• Title/Summary/Keyword: 개인정보 보호법

Search Result 187, Processing Time 0.029 seconds

A Study for Limitations and Improvement of Information Security Management System (정보보호 관리의 한계점과 개선방안에 관한 연구)

  • Lee, Sujin;Choi, Sang-Yong;Kim, JaeKyoung;Oh, ChungShick;Seo, Changho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.563-570
    • /
    • 2014
  • As information security is becoming more important today, efforts in managing information security more efficiently is becoming greater. Each department such as Ministry of Security and Public Administration, Ministry of Science, Ministry of Education, National Intelligence Service, etc. is established screening criteria for information security and conducted the evaluation. Various information security certification and evaluation for public institutions effectively help to improve the level of information security. However, there are limitations of efficient security management because the examination to be performed frequently by each department. In this paper, we analyze screening criteria of the information security management that is being conducted in the public institutions. We also present limitations of information security management and the direction of improving the limitations.

A Study on the Legal and Institutional Improvement Plan for Cyber Correspondence (사이버 대응태세 구축을 위한 법·제도적 개선방안 연구)

  • Lee, Yong Seok;Lim, Jong In
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.61-66
    • /
    • 2019
  • Cyber space is a place where free activities are guaranteed. However, it is also true that not all individuals and countries strive for peaceful cyberspace, and that there is a growing tendency to gain unfair advantage through this space. Therefore, the state should reform laws and institutions to keep cyberspace safe. By establishing the "Basic Law on Cyberspace" which includes the law of the state law on cyberspace, it is necessary to be able to recognize and respond to the direction of the national legal discipline on cyberspace. The development of digital forensics is an urgent task due to the rapid development of IT. However, if the law is delayed for various reasons, some of the existing laws should be amended to improve the stability of the law in accordance with the circumstances. To this end, it is necessary to revise the "Information and Communication Infrastructure Protection Act", "Information and Communication Network Enhancement and Information Protection Act", "Integrated Defense Law", "Establishment of Defense Information Infrastructure Infrastructure and Defense Information Resource Management Act".

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

The Right To Be Forgotten and the Right To Delete News Articles A Critical Examination on the Proposed Revision of The Press Arbitration Act (기사 삭제 청구권 신설의 타당성 검토 잊힐 권리를 중심으로)

  • Mun, So Young;Kim, Minjeong
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.151-182
    • /
    • 2016
  • The right to be forgotten (RTBF) has been a population notion to address privacy issues associated with the digitalization of information and the dissemination of such information over the global digital network. In May 2014, the European Court of Justice (ECJ) laid down a landmark RTBF decision to grant individuals the right to be de-listed from search results. ECJ's RTBF decision sparked an increased interest in RTBF in South Korea. Academic and non-academic commentators have provided a mistaken or outstretched interpretation of RTBF in claiming that removal of news articles should be read into RTBF in Korean law. Moreover, the Press Arbitration Commission of Korea (PAC) has proposed revising the Press Arbitration Act (PAA) to allow the alleged victims of news reporting to request the deletion of news stories. This article examines the notion of RTBF from its origin to the latest development abroad and also critically explores Korean laws regulation freedom of expression to evaluate if Korea needs the proposed PAA revision.

  • PDF

A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs (중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.14-24
    • /
    • 2019
  • It is necessary to look into multiple subjects, such as effectiveness, laws and polices of blockchain in order to easily accept blockchain technology in small and mid-sized enterprises(SME). This study analyzes the positive effects of applying the block chain to SMEs, examines the laws and policies required to apply them, and identifies the tasks. As a result, we confirmed that it can create positive effects such as optimizing supply chain management, simplifying import and export process documents, improving product quality, facilitating flow of funds, and improving transaction reliability. Also, we confirmed that it is necessary to improve the basic law of electronic transaction, electronic commerce law, electronic financial transaction law, personal information protection legislation, and needs policy supplement for platform development, education system for SMEs, transaction standardization guidelines, tax reduction policy, and block chain research and development. More extensive practical research and specific individual legal studies are needed in the future.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

Estimating the Method of the Number of Visitors of Water-friendly Park Using GPS Location Information (GPS 위치정보를 활용한 친수공원 이용객 수 추정방법 연구)

  • Kim, Seong-Jun;Kim, Tae-Jeong;Kim, Chang-Sung
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.3
    • /
    • pp.171-180
    • /
    • 2020
  • With the increase in industrialization and urbanization, scarcity of space for leisure life has become an important issue. Opportunities such as natural scenery and ecological experiences provided by waterfront spaces around streams are fundamental factors in the development of the community and creation of a hydrophilic park. In the past, on-site surveys have been conducted using human resources to quantify the number of river visitors, but the accuracy of the results was not sufficient owing to limitations in expenses, manpower, space, and time. In this study, to overcome this problem, we estimated the number of visitors using the location information related to hydrophilic parks. The study areas were Samrak Ecological Park and Daejeo Ecological Park located downstream of the Nakdong River. We compared and analyzed the pattern of the visitors by using the large communication data and the visiting pattern based on GPS location information. The GPS location information is based on Google Popular Times and Kakao visitor data. When the GPS location data were used, the pattern for weekday and weekend visitors was clearer than when the large communication data were used. Therefore, it is expected to be similar to the result of GPS location information if the number of visitors is extracted under the condition of precision of pCELL size and residence time of 30 minutes or more when using future communication big data. In addition, if revisions such as the Personal Information Protection Act are made to extract more accurate data, by estimating the number of visitors based on GPS data, more accurate indicators of the number of visitors can be derived.

A Study of Password Management System for Improves the Availability and Efficiency (효율성과 가용성을 향상시킨 패스워드 관리시스템 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.150-153
    • /
    • 2013
  • By the development of IT, most business has been processed on the IT solution-based servers has increased Therefore, the importance of security of the server is highlighted. And the need for password management server efficient and safe is raised. There is a need to change at least 8 characters to mix the numbers and letters and password change passwords on a regular basis, you need a password for each system account is set in a different way, but the continuation of the system there is a tendency to password problems occur problems caused by the limits of the introduction of human resources and introduction basis occurs. The password management feature, though it is expensive is partially providing integrated access control solutions at home and abroad, there is a drawback that stresses the traffic on the server. Future, we conducted a study of password management solutions for the server of the server is determined IT transformation trend of non-IT field to accelerate, is continuously increasing it accordingly.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.