• Title/Summary/Keyword: 법률 정보

Search Result 1,014, Processing Time 0.034 seconds

Personal Information Management in Korea National Long-Term Ecological Research Community (국가장기생태연구 커뮤니티의 개인정보 관리)

  • Huh, Taesang;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2274-2281
    • /
    • 2016
  • In the long-term ecological research community, personal information is an important factor for the collaboration of data management and data usage in international long-term ecological research as well as on the national level. If lots of personal information was disclosed, collaborative researchers are useful to carry out research cooperation, whereas, information providers tend to be burdened to disclose it. LTER system should be considered to provide both maximum personal information required by a community and minimum personal information to be provided to unrelated people due to the scale of personal information and a number of the constraints on disclosure in the aspect of information distribution of the laws associated with personal information protection. In this article, we analyze international ecological metadata standard, EML, and trends in personal information management throughout international long-term ecological research platforms and propose a system model capable of managing personal information based on related domestic laws for the international data exchange through design and implementation.

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

The Legal Protection Scope and Limitation of Information (정보의 법적 보호범위와 한계)

  • Kim, Hyung-Man;Yang, Myung-Sub
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.691-699
    • /
    • 2012
  • "Information", which is circulated in society by information technology development represented by computer, has brought innovation not only to physical civilization, but also deep into our daily lives. This is to say that information has brought fundamental change to its form of existence, and value system through being faster regarding the circulation and the way of management being diverse. As time goes by, this kind of change would stimulate more changes to be made as the development of scientific civilization. Therefore, informatization is one of the important characteristic that defines modern society's essence, but on the other side, information has been taken advantage of that temperament and abused in a lot of different ways. "The Law Regarding Computer Network Diffusion Expansion and Usage Promotion"(1986), as a counterplan of informatization is our nation's first Act about informatization, which enacts national policy and system about this issue. Since then, many laws has been enacted down to "Private Information Protection Act"(2011), forming a comprehensive system. The basic background of these laws are based upon the premise that even if the place where the information is managed is virtual space, rules that are considered valid in the real world should be basically applied in the virtual space. Therefore, the violation of the law in the real world is also considered the violation in the virtual space. This direction of current law regarding information is shared with both the theories and the reality. However, current law system and notion are based upon the premise that the law regards material objects, thus the characteristic of the information, which is "Immaterial Being" is not reflected. Also, the management and approach to this issue is allopathic, exposing many problems. Thus, this paper examines the way of protecting information stipulated in the current law, contemplates its protection scope and limitation, and seeks the direction of the improvement, based on the critical mind explained above.

A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection (개인정보의 관리적·기술적 보호조치 기준의 상대적 중요도에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2014
  • As the collection and use of personal information increases, the accidents that abuse and leak personal information are continuously increasing. The nation has established new laws and strengthened related laws for the prevention of the mass leakage of personal information and the secondary damage due to the leaked personal information. The nation also established the guidelines that need to be implemented by the institutions handling personal information for the safety of the personal information. For the efficient implementation of guidelines under the limited time and resources, it is necessary to establish the priorities between guidelines. This paper compares the relative importance of the guidelines by AHP (Analytic Hierarchy Process) technique. We performed the analysis on two expert groups, the group of consultants working in information security consulting company and the group of information security staffs handling personal information directly in the company. We compared the differences between groups and recommended the relative importances of the guidelines.

A Study on Legal Deposit Process and Use of Online Digital Materials (온라인 디지털자료의 납본체계 및 이용에 관한 연구)

  • Choi, Jae-Hwang;Kwak, Seung-Jin;Kim, Jeong-Taek
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.1
    • /
    • pp.209-232
    • /
    • 2009
  • The purpose of this study is to suggest guidelines for legal deposit process on online digital materials and use of the deposited materials both in National Digital Libraries and other places. At present, two Acts -- 'Act on Legal Deposit Process and Use of Online Digital Materials, ' 'Act on Partially Revised Library Law' -- are still pending in National Assembly. For the establishment of the guidelines in this study, advanced countries' legal deposit Acts in this area are searched and investigated. Also, in order to present various opinions from many parties immediately interested in the guidelines and Acts, survey, visitation, and consultancy methods are used.

