• Title/Summary/Keyword: 법률 연구 서비스

Search Result 252, Processing Time 0.029 seconds

u-Health 시대의 개인건강정보 보호를 위한 관련 법제 고찰

  • Jeong, Hye-Jeong;Kim, Nam-Hyun
    • Review of KIISC
    • /
    • v.19 no.1
    • /
    • pp.115-124
    • /
    • 2009
  • 오늘날 의료는 정보통신 기술의 발달과 소비자의 건강에 대한 관심 고조 등을 동인으로 하여 기존의 환자가 치료 목적으로 병원을 찾아가던 환경에서 개인의 질병 예방과 건강 증진을 위해 언제 어디서나 의료서비스가 찾아가는 소위 u-Health 환경으로 패러다임이 전환되고 있다. 본 논문은 이러한 환경에 대처하는 보건의료 관련 법제에 대한 연구로 현행법률과 현재 계류 중인 법안을 고찰하여 가장 민감한 개인정보인 건강정보의 보호와 활용의 균형을 위한 입법 방향을 제시하였다.

우리나라 토양오염부지관련 정보관리체계의 문제점 - 법ㆍ제도를 중심으로 -

  • 황상일;이양희
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.04a
    • /
    • pp.5-11
    • /
    • 2004
  • The objectives of this study is to find problems in the legal and institutional background on our information system for soil contaminated sites. To achieve this abjective, we compared our system with those of federal and New Jersey state governments of the United States. We found that we have no comprehensive guideline on how various information from the contaminated sites should be manipulated. In our system, some regulations on information management were found only in a few prescriptions on detection, detailed investigation, and remediation phases. However, we found that provisions, detailed procedures, and related guidelines for the information management are provided in tile case of the federal and New Jersey state governments. Also, public involvement and disclosure of tile information for the remediation procedure are designated in their legal systems.

  • PDF

A Study on the Utilization of Biometric Authentication for Digital Signature in Electronic Financial Transactions: Technological and Legal Aspect (전자금융 거래 시 생체인증을 전자서명에 활용하기 위한 기술 및 법률에 관한 연구)

  • Song, Jae-Hun;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.41-53
    • /
    • 2016
  • Today, leading smartphone manufacturers offer biometric technologies such as fingerprints, voice recognition, and iris patterns in their flagship models. These biometric technologies are used for authentication. Biometric authentications are widely used in device security and even in financial transaction. This paper examines cases where a user uses biometric authentication during financial transaction (both online and smartphone banking), and explains biometric for non-repudiation by digital signature. Finally, the paper also explains technical and legal requirements for biometric authentication in the area of financial services.

A Framework of Service Level Agreement for Activating Cloud Services (클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.173-186
    • /
    • 2018
  • While cloud services are expanding, many users are having difficulty in adopting cloud services. This is because there is no information as to which cloud services can be trusted by users. loud service level agreement (Cloud SLA) is an agreement between cloud service providers and cloud service consumers using qualitative and quantitative indicators including quality and performance, etc. of cloud services. In this study, we propose a framework for cloud SLA that can be applied to the domestic cloud industry to improve service levels for cloud service providers and to protect users and also derive the detailed components of cloud SLA applicable to the domestic cloud industry using the proposed framework. Through this result, it is expected that the government will utilize the policy to enhance the reliability between cloud service providers and users under "the Act on the Development of Cloud Computing and Protection of Users", and eventually to activate cloud services by improving the quality and performance level of domestic cloud services and building a user trust.

Private Security Regulation: A Comparative Study of South Korea and Mongolia (한국과 몽골의 경비업법 비교연구)

  • Lkhagvamm, G;Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.139-165
    • /
    • 2016
  • In Mongolia, the regulation related to the private security industry, the Law on Contracted Private Security Services, was legislated relatively recently. The Law on Contracted Private Security Services was enacted into law in Mongolia 16 years ago, in 2000. This regulation has undergone two amendments since its inception. However, new revisions still need to be made to ensure that this regulation is in line with internationally accepted standards and practices. This paper compares the existing private security regulations of South Korea and Mongolia. The purpose of this comparative study was to identify the weaknesses of and problems in the Mongolian regulation and propose amendments to the Mongolian regulation. The comparative study of the two countries' regulations showed and underscored an imperative need to make further amendments to the Law on Contracted Private Security Services. Specifically, the weaknesses of and problems in the Mongolian regulation at issue include the following: the level of accuracy in defining certain legal terms and providing the proper names for various regulations; stipulations which set forth the procedure for registering a private security company; provisions regarding operating a private security company; the details of eligibility and accountability requirements concerning chief executives and security service officers; and the scope of work provisions. This study proposes constructive amendments to strengthen the Law on Contracted Private Security Services.

