• Title/Summary/Keyword: 개인정보 보호법

Search Result 183, Processing Time 0.024 seconds

The Protection of Privacy and the Restriction of Its Commercial Use in Telecommunications (통신산업에서 개인정보의 보호와 영업적 이용의 한계)

  • Hong, Myung-Su
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.303-335
    • /
    • 2011
  • The rapid changes in telecommunications have exercised an important influence on the telecommunications law system, including the protection of the privacy. It was a decisive assignment that telecommunications law protected the confidentiality of privacy. But in new digitalized telecommunications circumstance, every steps of the conveyance of the individual informations should be protected, in particular by telecommunications carriers as a subject of the protection of information. EU Privacy Directive in 2003 and the amendment of Communications Act in U. S. A. in 1996 have reflected the necessity of the privacy from a new point of view. In Korea, "Protection of Privacy Act" has been established as general law as to the protection of privacy and "Electronic Communications Net-work Act" and "Location Data Act" have been functioned as special law in telecommunications, and these laws have developed the legal systems about the protection of privacy in telecommunications. Such a legal system could be affirmatively evaluated. But the regulations should be reformed in a way that corresponds to the detailed types of the privacy and it should be devised a method, that the consent of users could be fulfilled practically.

A study on Utilization of Big Data Based on the Personal Information Protection Act (개인정보보호법에 기반한 빅데이터 활용 방안 연구)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.87-92
    • /
    • 2014
  • We have noted a possibility of big data as a solution of social problem and pending issue. At the same time big data has a problem of privacy. Big data and privacy were in conflict. In this paper we pointed out that issue and propose a planning of big data based on privacy using case study of advanced country.

개인정보보호를 위한 관리체계와 거버넌스

  • Kim, Jung-Duk
    • Review of KIISC
    • /
    • v.18 no.6
    • /
    • pp.1-5
    • /
    • 2008
  • 개인정보보호가 단순히 개인의 권익에 관한 문제로 국한되지 않고, 기업의 사활을 좌우하는 이슈로 대두되고 있다. 또한 개인정보의 활용과 보호라는 두 가지 상충되는 기업 내 목표와 관련 개인정보보호법이나 규정 준수 등 대내외 요구사항을 만족시켜야 한다. 기업 내 개인정보보호활동의 효과성을 높이기 위해서는 현재 산발적으로 진행되는 개인정보 영향평가 등 단순 기법이나 정보유출방지 솔루션 도입 등의 접근방법으로는 한계가 있으며 새로운 접근방법이 필요하다. 본 고에서는 일상적 관리활동의 하나로서 개인정보보호를 위한 관리체계의 필요성과 관리과정을 소개하며 이를 평가, 지시 및 모니터링 할 수 있는 거버넌스의 목표와 중요성에 대해 기술한다.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

일본 개인정보보호법제 정비동향에 관한 고찰

  • 김현수;박춘식
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.96-103
    • /
    • 2003
  • 정보화사회의 진전에 따라 일본은 개인정보보호법제의 정비에 착수하여, 2003년 5월 30일에 '개인정보보호 관련 5법안'을 공포하였다. 금번 법제정비의 가장 큰 특징은 공공부문과 민간부문을 포괄하는 개인정보보호 관련 기본법제를 제정함으로써, 국가차원의 종합적ㆍ일체적 개인정보보호 체계를 구축한 것이라고 할 수 있다. 본 논문에서는 최근 국내에서 대두되고 있는 개인정보보호법제 정비의 움직임이 일고 있는 가운데 유용한 자료가 될 수 있는 일본의 개인정보보호법제 정비 과정과 새로이 성립된 개인정보보호 관련법제의 주요내용을 살펴본다.

관제 시 수집하는 개인정보에 대한 고찰과 개선방안

  • 김정균
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.10-12
    • /
    • 2023
  • 관제 센터에서 비상 상황에 신속히 대응하기 위해, 관제사가 선장의 개인연락처를 수집·저장하는 행위의 법적 근거를 살펴보고 이행위가 개인정보 보호법을 위반하지 않는지 검토 및 개선사항을 공유

  • PDF

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

A case study of Privacy Impact Assessment -Focus on K hospital Privacy impact assessment case- (개인정보 영향평가 사례 연구 -K병원의 영향평가 사례를 중심으로-)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.149-157
    • /
    • 2012
  • Recently, many corporations and public institutions are busy preparing and providing measures in dealing with new privacy information law. This study reviews privacy impact assessments in order to perform preventing and diagnosis against potential threats focus on the K-hospital case. The quality of protection in K-hospital shows that the corporations itself is 79.0, the system is 97.0, the life cycle of the privacy is 67.4 and CCTV is 90.0. The lowest levels are saving and keeping 50.0, usage and offer 64.1 and destruction 66.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are controlling for privacy 11.0, saving and keeping 12.5 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.