MONOLITH LAW OFFICE+81-3-6262-3248Weekdays 10:00-18:00 JST

MONOLITH LAW MAGAZINE

IT

Requirement of License Display when Using AGPL's Open Source Only on the Server Side

Requirement of License Display when Using AGPL's Open Source Only on the Server Side

The internet has become an indispensable part of our lives, with software being utilized in various aspects.When using software, it is necessary to...

IT

Is Crawling Images on the Internet a Violation of Copyright Law? Explaining the Legal Issues of Machine Learning

Is Crawling Images on the Internet a Violation of Copyright Law? Explaining the Legal Issues of .

In recent years, the advancement of AI (Artificial Intelligence) technology has been remarkable, and various AIs such as image generation AIs like ...

IT

Even with a 500 Million Yen Compensation Verdict... What is the Legal Responsibility of Fast Movies? A Lawyer Explains Criminal and Civil Liability

Even with a 500 Million Yen Compensation Verdict... What is the Legal Responsibility of Fast Mov.

There has been growing concern over the illegal video content known as "Fast Movies," which are edited down to approximately 10 minutes. "Fast Movi...

IT

Breaking News: The Japanese Personal Information Protection Commission Issues a Warning Regarding the Use of ChatGPT

Breaking News: The Japanese Personal Information Protection Commission Issues a Warning Regardin.

Generative AI services, including ChatGPT, are rapidly gaining popularity in our country. However, issues have been raised regarding the handling o...

IT

Key Points to Check in Contract Documents for Contracted System Development

Key Points to Check in Contract Documents for Contracted System Development

Japan's Ministry of Economy, Trade and Industry (METI) has provided model clauses for IT system development contracts in its "Guidelines for Improv...

IT

Post-development Support Obligations of a Software Company for a System Development Project

Post-development Support Obligations of a Software Company for a System Development Project

In the field of system development, it is well known that software companies, who are specialists in system development, bear a "Project Management...

IT

Explaining the Application of the Japanese Subcontract Act to System Development and Penalties for Violation

Explaining the Application of the Japanese Subcontract Act to System Development and Penalties f.

In the IT industry, when a system developer outsources development to another developer, it is common to enter into a business outsourcing contract...

IT

What is Liability for Non-Conformity in System and Software Development Contracts? Explaining the Amendments

What is Liability for Non-Conformity in System and Software Development Contracts? Explaining th.

What should you do legally if there is an error after the delivery of the system you ordered?If the operation is difficult, the processing speed is...

IT

An Attorney's Explanation on Penalties and Statute of Limitations on the Japanese Act on Prohibition of Unauthorized Computer Access

An Attorney's Explanation on Penalties and Statute of Limitations on the Japanese Act on Prohibi.

As PCs and smartphones become more prevalent, and our dependence on the internet increases, cybercrimes such as unauthorized access are on the rise...

IT

What are the Three Categories of Cybercrime? A Lawyer Explains the Countermeasures for Each Pattern

What are the Three Categories of Cybercrime? A Lawyer Explains the Countermeasures for Each Patt.

"Cybercrime" is a term that has become somewhat common in everyday language, but internationally, it is defined as "crimes exploiting computer tech...

IT

What are the Cooperative Duties Borne by the User Side as the Orderer of System Development?

What are the Cooperative Duties Borne by the User Side as the Orderer of System Development?

The task of system development, especially for large-scale systems, requires a significant amount of manpower and time. Therefore, not only the ven...

IT

Details and Violation Examples of the Japanese Act on Prohibition of Unauthorized Computer Access

Details and Violation Examples of the Japanese Act on Prohibition of Unauthorized Computer Acces.

The Unauthorized Computer Access Law (officially known as the "Law Concerning the Prohibition of Unauthorized Computer Access") is a law enacted wi...

IT

What are Crypto Assets? Detailed Explanation of Legal Definitions and Differences from Electronic Money

What are Crypto Assets? Detailed Explanation of Legal Definitions and Differences from Electroni.

In recent years, there has been a growing interest in "crypto assets," but there may be few people who accurately understand what "crypto assets" a...

IT

Key Points for Modifying B2B Cloud Service Terms of Use in Accordance with the Civil Code Amendment on Standard Contract Rules

Key Points for Modifying B2B Cloud Service Terms of Use in Accordance with the Civil Code Amendm.

The revised Civil Code (Japanese Civil Code) was implemented on April 1, 2020. In this revision, the rules regarding contracts have been significan...

IT

What are the Project Management Obligations in System Development?

What are the Project Management Obligations in System Development?

System development is a process that can only progress through mutual cooperation between the user who orders the work and the vendor who receives ...

IT

Distinguishing and Understanding the Differences Between Contracting and Quasi-Mandate Contracts in System Development

Distinguishing and Understanding the Differences Between Contracting and Quasi-Mandate Contracts.

In the process of ordering and receiving system development, various contracts with different titles are exchanged, such as the contract agreement,...

IT

Return to Top