• Title/Summary/Keyword: 개인정보 제공 동의

Search Result 153, Processing Time 0.027 seconds

테마연재 / 정보보호의 사각지대 아동 개인정보 보완 시급

  • Kim, Yeon-Su
    • Digital Contents
    • /
    • no.8 s.99
    • /
    • pp.56-60
    • /
    • 2001
  • 인터넷에서 아동을 대상으로 하는 웹사이트들이 이벤트나 광고를 통하여 아동 및 그 법정대리인 등의 개인정보를 지나치게 많이 요구하는 경우가 많고 아동들은 그에 대한 분별력이 적어서 해당 사이트를 빨리 이용하고자 하거나 상품 등을 받고자 하는 욕구에 분별 없이 자신의 개인정보는 물론 가족들, 친구들의 개인정보를 제공하게 된다. 그러나 14세 미만의 아동으로부터 개인정보를 수집하는 경우 법정대리인의 동의를 받도록 하고, 이용 또는 제3자 제공에 대한 동의권, 동의철회권, 열람청구권 및 정정요구권을 부여하고 있다.

  • PDF

An Exploratory Study on Consumers' Perception of Personal Information Provision to the Third Party (소비자의 개인정보 제3자 정보 제공 인식에 관한 탐색적 연구)

  • Koo, Hye-Gyoung;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.187-196
    • /
    • 2014
  • Most Consumers don't pay attention the process of giving consent for the provision of personal information. The terms of giving consent of personal information provision including 3rd party provision related contents. Although personal information leakage were related 3rd party sharing, consumers can't recognize the details. Therefore, this study focused on the perception of 3rd party provision of personal information. Consumers recognized 3rd party as who are related the service offer or not. Consumers want to know the cases of personal information sharing to the 3rd party, and if the business operators got benefit to share personal information with 3rd party, consumers want to know the facts. To understand the terms easily, the format have to be revised and to be standardized. Standardization of consent forms is very important for consumers to understand the difficult documents and the development of the business system to collect and use consumer's personal information to guarantee the right to self-determination of personal information.

An Improved Model of Effectiveness on the Implementation of Personal Information Utilization Agreement in Financial Companies (금융회사의 개인정보 이용 동의 구현에 대한 효과성 개선 모델)

  • Jang, Gi-hyun;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.247-257
    • /
    • 2016
  • It is required to have Personal Information Agreement when a financial company uses personal information by the Law of Privacy. So, financial companies have to demand customers the submission of Personal Information Agreement. Thus, financial companies have made Personal Information Agreement in various formats for customers. However, financial companies are lack of a verification process, the cases of collecting invalid Agreement often occurred. This study focuses on the verification process of Personal Information Agreement and the contents of Personal Information Agreement. In conclusion, this study proposes an improved model that added to the process of verification for the concept of Agreement. Based on this study, I hope financial companies to reform their agreement process and to improve the effectiveness on the implementation of Personal Information Utilization Agreement.

Improvement of Selective Consent Method in the Collection Process of Personal Information of Financial Institutions (금융기관의 개인정보 수집 절차 중 선택적 동의 방식의 개선방안)

  • Sun, Jong-chun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.123-134
    • /
    • 2020
  • Although the rights of data subjects are defined through laws such as the Personal Information Protection Act, the consent process for collecting personal information by financial institutions is only formal and does not guarantee the right of self-determination of personal information. Therefore, it is necessary to analyze the problem by information provision items of the current model, and to improve by changing the structure such as replacing the current method provided with the text with pictures and videos, and mandatory to provide the information subjects with personal information flow related images from the signing up stage. The improvement model is presented as a way to add a procedure to the current model. The effect was verified through a survey. It is hoped that the proposed model is actually reflected through the review to create an environment that can be a true meaning agreement that reflects the information subject's right to self-determination.

A Protocol of Personal Location Information Control for Privacy (프라이버시 보호를 위한 개인 위치 정보 관리 프로토콜)

  • Hwang, Young-Sik;Nam, Taek-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.55-57
    • /
    • 2005
  • 본 논문에서는 프라이버시 보호를 위한 개인 위치 정보 접근에 대한 통보 유무, 동의와 같은 차별화 된 정책 설정과 특정 장소나 시간에 대해 위치 정보 제공을 차단 할 수 있는 프로토콜을 제안 하려고 한다. 제안하는 프로토콜은 모바일 상의 프라이버시 설정을 위해 응용 레벨에서 동적으로 발생하는 개인의 위치정보에 대해 유저가 설정한 특정 장소와 시간에 따라 차단하는 기능 설정할 수 있다. 또한 서비스 제공자와 요청자 별로 개인 위치 정보 접근에 대한 통보 유무, 동의와 같은 차별화된 정책을 설정 할 수 있다. 제안하는 프로토콜은 이들 설정된 정책들의 리스트들을 요청자 별로 나누어서 사용자 프라이버시 리스트 서버(UPLS)에서 관리하며, 서비스 요청 시 설정된 정책에 맞는 서비스를 서비스 제공자들이 제공하게 되므로 개인 위치 정보에 대해 프라이버시를 제공하게 된다.

