Previous Page  36 / 208 Next Page
Information
Show Menu
Previous Page 36 / 208 Next Page
Page Background

[

] 36

vocabulary and foreign words, and use easy-to-understand words

and expressions.

Chapter 2. Safe and reliable information distribution

Article 5 – Privacy

For people to avoid unknowingly connecting to the network and

to prevent spreading unwanted information and knowledge is an

important element in the ubiquitous network society.

In order for people to connect to the network in a reliable way,

it is necessary for individual information to be protected to a

greater extent, such as preventing the leaking of information

related to personal attributes, usage history and illegal usage.

In order to harmonize between the secrecy of communications

and freedom of expression, it is necessary to avoid the transmis-

sion of information that invades the rights of portrait and privacy

to a large number of people and be able to deal with these cases

in a swift manner.

In regard to the installation and use of devices that collect

personal information, such as photographic images and sound

recordings, it is necessary to pay attention to their legitimacy and

operate in a fair and careful manner, such as providing notifica-

tion and displaying information on the existence of devices.

Article 6 – Information security

In the ubiquitous network society, in which all things mutually

connect and there are strong wave effects, we must strive to build

and maintain a safe and robust network against cyber-terrorism

and large-scale emergencies.

It is necessary to impress on all people using the network the

need to correctly perceive the influence that one’s own usage can

have on society, the need to strive to use the network correctly,

taking action against computer viruses and to prevent escalation

of damage.

It is necessary to promote the development of safe information

distribution, such as digital authentication, digital signatures,

encryption and other security technology and establish a struc-

ture where safety can be simply maintained without advanced

security knowledge.

Article 7 – Intellectual property

With the development of digitalization and the network becom-

ing more and more simple to use, the drastic reduction in the

costs of reproduction and distributing information mean that

anyone can obtain content easily. On the other hand however, the

potential for violating the rights of the owner are greatly increased.

In order to encourage the sound development of the ubiquitous

society, it is necessary to both plan for the convenience of the user

and establish a framework for respecting ownership rights.

Through the technical management of content reproduction

and distribution as the rights of the owner are respected, it is

necessary to promote the development and spread of technology

for both securing convenience for the user and stoking the enthu-

siasm of the creator, while at the same time carefully consider

the treatment of technology that causes ownership rights to be

invaded.

Article 8 – Information morality

All people should strive to establish information ethics in order

to prevent obstacles towards the sound development of young

people such as discrimination, crime, violence and child abuse

and work towards the development of appropriate social norms to

contribute to the strengthening of public welfare and social unity.

In addition to refraining from inappropriate use of the network

such as the transmission of illegal and harmful content likely to

cause defamation of character, we must strive to avoid the inter-

ception of illegal and harmful content transmitted by a third party

and aiding the spread of inappropriate use of the network.

Technicians in ICT fields should be conscious that the technol-

ogy in which they deal has great potential for influencing the safety

of people and society, and should follow their consciences when

conducting research and development by working to secure the

safety and reliability of technology. If while conducting research

and development issues that impact on social safety arise, in prin-

ciple they should make public the facts related to this straight away.

Content creators must also be aware of the great impact of the

content they distribute on the network has on society, and follow

their conscience when creating content, to secure the safety and

reliability of it.

Chapter 3. Constructing new social foundations

Article 9 – Harmony between actual society and cyber society

In order to avoid hindering the construction of a legal system for

social information, it is necessary to strive to establish a flexible

system that places emphasis on everyone being able to use in a safe

and secure way. Based on the awareness that despite the ubiqui-

tous network society being different from both the actual society

and the cyber society it has strong ties with both. Therefore it is

necessary to create harmony between actual society and the cyber

society, in order to establish an environment in which the

maximum benefits from the cyber society can be received.

With the emergence of new technologies and services, people

should strive for the smooth realization of a new code based on

social conformity with manners and rules related to the use of

ICT as required, which was not possible to adapt to under the

previous framework.

By embedding mechanisms to alleviate the burden within the

social system and encouraging recycling and energy conservation,

it is important to keep to a minimum any undesirable influences

on the environment and human body and strive to realize a

sustainable society.

Policy objectives and period in which to realize them should

be clarified and in addition to overall optimization from a general

viewpoint, we should review policy flexibility through objective

feedback.

Article 10 – Regional and international harmonious and coopera-

tive systems

Through the use of ICT, a diverse range of bodies across private

enterprise, industry, academia, government, heads of government,

local government, industry, universities, civilian society and NPOs

can contribute to the policy proposal process, and through the

building of cooperative structures from a wide range of angles,

we should place an emphasis on tackling issues.

It is important to clarify the objectives and time frames for real-

izing policies, and in addition to total optimization through a

comprehensive viewpoint, secure flexible reviews of policies

through the feedback of objective evaluations.

The ubiquitous network society has an essentially global nature

that requires effective cooperation from the international society.

It is desirable for all people throughout the world to be able to

access the network, and by receiving the benefits of realizing the

ubiquitous network society, work to increase mutual under-

standing within their own country and adopt a linked approach

throughout the world based on this charter.