  • PDF

A Study on Protection and Disclosure of Presidential Records (대통령기록의 보호와 공개를 둘러싼 쟁점과 제도적 과제)

  • Kim, You-Seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.2
    • /
    • pp.7-30
    • /
    • 2013
  • The study aims at providing alternative strategies for ongoing issues concerning presidential records. It reviews a history of legislation about presidential records management and discusses issues on protection and disclosure of access-restricted presidential records. Four major issues-presidential records' category, management authority, designated representative, and production control-are argued. As a result, this study proposes solutions to guarantee the independence of presidential records management agency and to innovate a presidential records management process.

A study on an Improvement plan of Classified records Management process in Records Center -On the basis of related Act analysis- (기록물관리기관에서의 비밀기록 관리절차 개선방안 -유관법령 분석을 중심으로-)

  • Cheon, Kwon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.33-75
    • /
    • 2009
  • After establishment of Records Act in 1999, we issued the all-out revision Act because of too much changing of records management environment. Even though the new Records Act has much reformed clauses, classified records management itself is not much improved. Under this present situation, this study analyze both Records Act and related Act to get an improved plan which would be applied at Records Center. Simultaneously, the case study of National Archives of Korea's ISP and Army Archives' can be useful research data. Finally, the study suggest that an improvement plan of classified records management process which is consist of three sub-process that are 'transfer step'-'retention and management step'-'service step'.

An Improved Model of Effectiveness on the Implementation of Personal Information Utilization Agreement in Financial Companies (금융회사의 개인정보 이용 동의 구현에 대한 효과성 개선 모델)

  • Jang, Gi-hyun;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.247-257
    • /
    • 2016
  • It is required to have Personal Information Agreement when a financial company uses personal information by the Law of Privacy. So, financial companies have to demand customers the submission of Personal Information Agreement. Thus, financial companies have made Personal Information Agreement in various formats for customers. However, financial companies are lack of a verification process, the cases of collecting invalid Agreement often occurred. This study focuses on the verification process of Personal Information Agreement and the contents of Personal Information Agreement. In conclusion, this study proposes an improved model that added to the process of verification for the concept of Agreement. Based on this study, I hope financial companies to reform their agreement process and to improve the effectiveness on the implementation of Personal Information Utilization Agreement.

정보통신안테나

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.42
    • /
    • pp.38-67
    • /
    • 1991
  • 대외 통신시장 개방등 계속되는 정보통신사업의 환경변화에 따라 정부가 오는'92년 시행을 목표로 마련한 전기통신관계법규 개정(안)에 대한 설명회가 지난 4월 20일 오전 데이콤빌딩 15층 강당에서 개최됐다. 이번 설명회에서는 체신부 통신정책국의 주요 당국자들이 나와 통신사업 경쟁도입을 위한 제도정비 방향과 전기통신기본법 및 공중전기통신사업법 개정(안)에 대한 설명이 있었다. 이날 체신부 통신정책국이 밝힌 전기통신기본법 및 공중전기통신사업법의 개정법률(안)은 다음과 같다.67

  • PDF

사용자탐방-한국건설기술연구원 건설정보관

  • Jo, Hyeon-Yang
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.3
    • /
    • pp.132-133
    • /
    • 2000
  • 한국건설기술연구원은 1983년 6월 재단법인으로 출범하여 1988년 1월에 건설기술관리법에 의거 정부출연연구기관으로 승계.설립되었고 1999년 1월 건설교통부의 국립건설시험소와 통합후, "정부출연연구기관 설립.운영 및 육성에 관한 법률"에 의거 국무총리실 산하 공공기술연구회 소속기관으로 승계되었다. 건설기술연구원은 건설기술개발, 정책개발, 건설기술관리, 품질 인증 및 정보유통망구축 등의 업무를 수행하는 명실공히 우리 나라 최고의 건설기술종합연구 기관이다.

  • PDF