  • PDF

Ethical Consciousness: Passive Privacy Intrusion versus Active Privacy Intrusion on a SNS (윤리의식: SNS상의 수동적 개인정보 침해와 능동적 개인정보 침해)

  • Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.24 no.4
    • /
    • pp.55-76
    • /
    • 2022
  • People have adopted Social Networking Sites (SNSs) as a part of their daily lives. When a person uses SNSs, (s)he intentionally or unintentionally discloses her/his personal information. Although using SNSs can provide benefits to a person such as maintaining relationships with people who does not see often, it also opens a dark side. Someone can use one's disclosed information without the acknowledgement of the information owner. It is called a privacy intrusion on SNSs, which has become a social problem and needs attention. This study examined factors affecting privacy intrusion intention on SNSs. This study classifies privacy intrusions into passive intrusion (collector) and active intrusion (distributor). The results reveal that low ethical consciousness positively affects enjoyment in both of collecting and distributing someone's personal information on SNSs. A person who has the low ethical consciousness also tends to raise her/his curiosity of collecting someone's private information on SNSs. Apart from low ethical consciousness, this study discloses how enjoyment, curiosity, experience of being a victim of privacy intrusion, experience of intruding others' privacies, and self-efficacy of collecting or distributing others' private information are related to passive or/and active privacy intrusion on SNSs with survey data.

GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment (IoT 환경에서 GDPR에 부합하는 개인정보수집 동의 절차)

  • Lee, Goo Yeon;Bang, Junil;Cha, Kyung Jin;Kim, Hwa Jong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.129-136
    • /
    • 2019
  • Many IoT devices like sensors lack screen and input devices, thus making them hard to meet the consent conditions that GDPR requires. This is acting as a legal barrier for further advancement in the business field. In this paper, we designed the process for consent of personal information collection that meets the legal conditions. In this design, user's personal data is received in an encrypted form by data collecting server first. The encrypted personal data can be decrypted after associating with user agent based on the consent procedure of the collection of personal information. During the consent procedure, user agent understands the privacy policy about personal information collection and offers the key to decrypt the data. This kind of personal information collection agreement procedure will satisfy the transparent and freely given consent requirements of GDPR. Thus, we can speculate from here that the proposed procedure will contribute to the evolution of IoT business area dealing with personal information.

Study on Privacy in the IPTV Broadcasting Service (IPTV 방송서비스에서의 개인정보보호에 관한 연구)

  • Lee, Jinhyuk;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.701-712
    • /
    • 2016
  • The number of subscriber of digital pay TV service such as Digital Cable TV and IPTV is increasing from various kind of service provider world widely. These services require personal information of users to provide VOD(Video on Demand) and customized contents. Therefore, massive amount of personal information collected by service provider can cause social confusion such as leakage of privacy and property damage. This paper investigates whether broadcasting stations are providing enough notification for privacy policy and methodology of collecting private information in proper way. Furthermore, we analyze actual network traffic of IPTV service between user and service provider to suggest solution of privacy protection along with current status analysis.

A Study on Decision Making Model for Personal Information Collection and Use Policy Establishment through Internet Homepage of Financial Companies (금융회사 인터넷 홈페이지를 통한 개인정보 수집 및 이용 동의 정책 수립 모델 연구)

  • Kim, Seong-hoon;Lee, Kyeong-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.637-651
    • /
    • 2017
  • In order for a financial company to collect personal information, it explicitly notifies consumers of the contents stipulated by law and gets consent beforehand. As a result, as financial products became more complicated and diverse, and the contents of 'Consent form for providing personal information' became more complicated and more. In particular, in the case of internet or mobile, the letter became smaller as the screen size limit, making it more difficult to understand. This is because almost all companies that collecting personal information are in a similar situation, In the position of consumers who use services are, contradictions arise that habitually agree without understanding the consent contents. In this research, in order to present a consent policy establishment decision-making model to rationally collect and use personal information through the Internet website of financial companies, consider the domestic and foreign legal system Then, derive a problem To present improvement measures. In addition, the evaluation factors selected through the research are verified by presenting decision making models and formulas using AHP (Analytic Hierarchy Process) method.