  • PDF

A Study on the legal definition and the demands of the times of a medical technician according to changes in the medical market (의료시장 변화에 의한 의료기사의 법률적 정의와 시대적 요구에 관한 연구)

  • Kim, Jeong-Ho;Han, Man-Seok;Kim, Chang-Gyu;Seo, Sun-Youl;Kim, Gap-Jung;Bae, Seok-Hwan;Kim, Yong-Kyun
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.397-406
    • /
    • 2021
  • Under the Act on Medical Technicians, etc. in Korea, medical technicians are supposed to perform their duties under the guidance of a doctor or dentist. However, considering the actual work behavior, domestic and international trends, and the level of education of medical technicians, professionalism must be recognized. Such a professional and independent operating system must guarantee the autonomy of medical technicians, and it can be said that changes are necessary in law. In other words, it is necessary to change to "request and prescription" rather than "supervision" according to the needs of the times when the concept of "request" and "cooperation" is applied in many countries and an excellent curriculum. These changes can be called the demands of the times and changes for the improvement of medical services and social contribution.

Possibility of Transmission for Works Beyond Library Fence: Review on the Main Contents and Limitations of Article 35-4 of the Copyright Act (도서관의 울타리를 넘어서는 저작물 디지털 서비스의 가능성: 저작권법 제35조의 4의 주요 내용과 한계에 대한 검토)

  • Lee, Hosin;Joung, KyoungHee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.3
    • /
    • pp.107-131
    • /
    • 2020
  • This study is to examine the possibility of applying the Article 35-4 of the Copyright Act and the relevant regulations of the enforcement decree of the same law to the construction and service of digital library. The background and necessity of the revision were understood by examining the related regulations and discussions in previous studies, including Articles 31 and 50 of the Copyright Act. Then, the detailed contents of the provision were analyzed by referring to the laws, enforcement decrees, and ordinance of the Ministry of Culture, Sports and Tourism. In addition, through comparison with Articles 31 and 50 of the Copyright Act, the characteristics, significance, limitations, and problems of this provisions were analyzed. Based on this, we proposed four ways to increase the effectiveness of this provision.

A Study on the Development of a Platform for the Prevention of Digital Sexual Crimes in the Virtual-Reality Metaverse (가상현실 메타버스 디지털 성범죄 예방을 위한 플랫폼 구축 제안 연구)

  • Jae-Won, Hwang;Jung-Heum, Park;Sang-Jin, Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1157-1166
    • /
    • 2022
  • With the advent of the non-face-to-face era, a new type of digital sexual crime with avatars is emerging on the Metaverse virtual reality platform. Due to the lack of clearly established in legal and regulatory systems, it is challenging to punish offenders and acquire digital proof for sexual crimes using these avatars. This research aims to suggest a service and technological solution is development platform that may assist crime prevention and the collection of digital evidence, with a particular emphasis on digital sex crimes that occur in the metaverse, a virtual reality realm. This study explores the reasons behind the difficulty of legal application in the metaverse and then determines the types of digital sex crimes that may occur in the metaverse. In addition, it is suggested what service components the metaverse should contain from the stage of construction and design, can be utilized what element of metaverse in order to prevent illegal activity of avatars.

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

A Study on the Brand Service Design for Measuring and Managing Indoor Air Quality (실내공기질 측정 및 관리를 위한 브랜드 서비스디자인 연구)

  • Kim, Seung-Beom;Kim, Hwoi-Kwang
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.325-333
    • /
    • 2018
  • The quality of indoor air quality is facing a very serious situation due to the impact of the quality of the atmosphere in the atmosphere and the surrounding environment. While awareness of the danger of these populations is increasing, there is no way to detect the quality of the indoor air quality as well as the measures to detect the quality of indoor air quality as well as the countermeasures. The study drew a general problem with the design of the service design, the general purpose of the general office, and the use of the public facilities for the purpose of measuring the usage of indoor air quality, the general purpose of public facilities, and the interpretation of the current law. Based on this research, most of the general users' perception of the seriousness of the disease is not reflected in the perception that the dust and indoor air are accumulated in the eyes of the general public.