• Title/Summary/Keyword: "개인정보보호법"

Search Result 183, Processing Time 0.02 seconds

A study on Utilization of Big Data Based on the Personal Information Protection Act (개인정보보호법에 기반한 빅데이터 활용 방안 연구)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.87-92
    • /
    • 2014
  • We have noted a possibility of big data as a solution of social problem and pending issue. At the same time big data has a problem of privacy. Big data and privacy were in conflict. In this paper we pointed out that issue and propose a planning of big data based on privacy using case study of advanced country.

개인정보보호를 위한 관리체계와 거버넌스

  • Kim, Jung-Duk
    • Review of KIISC
    • /
    • v.18 no.6
    • /
    • pp.1-5
    • /
    • 2008
  • 개인정보보호가 단순히 개인의 권익에 관한 문제로 국한되지 않고, 기업의 사활을 좌우하는 이슈로 대두되고 있다. 또한 개인정보의 활용과 보호라는 두 가지 상충되는 기업 내 목표와 관련 개인정보보호법이나 규정 준수 등 대내외 요구사항을 만족시켜야 한다. 기업 내 개인정보보호활동의 효과성을 높이기 위해서는 현재 산발적으로 진행되는 개인정보 영향평가 등 단순 기법이나 정보유출방지 솔루션 도입 등의 접근방법으로는 한계가 있으며 새로운 접근방법이 필요하다. 본 고에서는 일상적 관리활동의 하나로서 개인정보보호를 위한 관리체계의 필요성과 관리과정을 소개하며 이를 평가, 지시 및 모니터링 할 수 있는 거버넌스의 목표와 중요성에 대해 기술한다.

일본 개인정보보호법제 정비동향에 관한 고찰

  • 김현수;박춘식
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.96-103
    • /
    • 2003
  • 정보화사회의 진전에 따라 일본은 개인정보보호법제의 정비에 착수하여, 2003년 5월 30일에 '개인정보보호 관련 5법안'을 공포하였다. 금번 법제정비의 가장 큰 특징은 공공부문과 민간부문을 포괄하는 개인정보보호 관련 기본법제를 제정함으로써, 국가차원의 종합적ㆍ일체적 개인정보보호 체계를 구축한 것이라고 할 수 있다. 본 논문에서는 최근 국내에서 대두되고 있는 개인정보보호법제 정비의 움직임이 일고 있는 가운데 유용한 자료가 될 수 있는 일본의 개인정보보호법제 정비 과정과 새로이 성립된 개인정보보호 관련법제의 주요내용을 살펴본다.

A Study on Privacy Framework for Prevention Leakage (개인정보 유출방지 프레임워크에 관한 연구)

  • Lee, Yari
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.503-504
    • /
    • 2017
  • 현대 사회는 정보화에 따른 혜택과 더불어 부작용 현상으로 개인정보의 유출 사고로 사회적 불안감 및 관심을 증가시키고 있다. 우리나라 "개인정보보호법"은 공공, 민간 부문의 모든 개인정보 처리자에게 공통으로 적용되고 전자문서와 수기문서에도 적용된다. 그러나 업무특성에 따라 여러 곳에 다양한 형태로 산재되어 있는 개인정보 관리는 쉽지 않으며 정보 유출에 대한 우려 또한 크다고 볼 수 있다. 따라서 본 연구에서는 체계적인 개인정보 보호 관리를 통해 사전에 정보 유출을 방지할 수 있는 개인정보 유출방지 프레임워크를 제안하였다.

  • PDF

The Protection of Privacy and the Restriction of Its Commercial Use in Telecommunications (통신산업에서 개인정보의 보호와 영업적 이용의 한계)

  • Hong, Myung-Su
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.303-335
    • /
    • 2011
  • The rapid changes in telecommunications have exercised an important influence on the telecommunications law system, including the protection of the privacy. It was a decisive assignment that telecommunications law protected the confidentiality of privacy. But in new digitalized telecommunications circumstance, every steps of the conveyance of the individual informations should be protected, in particular by telecommunications carriers as a subject of the protection of information. EU Privacy Directive in 2003 and the amendment of Communications Act in U. S. A. in 1996 have reflected the necessity of the privacy from a new point of view. In Korea, "Protection of Privacy Act" has been established as general law as to the protection of privacy and "Electronic Communications Net-work Act" and "Location Data Act" have been functioned as special law in telecommunications, and these laws have developed the legal systems about the protection of privacy in telecommunications. Such a legal system could be affirmatively evaluated. But the regulations should be reformed in a way that corresponds to the detailed types of the privacy and it should be devised a method, that the consent of users could be fulfilled practically.

A Study on Laws Related to Anonymization of Medical Image Information in PACS (PACS에서 의료영상정보의 익명처리와 관련된 법의 연구)

  • Kweon, Dae Cheol
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.5
    • /
    • pp.627-637
    • /
    • 2022
  • The purpose of this study is to comply with the operation and management of medical image information in PACS, the necessity of anonymizing the patient's personal information and the management status of the medical image information related to the personal The purpose of this study was to raise, discuss, and suggest the need for unification and coherence of the law by studying the content of the issues related to information related laws. In order to utilize information related to medical image information, it is necessary to unify the "Medical Act" or the "Bioethics Act" for clear legal application and consider the legal system's consistency. Since there is a possibility of conflict due to issues that are not yet established, systematic coherence of the law is required to find the basic common denominator for the utilization and use of medical image information and to harmonize the law. In addition, the necessity of enacting the "Medical Information Protection Act" that can be practically applied and easily practiced by medical personnel and managers in the clinical field so that sensitive matters of medical image information and personal information can be protected and managed in a specific and systematic way.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

A case study of Privacy Impact Assessment -Focus on K hospital Privacy impact assessment case- (개인정보 영향평가 사례 연구 -K병원의 영향평가 사례를 중심으로-)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.149-157
    • /
    • 2012
  • Recently, many corporations and public institutions are busy preparing and providing measures in dealing with new privacy information law. This study reviews privacy impact assessments in order to perform preventing and diagnosis against potential threats focus on the K-hospital case. The quality of protection in K-hospital shows that the corporations itself is 79.0, the system is 97.0, the life cycle of the privacy is 67.4 and CCTV is 90.0. The lowest levels are saving and keeping 50.0, usage and offer 64.1 and destruction 66.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are controlling for privacy 11.0, saving and keeping 12.5 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

A study on the issue of the game shutdown: a privacy information protection perspective (개인정보보호관점에서의 게임셧다운제의 문제점)

  • Kang, Jun-Hee;Cha, Sang-Jin;Jo, Geun-Sik
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.11-14
    • /
    • 2012
  • 지난 11월 20일부터 시행 중인 청소년 보호법이 요즘 이슈가 되고 있다. 이는 그것은 바로 여성 가족부에서 추진 중인 '게임 셧 다운제'이다. 청소년들의 수면권과 학습권을 보호하자는 것인데, 학교에 다니는 청소년들이 방과 후 학원을 거쳐 늦은 시간에 귀가하면, 곧바로 수면이 아닌 온라인 게임을 하느라 제대로 된 휴식을 취하지 못한다는 것이다. 게임 셧 다운제는 만 9세 이상 16세 미만의 청소년을 자정부터 다음날 오전 6시까지 온라인 게임에 접속을 차단하는 것인데, 기존에 있는 정책들과 대립되는 문제가 있다. 본 논문에서는 게임 셧 다운제의 문제점에 대해 연구하는 것을 목적으로 한다.

  • PDF