DOI QR코드

DOI QR Code

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology

인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구

  • Choi, Younsung (Department of Cyber Security, Howon University) ;
  • Kwon, Oh-Geol (Department of Law, Kyungpook National University) ;
  • Won, Dongho (Department of Computer Engineering, Sungkyunkwan University)
  • Received : 2015.09.24
  • Accepted : 2015.11.11
  • Published : 2016.04.30

Abstract

Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

인터넷 쿠키은 HTTP에 내재된 비연결성 문제를 해결하고 인터넷 서버에서 사용자의 상태를 파악할 수 있게 하여, 사용자에게 적합한 서비스를 제공할 수 있게 해주는 유용한 기술이다. 하지만 제 3자 쿠키와 슈퍼 쿠키와 같이 인터넷 쿠키 기술이 보다 정교해지고 쿠키에 포함시킬 수 있는 정보를 이용하여 광고나 타깃 마케팅에 응용하게 되면서, 사용자 개인의 다양한 정보가 과도하게 수집되는 문제가 발생하고 있다. 하지만 쿠키 정보는 우리 법률상에서 개인정보로 취급받고 있지 못하여, 사용자는 자신의 쿠키 데이터에 어떠한 정보가 저장되고 있는지 혹은 어디에 응용되는지 명확히 확인할 수 없는 실정이다. 이에 본 논문에서는 인터넷 쿠키로 인해서 발생하고 있는 문제를 해결하기 위해서, 먼저 인터넷 쿠키에 대해서 알아보고 이로 인해서 발생하는 프라이버시 및 잊혀질 권리에 대한 침해에 대해서 살펴본다. 그리고 인터넷 쿠키 정보와 법률상의 개인정보와의 관계에 대해서 분석하고, 이를 통하여 인터넷을 편리하게 이용하기 위해, 인터넷 쿠키를 안전하게 사용하기 위한 필요한 기술상 및 법률상의 개선사항에 대해서 알아본다.

Keywords

References

  1. Kristol, David M., and Lou Montulli. "HTTP state m anagement mechanism.", 2000. http://tools.ietf.org/html/rfc2965
  2. Mi-Hyang Yang, Donghoon Lee and Dongho Won " Risk Analysis for the Web Cookies used in Collecting Internet User's Behavior Information", 2014 Korean Society for Internet Information Conference, pp.117-118, 2014. http://www.dbpia.co.kr/Article/NODE0 6140774
  3. Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2008. https://w2.eff.org/Privacy/AOL/ exhibit_d.pdf
  4. Joobong Jang, "The Meanging and Protection Scope of Personal information", Law Review, pp.34-64, 2012. http://www.dbpia.co.kr/Article/NODE02110932
  5. Turkington, Richard C. "Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Cons titutional Right to Informational Privacy." N. Ill. UL Rev. 10, pp.479, 1989. http://heinonline.org/HOL/Lan dingPage?handle=hein.journals/niulr10&div=25&id= &page=
  6. Wankyu Park, "Some Thoughts on the Advancement of Science Technology and the Changes of Privacy protection criteria", Kyungpook Natl. Univ. Law Journal Vol.49, pp.33-62, 2015. http://www.dbpia.co.kr/ Article/NODE06218383
  7. Prosser, William L. Law of torts. 1971. http://www.jstor.org/stable/42890338
  8. Junwoo Park, "A Comparative Study on the protecti on of privacy" Law Review on Industrial Property Right, 37, pp.301-335, 2012. http://www.dbpia.co.kr/ Article/NODE01843104
  9. Microsoft, "Maintaining session state with cookies". Microsoft Developer Network. Retrieved 2012.10.22.
  10. Filings, Regulatory. "Tracking the trackers: Microsoft advertising.", cyberlaw.stanford.edu, 2011. https://cyb erlaw.stanford.edu/comment/613
  11. Debussere Frederic, "The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?" International Journal of Law and Information Technology, 13(1), pp. 73-76, 2005. http://www.law.kuleuve n.be/citip/en/docs/publications/657fredericdebussereco okies2f90.pdf
  12. Haksoo Ko, Sangmin Lee, "Analysis on the state ha d collected private information of local Internet sites ", Law and economics research, Society on Law and Economic, 10(2), pp.181-216, 2013. http://scholar.dk yobobook.co.kr/searchDetail.laf?barcode=4010023665 302
  13. Ashkan Soltani, Shannon Canty, Quentin Mayo, Laur en Thomas, and Chris Jay Hoofnagle, "Flash Cooki es and Privacy." AAAI Spring Symposium: Intellige nt Information Privacy Management", 2010. http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/downloa d/1070/1505/
  14. Ayenson, Mika, Mika D Ayenson, Dietrich James W ambach, Ashkan Soltani, Nathan Good, Chris Jay Ho ofnagle , "Flash cookies and privacy II: Now with H TML5 and ETag respawning." Available at SSRN 18 98390, 2011. http://papers.ssrn.com/sol3/papers.cfm?a bstract_id=1898390
  15. Minjung Kim, Jonggeun An, Heesook Yoon, "The legal issues on Infringement of Personal Information through Cookies used in the Internet", Legal research, 24, pp. 79-103, 2006. http://www.dbpia.co.kr/Artic le/NODE01964576
  16. Google privacy policy(Cookie and other similar tech nology, https://www.google.com/policies/privacy/
  17. Soltani, Ashkan, Andrea Peterson, and Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking." The Switch. The Washington Post 10, 2013. https://www.washingtonpost.com/news/the-switch/ wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-ta rgets-for-hacking/
  18. Sung Jai Choi, A Study on the Two Sided Markets Theory and its Role in the Korean Antitrust Law inc lusive of Google's acquisition of Double Click, Korean competition law association 17. pp.225-265, 2008. http://www.competitionlaw.or.kr/board.php?kind=vie w&uid=184&page=1&tname=1225985138&s_per=100
  19. Fomitchev, Max I. "How google analytics and conve ntional cookie tracking techniques overestimate uniq ue visitors." Proceedings of the 19th internat ional conference on World wide web. ACM, 2010. http://dl.acm.org/citation.cfm?id=1772820
  20. Rosen, Jeffrey. "The right to be forgotten." Stanford law review online 64, 2012. http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotte n?em_x=22
  21. Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey: Princeton University Press, 2009. ISBN: 9780691150369
  22. Eunbyul Ko et al., Comparison of 'right to be forgotten' implemented in Korea and eu, Communication of the Korea Information Science Society 30(10), pp. 34-41, 2012. http://www.dbpia.co.kr/Article/NODE01984087
  23. Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&
  24. Hillyard, Daniel, and Mark Gauen. "Issues around th e protection or revelation of personal information." Knowledge, Technology & Policy 20.2 pp.121-124, 2007. http://link.springer.com/article/10.1007/s12130- 007-9013-9#page-1