• Title/Summary/Keyword: 개인정보삭제

Search Result 121, Processing Time 0.022 seconds

Security Prism : Privacy Lounge (정보통신망법과 법인의 책임)

  • No, Hwan-Cheol
    • 정보보호뉴스
    • /
    • s.137
    • /
    • pp.50-53
    • /
    • 2009
  • 최근 기업의 영업활동보장을 위해 각종 규제와 규정은 삭제되거나 완화되는 추세이며, 심지어 기업에 대한 형사처벌규정인 양벌규정까지 폐지하자는 논의가 있다. 그러나 개인정보보호 관련 규제와 규정은 전혀 다르다. 2008년에 유출사고가 연이어 발생하면서 '정보통신망 이용촉진 및 정보보호에 관한 법률'이 전면개정 되고, '개인정보보호법' 신설 움직임이 진행되는 등 개인정보보호 영역에서는 기업의 영업활동에 영향을 미치는 규제와 법률은 강화되고 있다. 본 기고는 두 법 중 2008년 12월부터 시행되어 법적효력을 가지고 있는 '정보통신망 이용촉진 및 정보보호에 관한 법률(이하 정보통신망법)'의 개정내용이 기업체에 미치는 영향에 대해 소개하고자 한다.

  • PDF

Recovering RSA Private Key Bits from Erasures and Errors (삭제와 오류로부터 RSA 개인키를 복구하는 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.951-959
    • /
    • 2017
  • Under the assumption that there is available some additional information other than plaintext-ciphertext pairs, the security of the RSA cryptosystem has been analyzed by the attack methods such as the side-channel attacks and the lattice-based attacks. Recently, based on the data retention property of the powered-off DRAMs, the so called cold boot attack was proposed in the literature, which is focusing on recovering the various cryptosystems' key from some auxiliary information. This paper is dealing with the problem of recovering the RSA private key with erasures and errors and proposes a new key recovery algorithm which is shown to have better performance than the previous one introduced by Kunihiro et al.

안전한 전자화폐를 위한 정보보호 기술

  • Park, Seong-Jun
    • 정보화사회
    • /
    • s.111
    • /
    • pp.26-30
    • /
    • 1997
  • 정보사회가 고도화될수록 통신정보의 불법적인 도청과 함게, 원거리 엑세스에 발생되는 개인식별 문제, 컴퓨터 정보의 무단삭제 및 변조 등의 무결성 문제가 심각한 문제로 대두되고 있다. 이런 문제를 해결하는 암호기술이 정보보호 프로토콜(Cryptographic Protocol:또는 암호 프로토콜)분야이다.

  • PDF

The Right To Be Forgotten and the Right To Delete News Articles A Critical Examination on the Proposed Revision of The Press Arbitration Act (기사 삭제 청구권 신설의 타당성 검토 잊힐 권리를 중심으로)

  • Mun, So Young;Kim, Minjeong
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.151-182
    • /
    • 2016
  • The right to be forgotten (RTBF) has been a population notion to address privacy issues associated with the digitalization of information and the dissemination of such information over the global digital network. In May 2014, the European Court of Justice (ECJ) laid down a landmark RTBF decision to grant individuals the right to be de-listed from search results. ECJ's RTBF decision sparked an increased interest in RTBF in South Korea. Academic and non-academic commentators have provided a mistaken or outstretched interpretation of RTBF in claiming that removal of news articles should be read into RTBF in Korean law. Moreover, the Press Arbitration Commission of Korea (PAC) has proposed revising the Press Arbitration Act (PAA) to allow the alleged victims of news reporting to request the deletion of news stories. This article examines the notion of RTBF from its origin to the latest development abroad and also critically explores Korean laws regulation freedom of expression to evaluate if Korea needs the proposed PAA revision.

  • PDF

A Study for Applicating and Introducing the Right to be Forgotten (잊혀질 권리의 도입과 적용에 관한 연구)

  • Seo, Yunhee;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.23-28
    • /
    • 2016
  • As a large portal sites are beginning to replace the function of the mass media, new risks began to raise. It remained without being deleted that data written to the internet was a serious privacy problem occurs. The sensitive information was inferred based on the personal data recorded in the past and also another personal information leakage itself. Witch-hunt through the personally identifiable rob has emerged as a serious social problem and damage to the parties not be able to live a normal life. In this paper, we propose the study on the need for a 'right to be forgotten' to delete the personal information relating to on-line through international case studies and activation measures. At the same time, we proposed improvement measures, such as encryption management, ownership inheritance, and blind treatment.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

