Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.6.1549

Study on the Association between Personal Information Protection Legislation and Information Security Product  

Kim, Min-Jeong (Penta Security Systems Inc.)
Lee, Jung Won (Penta Security Systems Inc.)
Yoo, Jinho (Sangmyung Univ.)
Abstract
For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.
Keywords
Personal Information Protection; CC; KCMVP; KISIA;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Kim Seungjoo, "Actual condition of cyber warfare and latest hacking trend," Korea Univ., June. 2013, available : http://www.slideshare.net/skim71/ss-23039901
2 Shin Young Jin, "A study on the improvement of technological protection measures for responding to privacy breaches," Proceeding of Autumn Annual Conference of The Korean Association for Policy Studies, pp. 465-488, Sep. 2013.
3 Young Hee Kim and Kwang Ho Kook, "A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection," The Journal of Society for e-Business Studies, 19(4), pp. 135-150, Nov. 2014.
4 Young Ran Hong and Dongsoo Kim, "Analysis of the Effects of Common Criteria Certification on the Information Security Solutions," Journal of Society for e-Business Studies, 17(4), pp. 57-68, Nov. 2012
5 Personal Information Protection Act
6 Standards on Measures for Securing the Safety of Personal Information
7 Standard Personal Information Guide
8 Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.
9 Enforcement Decree of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc.
10 Guidelines for Information Security Measures
11 Standards on Technical and Administrative Protection Measures for Personal Information
12 Act on the Protection, Use, Etc, of Location Information
13 Enforcement Decree of the Act on Protection & Utilization of Location Information, etc.
14 Manual on Administrative and Technical Protection Measures Recommendation of Location Information
15 Use and Protection of Credit Information Act
16 Enforcement Decree of Use and Protection of Credit Information Act
17 Rules for Regulation of Electronic Financial Supervision
18 Regulation of Credit Information Business Supervision
19 Electronic Financial Transactions Act
20 Regulation of Electronic Financial Supervision
21 National Cyber Security Center, available: http://service1.nis.go.kr/certify/convenanceSummary.jsp
22 Ji Sun Kim, "A Study of CC for Privacy Management System," Master Thesis, Sungkyunkwan Univ., June. 2011.
23 IT Security Certification Center, http://www.itscc.kr/appraisal_2.asp
24 KISIA, available: http://www.kisia.or.kr/