This website is operated by secretariat of Advanced Cyber Threats response InitiatiVE (ACTIVE), which is public-private partnership project for prevention of malware infection and removal of malware by the Ministry of Internal Affairs and Communications.
Links may freely be made to the ACTIVE website.
a. The user must cite the source when using the Content. Sources should be cited in the following manner:
(Examples of source citation)
Source: ACTIVE website (URL of the relevant page)
Source: Activity Report XX (URL of the relevant page)
b. If you have edited the Content for use, you must include a statement expressing that the content has been edited, in addition to the abovementioned source citation. Making public or using edited information in a format that may be misconstrued as having been created by secretariat of Advanced Cyber Threats response InitiatiVE is prohibited.
(Example of citation when using edited content)
Created by editing the Activity Report XX (URL of the relevant page)
Created by Company YY based on Activity Report XX (URL of the relevant page)
a. In some cases, a third party (refers to a party other than secretariat of Advanced Cyber Threats response InitiatiVE. Hereinafter referred to as "Third Party") may hold copyrights or other rights to a part of the Content. For Content where a Third Party holds copyrights or other rights (e.g. portrait rights in a photograph, publicity rights etc.), it is the responsibility of the user to obtain consent for use from the Third Party unless there is explicit indication that the rights have already been cleared.
b. If a Third Party holds rights to a part of the Content, said fact may be directly or indirectly stated or indicated through source citations, but in some cases the part of the Content to which the Third Party holds the rights may not be clear or may not be explicitly stated. It is the responsibility of the user to confirm the rights pertaining to use of the Content.
c. Even if a Third Party holds copyrights to the Content, some use of the Content, such as quoting, may be allowed without the consent of the copyright holder, under the Copyright Act of Japan.
a. The Content must not be used in the following ways:
(a) Usage that violates laws and ordinances, regulations, or public policy *
(b) Usage that represents a threat to the safety of the state and/or its citizens
* Usage violating public policy means criminal use, use that is contrary to moral principles (marital order, sexual morality), use that severely restricts personal freedom, profiteering or unfair dealings etc.
a. Secretariat of Advanced Cyber Threats response InitiatiVE bears absolutely no responsibility for any action taken by the user involving the use of the Content (including use of information based on edited Content).
b. The Content may be modified, moved or deleted without prior notice.