Study on Decision-making and Control of Personal Data Posted on the Internet (인터넷에 올라와 있는 개인정보의 자기결정권과 통제권에 관한 연구)

  • Yoon, KyungBae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.227-232
    • /
    • 2014
  • Recent development and generalization of Internet technology contributes to the large scale of commerce and capital followed by appearance and growth of large portal sites. As a result, the personal data on the Internet not deleted for a long period of time is a new risk factor, for example, the invasion of people's privacy. In particular, exposing personal data like witch-hunts is a critical issue so that the person concerned cannot carry on with normal life. This study suggests the necessity of the right to request personal data deletion related to a person concerned on Internet sites, a method of introducing the right in Korea, and a method of improving the application.

신(新)기술(빅데이터) 등장에 따른 경제적 파급효과 및 법(규제) 연구

  • Lee, Gyu-Cheol;Won, Hui-Seon
    • Information and Communications Magazine
    • /
    • v.29 no.11
    • /
    • pp.48-54
    • /
    • 2012
  • 정보통신 기술은 아날로그 산업에서 디지털 산업을 거쳐 현재는 스마트 산업으로 이어지는 수단으로 활용되어 왔다. 특히 산업 사회생활에서 문서로 직접 주고받던 환경에서 메일, 전자문서 교환 등으로 바뀌면서 편리성과 비용절감을 통해 산업 사회생활 발전에 기여하고 있다. 최근 빅데이터 기술은 대용량 정보를 분석하여 기상예측, 신약개발, 유전자 분석 등의 다양한 분야에 활용되고 있다. 그러나 대용량 정보 안에는 개인 식별을 할 수 있는 정보가 포함되어 있어, 빅데이터 기술을 바로 적용하기에는 개인정보보호법이 정하는 개인정보보호 이용에 관한 법률에 대한 준비가 미흡한 실정이다. 예를 들어 공공기관의 데이터를 활용하여 날씨 예측, 재난 방재 서비스 등을 통해 국민의 삶을 제고함과 동시에 경제적으로 많은 이익을 가져올 수 있다. 그러나 개인정보를 타인이 악의적으로 이용할 수 있어 개인에게 경제적, 정신적 피해를 줄 수 있다. 또한 개인정보의 노출은 과거와 달리 삭제되거나 잊혀지지 않고 영구적으로 재사용이 가능하기 때문에 이를 사전에 막을 수 있는 방법이 필요하다. 이에 본고는 빅데이터 등장에 따른 시장구조 변화 및 경제적 파급효과를 분석하고, 법리적 분석을 바탕으로 빅데이터 기술이 올바르게 시장에 정착할 수 있은 법(규제)방안을 제시하고자 한다.

Right to delete and Right to be forgotten -Discuss on the condition of the right to delete (기사삭제 요구권과 잊혀질 권리 - 기사삭제의 인정기준에 관한 논의)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.13-22
    • /
    • 2014
  • The right to be forgotten is a world-wide issue after the decision of the European Court of Justice which accepted that right. This essay discusses about the guide lines for protecting the right to delete, a category of the right to be forgotten. I classified those guide lines as follows : (1) sensitiveness of the personal information, (2) offensiveness to reasonable and ordinary people, (3) intention of writing the article, (4) value of historical record, (5) importance of privacy comparing with right to know with time flow, (6) public figure, (7) article based on fact or opinion. To effectively protect right to be forgotten and delete, we have to consider Privacy Impact Assessment, using blind system, unification of multiple institutions, and reforming press arbitration system.

A Study on the realization of the right to be forgotten on social normative context: focusing on comparison of Korea-US-EU and the legal, technical, and service market (사회규범적 맥락에서 본 잊혀질 권리의 다차원적 실현범위 연구: 한-미-EU 비교 및 법제, 기술, 서비스 시장의 비교를 중심으로)

  • Shim, Mina
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.141-148
    • /
    • 2018
  • The purpose of this paper is to explore the scope of realization of multiple perspectives so that the implementation of the right to be forgotten is more realistic than the ideal information deletion concept. We examined domestic and foreign legal system and technology/service trends, and reflected the classification realization level of service realization, processing type and information characteristics of personal information processor, and legislative/technical factors for multi-level scope analysis. As a result, we have presented a matrix of the range of realization of the right to be forgotten and the scope of diversified regulation by the subject of protection. This study will be extended to the convergence of law and engineering, and will contribute to the prediction of social costs and expansion of the market by identifying the scope of 'deletion rights'.