
Article 3. (Prohibition of acts of unauthorized computer access)
No person shall conduct an act of unauthorized computer
access.
2. The act of unauthorized computer access mentioned in the preceding
paragraph means an act that falls under one of the following items:
(1) An act of making available a specific use which is restricted by an
access control function by making in operation a specific computer having
that access control function through inputting into that specific computer,
via telecommunication line, another person’s identification code for that
access control function (to exclude such acts conducted by the access
administrator who has added the access control function concerned, or
conducted with the approval of the access administrator concerned or of
the authorized user for that identification code);
(2) An act of making available a restricted specific use by making in
operation a specific computer having that access control function through
inputting into it, via telecommunication line, any information (excluding
an identification code) or command that can evade the restrictions placed
by that access control function on that specific use (to exclude such acts
conducted by the access administrator who has added the access control
function concerned, or conducted with the approval of the access
administrator concerned; the same shall apply in the following item);
(3) An act of making available a restricted specific use by making in
operation a specific computer, whose specific use is restricted by an access
control function installed into another specific computer which is
connected, via a telecommunication line, to that specific computer,
through inputting into it, via a telecommunication line, any information or
command that can evade the restrictions concerned.
Please note that this law is not from an official source.
Please note this is an unofficial translation.