Provisions come into effect on the date of promulgation.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="6" id="en_s4at2">
				<ArticleCaption>(Delegation to Cabinet Order)</ArticleCaption>
				<ArticleTitle>Article 6</ArticleTitle>
				<Paragraph Num="1" id="en_s4at2cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Beyond what is provided for in Articles 2 through the preceding Article of the Supplementary Provisions, Cabinet Order prescribes the necessary transitional measures for the enforcement of this Act (including transitional measures for penal provisions).</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 91 of December 12, 2018" id="en_s5">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Paragraph Num="1" id="en_s5cl1">
				<ParagraphCaption>(Effective Date)</ParagraphCaption>
				<ParagraphNum>(1)</ParagraphNum>
				<ParagraphSentence>
					<Sentence>This Act comes into effect on the day specified by Cabinet Order within a period not exceeding one year from the date of promulgation.</Sentence>
				</ParagraphSentence>
			</Paragraph>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 11 of May 24, 2019" id="en_s6">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s6at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s6at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>This Act comes into effect on April 1, 2020.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 35 of May 19, 2021" id="en_s7">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s7at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s7at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>This Act comes into effect on September 1, 2021.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 36 of May 19, 2021" id="en_s8">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s8at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s8at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence Num="1" Function="Main">This Act comes into effect on September 1, 2021;</Sentence>
						<Sentence Num="2" Function="Proviso">provided, however, that the provisions of Article 60 of the Supplementary Provisions come into effect on the date of promulgation.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="57" id="en_s8at2">
				<ArticleCaption>(Transitional Measures Concerning Dispositions)</ArticleCaption>
				<ArticleTitle>Article 57</ArticleTitle>
				<Paragraph Num="1" id="en_s8at2cl1">
					<ParagraphNum>(1)</ParagraphNum>
					<ParagraphSentence>
						<Sentence>After this Act comes into effect, beyond what is otherwise provided for in laws and regulations, any dispositions such as authorizations or other acts which a former national government organ granted or made before this Act comes into effect pursuant to the provisions of one of the relevant laws before amendment by this Act (including orders based on them; referred to below as "former laws and regulations" in this Article and the following Article) are deemed to be dispositions such as authorizations or other acts which a corresponding national government organ granted or made pursuant to the corresponding provisions of the relevant Act after its amendment by this Act (including orders based on them; referred to below as "new laws and regulations" in this Article and the following Article).</Sentence>
					</ParagraphSentence>
				</Paragraph>
				<Paragraph Num="2" id="en_s8at2cl2">
					<ParagraphNum>(2)</ParagraphNum>
					<ParagraphSentence>
						<Sentence>Beyond what is otherwise provided for in laws and regulations, an application, notification or any other act that has been filed with or made to the former national government organs pursuant to the provisions of the former laws and regulations at the time of the enforcement of this Act is deemed to be an application, notification or any other act that has been filed with or made to the corresponding national government organs pursuant to the corresponding provisions of new laws and regulations after this Act comes into effect.</Sentence>
					</ParagraphSentence>
				</Paragraph>
				<Paragraph Num="3" id="en_s8at2cl3">
					<ParagraphNum>(3)</ParagraphNum>
					<ParagraphSentence>
						<Sentence>Beyond what is otherwise provided for in laws and regulations, if procedures such as applications or notifications are required to be made with the former national government organs pursuant to the provisions of the former laws and regulations before this Act comes into effect, but those procedures have not been made with the former national government organs before the effective date of this Act, the provisions of the new laws and regulations apply after this Act comes into effect, deeming that the procedures have not been made to the corresponding national government organs pursuant to the corresponding provisions of new laws and regulations.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="58" id="en_s8at3">
				<ArticleCaption>(Transitional Measures Concerning Effect of Order)</ArticleCaption>
				<ArticleTitle>Article 58</ArticleTitle>
				<Paragraph Num="1" id="en_s8at3cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>After this Act comes into effect, the Cabinet Office Order referred to in Article 7, paragraph (3) of the Act for Establishment of the Cabinet Office, or the Ministerial Order stated in Article 12, paragraph (1) of the National Government Organization Act that has been issued pursuant to the provisions of the former laws and regulations is to remain in force as the corresponding Order of the Digital Agency stated in Article 7, paragraph (3), or the Ministerial Order stated in Article 12, paragraph (1) of the National Government Organization Act that has been issued based on the corresponding provisions of the new laws and regulations, unless otherwise provided for in laws and regulations.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="59" id="en_s8at4">
				<ArticleCaption>(Transitional Measures for Application of Penal Provisions)</ArticleCaption>
				<ArticleTitle>Article 59</ArticleTitle>
				<Paragraph Num="1" id="en_s8at4cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Prior laws and regulations continue to govern the applicability of penal provisions to conduct that a person engages in before this Act comes into effect.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="60" id="en_s8at5">
