126 results
Advanced search
Daisuke Tsuta
1-24
/Total: 126 results

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (5): Digital, Data, and AI-related Legislative Trends in the EU (2) - General Introduction (2) Detailed Discussion (1)"
Publication:Kaishahoumu A2Z February 2025

Article etc.
"Mondaq Comparative Guides Cybersecurity - Japan Chapter"
Publication:Mondaq Comparative Guides - Cybersecurity

Article etc.
"Forthcoming Enforcement of the Security Clearance Law: What Measures Should Companies Develop?"
Publication:PC-Webzine

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (4): Digital, Data, and AI-related Legislative Trends in the EU (1) - General Introduction (1)"
Publication:Kaishahoumu A2Z December 2024

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (3) Information Divulgence by Internal Wrongdoing"
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (3): Trade Secret Infringement Offenses and Secondary Offenses"
Publication:Kaishahoumu A2Z No.210

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (2): What are Trade Secrets? (1)"
Publication:Kaishahoumu A2Z No.209

Article etc.
"Key Practical Points in Information Management, in the Form of Dialogue (1): Overview of the Laws and Regulations on Information Management"
Publication:Kaishahoumu A2Z No.208

Article etc.
"(Special Feature: Future of Economic Security) Essential Infrastructure Screening System - Supply Chain Cybersecurity"
Publication:Julist No.1601

Article etc.
"Legal Actions Against Perpetrators of Impersonation or Unauthorized Log-ins and Reporting to Authorities"
Publication:UNITIS

Article etc.
"Cross-Sector Cybersecurity Laws (Vol. 10): Cybersecurity and Disaster Prevention - Development of BCPs for Cyber Risk"
Publication:NBL No.1272

Article etc.
"Essential Information on Global Personal Information Regulations, in the Form of Dialogue (21): Generative AI and Protection of Personal Information Regulations”
Publication:Kaishahoumu A2Z No.207

Article etc.
"Cross-Sector Cybersecurity Laws (Vol. 9): Cybersecurity and Crisis Management - Focusing on External Cyberattacks"
Publication:NBL No.1270

Article etc.
"Special Feature 1: Cybersecurity [Round-Table Talk] Cybersecurity from the Viewpoint of the Personal Information Protection Act"
Publication:Jurist No.1599