Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Consent & Cookies under the Japanese Amended APPI

Download: Consent Report Q2 2024
Published April 21, 2022
Author

Maria Khan

Data Privacy Legal Manager at Securiti

FIP, CIPT, CIPM, CIPP/E

Listen to the content

On 1 April 2022, the Japanese Amended Act on the Protection of Personal Information (APPI) came into force bringing significant changes to its breach internal procedures, cross-border data transfer, and cookie consent requirements among other changes. This article examines cookie consent requirements under the Amended APPI.

The Amended APPI strengthens the protection of data subjects’ rights relating to the transfer of their personal data to third parties. As a general rule, the Act requires organizations to obtain the data subject’s consent before transferring any personal data to third parties. However, it also allows organizations to rely on an opt-out consent mechanism where consent can be implied if adequate notice is given to data subjects and they are provided the option to object or opt-out. It is not explicitly clear in the law whether an organization should obtain opt-in consent or rely on an opt-out mechanism for the use of cookies, especially third-party cookies.

Opt-in consent refers to the explicit consent requirement where data subjects are given equally prominent options of accepting and rejecting the processing of their data. Opt-out consent on the other hand refers to the situation where the user’s consent is assumed by default and organizations allow data subjects to opt-out or object to the processing of their data.

The Amended APPI has introduced a new category of personal data, personally referable information (PRI). The PRI is different from Personal Information in that it does not directly identify individuals; rather the identification of individuals is possible only with the aid of additional data elements. And once PRI is linked with additional data elements, the PRI can become PI. Accordingly, third-party cookies can be classified as PRI as when combined with identifiers and other information received by the servers, they are able to create profiles of website users and identify them. So is the case with IP address, location data, information exchanged on DMPs (data management platforms) containing identifier information, and similar tracking technologies, all of which can be considered as PRI. The Amended APPI law requires opt-in consent for the use of PRI and therefore, an opt-in cookie consent banner is advised to companies making use of third-party advertising cookies (cookies related to targeted advertisements and marketing) and social plug-in tracking cookies.

Under the Amended version of the law, organizations can rely on an opt-out mechanism for the transfer of personal information (PI) to third parties provided they provide adequate notice to data subjects as well as the regulatory authority PPC and allow data subjects to object or opt-out. PI refers to information relating to a living individual that can identify specific individuals. However, organizations cannot rely on an opt-out consent mechanism for the use of third-party cookies and similar tracking technologies since those are classified as PRI and not PI and the opt-out exception only pertains to the transfer of PI. Moreover, the opt-out consent mechanism is also not possible for the processing of any special care-required personal information (SPI), sensitive personal data such as an individual’s race, creed, social status, medical history, and criminal record. In any case, organizations are not allowed to use deception or any fraudulent means to obtain the data subject’s consent.

What organizations must do?

In light of the above, it is clear that the Japanese privacy law has attempted to strengthen its consent requirements. Similar to the GDPR, it has supported the notion of an opt-in consent for online identifiers. On the other hand, the Amended law has reaffirmed the transparency principle by requiring organizations to notify data subjects before the transfer of their personal information to third parties. Keeping in consideration the consent requirements of the Amended APPI, organizations aiming to comply with Japanese law are advised to be cautious of their consent collecting practices. At the very least, organizations must:

How Securiti can help?

Securiti’s Universal Consent Management Solution enables marketers to adequately advertise and market their products in a compliant manner by capturing consent and automating revocation. Securiti’s Cookie Consent Banner Solution enables companies to build cookie consent banners in accordance with the applicable legal requirements when collecting personal data for non-essential purposes on digital properties.

Ask for a DEMO today to understand how Securiti can help you comply with the applicable legal requirements of global data privacy laws and regulations with ease.


Frequently Asked Questions (FAQs)

Yes, cookie consent is required in Japan. The Act on the Protection of Personal Information (APPI) in Japan mandates that organizations obtain user consent before collecting and using personal information, including through cookies.

The Act on the Protection of Personal Information (APPI) is Japan's privacy law. It regulates the handling of personal information by businesses and requires organizations to implement measures to protect individuals' privacy.

The General Data Protection Regulation (GDPR) is a European regulation, while the Act on the Protection of Personal Information (APPI) is Japan's privacy law. They have different scopes, requirements, and jurisdictions.

Cookie laws in Japan are primarily governed by the Act on the Protection of Personal Information (APPI). Organizations must inform users about the use of cookies and obtain their consent before collecting personal information through cookies.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

Identify Toxic Combinations of Risks View More

Identify Toxic Combinations of Risks: Detect & Prioritize Alerts Intelligently

Enterprise security teams navigate a complex security stack, relying on a diverse suite of specialized yet siloed security tools. Picture a typical enterprise SOC...

View More

From Trial to Trusted: Securely Scaling Microsoft Copilot in the Enterprise

AI copilots and agents embedded in SaaS are rapidly reshaping how enterprises work. Business leaders and IT teams see them as a gateway to...

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Understanding Saudi Arabia’s Global AI Hub Law View More

Understanding Saudi Arabia’s Global AI Hub Law

Gain insights into Saudi Arabia’s Global AI Hub Law - a legal framework for operating various types of data centers referred to as Hubs....

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Managing Privacy Risks in Large Language Models (LLMs) View More

Managing Privacy Risks in Large Language Models (LLMs)

Download the whitepaper to learn how to manage privacy risks in large language models (LLMs). Gain comprehensive insights to avoid violations.

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New