December 9, 2019
Under the provisions of Article 10 (1) of the Act on Prohibition of Unauthorized Computer Access (Act No. 128 of 1999; hereinafter referred to as the “Act”), the National Policy Agency (NPA), the Ministry of Internal Affairs and Communications (MIC) and the Ministry of Economy, Trade and Industry (METI) have been jointly publicizing the current status of unauthorized computer accesses that have occurred and that of research and development (R&D) involving technologies for computer access control functions. As part of this effort, from December 9, 2019, to January 24, 2020, they will call for information on R&D involving technologies for computer-access control functions, which are functions that the NPA, MIC and METI are required to publicize through their documents this fiscal year.
Development of social environments that hinder unauthorized computer access is a necessary action to prevent crimes targeting computers through telecommunications lines and to maintain the order of telecommunications achieved by computer-access control functions.
To this end, under Article 10 (1) of the Act, the NPA, MIC and METI are required to publicize information on the current status of unauthorized computer access that have occurred and that of R&D involving technologies for computer access control functions. In particular, they are also required to publicize the status of such R&D in the private sector on a voluntary basis. Accordingly, they will call for such information from a wide variety of industries. (*1)
*Note 1: The NPA, MIC and METI have been publicizing such information through their press releases.
Article 10 (1): To help protect Specified Computers with an Access Control Feature from acts of unauthorized computer access, the National Public Safety Commission, Minister for Internal Affairs and Telecommunications, and Minister of Economy, Trade and Industry are to publicize the status of the occurrence of acts of unauthorized computer access and the progress of research and development on technology relating to Access Control Features at least once a year.
Article 10 (2) and (3) are omitted.
2. Target technologies of the call
The NPA, MIC and METI will call for information on the following six types of computer-access control technologies: (*2)
- Technologies for detecting and defending against computer intrusions;
- Technologies for addressing vulnerabilities;
- Technologies for advanced authorization;
- Technologies for incident analysis;
- Technologies for addressing unauthorized programs; and
- Other technologies for computer-access control functions.
These target technologies do not include those that are still in any R&D processes. All applicant technologies should be those already completed and utilized in society or those ready to be utilized. (*3)
Moreover, these target technologies exclude technologies involving the current projects to which the budget is allocated from the NPA, MIC or METI.
*Note 2: These technologies should be those involving computer-access control by electronic means through computers connected to a network and they do not include physical security measures or other similar means.
*Note 3: They do not include any product names, trade names, etc. of technologies.
3. Period of the call
From December 9 (Mon.), 2019, to January 24 (Fri.), 2020 (*4)
*Note 4: Submission must arrive by January 24, 2020, even by mail.
4. Application guidelines
For the application guidelines, see the Appendix.
5. Future schedule
After receiving information on R&D, the NPA, MIC and METI will select the technologies and publicize selected ones around in March 2020.
Division in Charge
Cybersecurity Division, Commerce and Information Policy Bureau