Information Security and Cybersecurity
Now that information technology (IT) is everywhere in our lives, the exchange of information using IT as a social platform has become essential. While the importance of IT is increasing, any problems encountered in using IT may seriously affect our lives and economic activities. A number of accidents and incidents that have caused damages to company operations and businesses have been reported, such as an increase in cyber-attacks targeting various organizations, and leakages or unauthorized use of information.
In these circumstances, every organization, including companies, is expected to reinforce its information security and cybersecurity, as one of the duties it must perform in developing its business with the use of IT. Following the Basic Act on Cybersecurity enacted in November 2014, the Japanese Cabinet adopted a new national strategy showing its basic guidelines entitled "Cybersecurity Strategy" in September 2015. Along with the progress of the Internet of Things (IoT), which is the concept that everything, including home appliances, automobiles, robots and factories, is connected to networks, a greater risk is anticipated that manufacturing sites, such as factories, and infrastructures may become the new targets of cyber-attacks. The importance of information security measures is growing.
With an attention to various regulations relating to information security in Japan and overseas, our firm conducts multifaceted and strategic analysis and provides practical legal advice in a wide-range of areas, including finance, real estate, life sciences, IT and the internet. Further, we have abundant experience in managing emergencies, such as leakages or unauthorized use of information. For our clients that are companies and organizations conducting their businesses globally, we are able to organize the best teams of attorneys and experts who, by working together, are able to efficiently resolve information security issues.
Lawyers in charge of Information Security and Cybersecurity
- Shiro Kuniya
- Shigetoshi (Toshi) Hirano
- Motonobu Wakabayashi
- Seigo Takehira
- Yohei Hasebe
- Yuki Kuroda
- Mizuki Kanno
- Mikio Yamaguchi
- Masafumi Takeda
- Akiko Ishida
- Takuya Uehara
- Yuya Oyagi
- Personal Information Protection Law of China (2) - Processing of Personal Information and Consent by the Data Subject -
- Measures on Security Assessment of Cross-Border Data Transfers (Draft for Comment) - Basic Points to Note -
- [Series] E-Commerce Practices （Points to Note in Drafting Terms and Conditions.etc.） (No. 12):Points to Note regarding Personal Data Protection (3)
- [Series] E-Commerce Practices （Points to Note in Drafting Terms and Conditions.etc.） (No. 11):Points to Note regarding Personal Data Protection (2)
- Looking Back on the First 4 Years of the "Network Security Law" in China (Part II) -China's Regulations on Cross-border Transfer of Data, Etc.
- [Series] E-Commerce Practices （Points to Note in Drafting Terms and Conditions.etc.） (No. 10)
- 【Online Seminar: Video Streaming】 Series of M&A Legal Practice Seminars (8): M&A and Data Compliance ～ Based on the Amended Personal Information Protection Act ～
- 【Online Seminar】Series of M&A Legal Practice Seminars (8): M&A and Data Compliance ～ Based on the Amended Personal Information Protection Act ～
- Learn the Basics of Cookie Compliance
- 【Onilne Seminar】Series of Seminars on Latest Court Decisions (1): Dispute over Development of Information Systems/Software
- Study of GDPR based on Cases of Enforcement
- Legal Issues Concerning the Handling of Data in the Big Data/IoT Era - From the Perspectives of Protection and Utilization
- Asia Legal Practice Morning Seminar (6):Measures to Be Taken by Asian Countries for the Protection of Personal Data (As Based on the GDPR)