				<ArticleCaption>(Delegation to Cabinet Orders)</ArticleCaption>
				<ArticleTitle>Article 60</ArticleTitle>
				<Paragraph Num="1" id="en_s8at5cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Beyond what is provided for in Article 15, Article 16, Article 51 and the preceding three Articles of the Supplementary Provisions, transitional measures necessary for the enforcement of this Act (including transitional measures concerning penal provisions) are to be provided for by Cabinet Order.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 68 of June 17, 2022" id="en_s9">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Paragraph Num="1" id="en_s9cl1">
				<ParagraphCaption>(Effective Date)</ParagraphCaption>
				<ParagraphNum>(1)</ParagraphNum>
				<ParagraphSentence>
					<Sentence Num="1" Function="Main">This Act comes into effect on the date on which the Act Partially Amending the Penal Code and Related Acts comes into effect;</Sentence>
					<Sentence Num="2" Function="Proviso">provided, however, that the provisions stated in the following items come into effect on the date prescribed in the items:</Sentence>
				</ParagraphSentence>
				<Item Num="1">
					<ItemTitle>(i)</ItemTitle>
					<ItemSentence>
						<Column Num="1">
							<Sentence>the provisions of Article 509:</Sentence>
						</Column>
						<Column Num="2">
							<Sentence>the date of promulgation</Sentence>
						</Column>
					</ItemSentence>
				</Item>
			</Paragraph>
		</SupplProvision>
		<SupplProvision Extract="Yes" AmendLawNum="Act No. 43 of May 23, 2025" id="en_s10">
			<SupplProvisionLabel>Supplementary Provisions</SupplProvisionLabel>
			<Article Num="1" id="en_s10at1">
				<ArticleCaption>(Effective Date)</ArticleCaption>
				<ArticleTitle>Article 1</ArticleTitle>
				<Paragraph Num="1" id="en_s10at1cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence Num="1" Function="Main">This Act comes into effect on the date on which the Act on Prevention of Damage Caused by Wrongful Acts against Important Computers (Act No. 42 of 2025) comes into effect;</Sentence>
						<Sentence Num="2" Function="Proviso">provided, however, that the provisions stated in the following items come into effect on the dates specified respectively in those items:</Sentence>
					</ParagraphSentence>
					<Item Num="1">
						<ItemTitle>(i)</ItemTitle>
						<ItemSentence>
							<Column Num="1">
								<Sentence>the provisions of Article 4 of the Supplementary Provisions:</Sentence>
							</Column>
							<Column Num="2">
								<Sentence>the date of promulgation;</Sentence>
							</Column>
						</ItemSentence>
					</Item>
					<Item Num="2">
						<ItemTitle>(ii)</ItemTitle>
						<ItemSentence>
							<Column Num="1">
								<Sentence>the provisions of Article 1, the provisions in Article 3 to amend Article 1, item (viii) of the Act on Remuneration of Officials with Special Capacity and Appended Table 1 of the same Act (limited to the part amending "and the Director of Cabinet Intelligence" to ", the Director of Cabinet Intelligence, and the Cabinet Cyber Officer"), the provisions of Article 5, Article 7, Article 12, and Article 15, and the provisions in Article 17 to add one item to Article 4, paragraph (1) of the Act for Establishment of the Cabinet Office and to add one item after paragraph (3), item (xxvii) - 6 of that Article:</Sentence>
							</Column>
							<Column Num="2">
								<Sentence>the effective date of the provisions stated in Article 1, item (ii) of the Supplementary Provisions of the Act on Prevention of Damage Caused by Wrongful Acts against Important Computers.</Sentence>
							</Column>
						</ItemSentence>
					</Item>
				</Paragraph>
			</Article>
			<Article Num="2" id="en_s10at2">
				<ArticleCaption>(Transitional Measures Associated with Partial Amendment in The Basic Act on Cybersecurity)</ArticleCaption>
				<ArticleTitle>Article 2</ArticleTitle>
				<Paragraph Num="1" id="en_s10at2cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Even after the effective date of this Act (referred to below as "the effective date" in this Article and the following Article), prior laws and regulations continue to govern the duty not to divulge or misappropriate any secret learned in connection with the administrative affairs of the Cybersecurity Council referred to in Article 17, paragraph (1) of The Basic Act on Cybersecurity before amendment by the provisions of Article 13, related to a person who was engaged in those administrative affairs before the effective date, and the duty not to divulge or misappropriate any secret learned in connection with the entrusted administrative affairs related to a person who was an officer or employee of a corporation entrusted with the administrative affairs stated in Article 31, paragraph (1), item (iii) of that Act before the effective date.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="3" id="en_s10at3">
				<ArticleCaption>(Transitional Measures for Application of Penal Provisions)</ArticleCaption>
				<ArticleTitle>Article 3</ArticleTitle>
				<Paragraph Num="1" id="en_s10at3cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Prior laws and regulations continue to govern the applicability of penal provisions to conduct that a person engages in before the effective date, and to conduct that a person engages in after the effective date but which, pursuant to the preceding Article, is to continue to be governed by prior laws and regulations.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
			<Article Num="4" id="en_s10at4">
				<ArticleCaption>(Delegation to Cabinet Orders)</ArticleCaption>
				<ArticleTitle>Article 4</ArticleTitle>
				<Paragraph Num="1" id="en_s10at4cl1">
					<ParagraphNum></ParagraphNum>
					<ParagraphSentence>
						<Sentence>Beyond what is provided for in the preceding two Articles, transitional measures necessary for the enforcement of this Act (including transitional measures concerning penal provisions) are specified by Cabinet Order.</Sentence>
					</ParagraphSentence>
				</Paragraph>
			</Article>
		</SupplProvision>
	</LawBody>
</Law>