• Title/Summary/Keyword: Confidentiality and privacy

Search Result 117, Processing Time 0.023 seconds

A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research ("생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로)

  • Kim, Eun-Ae
    • The Korean Society of Law and Medicine
    • /
    • v.12 no.1
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF

The Challenge of Personal Information Act for Oral History Project (구술자료의 수집과 서비스에 대한 개인정보 보호법의 도전)

  • Lee, Hosin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.1
    • /
    • pp.193-216
    • /
    • 2017
  • The purpose of this study is to understand issues related to the Personal Information Act recently emerging in the field of oral history, and to prepare countermeasures for oral history academics and archives. The Personal Information Act is intended to protect the confidentiality and freedom of the constitutional privacy, and to assure the right to self-determination of information, thereby realizing the dignity and value of the individual. Oral history is intended for living persons; therefore, strict ethical standards are needed to protect the morality of the person behind the sound recordings and appears as the subject of oral history. However, if the uniform application of the Personal Information Act is made, it is a requirement to make the process of consenting and notifying excessively complex and almost impossible to realize, making collection and service of oral history resource improbable. The mechanical and strict application of the Personal Information Act does not come into being because it has the aspect of undermining the inherent intrinsic value of oral history resources and making it difficult to maintain the authenticity of the records. To solve these problems, it is necessary to revise Article 58 (4) of the Personal Information Act of Korea. In addition, it is necessary to establish a guideline for the establishment of independent ethical standards of oral history itself, especially for the protection of the moral rights of third parties.

A Study on Policy Improvement for Ensuring the Effectiveness of Suicide Prevention Law (「자살예방 및 생명존중 문화 조성을 위한 법률」의 실효성 확보를 위한 정책적 개선 방안 - 「개인정보보호법」과의 충돌문제 해결을 중심으로 -)

  • Kwon, Do-Hyun;Park, Jong-Ik;Ah, Yong-Min
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.261-285
    • /
    • 2019
  • The essential policy of suicide prevention is to continuously manage and treat suicide attempted people through data base related to suicide retry rate and follow-up study report. In Korea, only few people are allowed to follow-up by the Personal Information Protection Act. As a result, the research participation rate and the service participation rate are rather low, so that the research participants is limited to a part of the suicide attempted people. Therefore, the policy proposals to be improved in the Ministry of Health and Welfare Act were examined comparatively in order to increase the practical utilization of the suicide prevention about Article 14 and Article 20 of the Suicide Prevention Act. As a criterion for policy improvement, measures for non-discrimination of information to be considered in terms of technical and ethical dimensions and non-profit research and medical information for medical purposes were suggested. In addition to the severity of the suicide, the suicide risk was assessed and the criteria for the objective assessment of the follow-up observation were considered in consideration of the severity of the suicide.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Comparative Analysis of Satisfaction according to Opened-Fencing in Campus Afforestation Project Types - Focused on University in Seoul - (대학교 담장개방 녹화사업 유형에 따른 이용 만족도 비교 분석 - 서울 소재 대학 캠퍼스를 중심으로 -)

  • Lee, Se-Mi;Kim, Dong-Chan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.39 no.6
    • /
    • pp.57-66
    • /
    • 2011
  • This study researched those universities for which fence opening and greening projects are being conducted by Seoul city. The forms of opened fences at 24 universities which have accomplished this project were classified into several types for each type of university, representative cases with many diverse facilities and active users were selected and investigated. The study was carried out using methods of field observations, literature review, and surveys. To maintain the confidentiality of the collected questionnaire analysis, the analysis of each type's usage frequency, overall satisfaction and a regression analysis with space environment and facilities, a one-way ANOVA for was used to validate the difference between types regarding satisfaction with the project. The results of usage type analysis were found to agree with the 3 analysis criteria-- installation location, user characteristics, and usage purpose--which were the legislative concepts. In overall satisfaction with facilities, it appeared that except for Seoul Women's College of Nursing with its rural district neighborhood type park, users were satisfied: with the small urban neighborhood park of Methodist Theological College, Konkuk University's small urban square park, and Sejong University's green space small city park. In general, users appeared to not have satisfaction with such features as fountains / hydroponic facilities, fitness facilities, and square facilities, which should be taken into consideration when pursuing further opening and greening projects. Regarding full satisfaction with the space environment, it was found that users were not satisfied with Seoul Women's College of Nursing's rural district neighborhood-style park, whereas they were satisfied with Methodist Theological College's small urban neighborhood park, Konkuk University's small urban square-style park, and Sejong University's green space small city park. In addition, it was shown that facilities use, convenience and privacy of the four parks were largely unsatisfactory for users, and that the small city parks located at roadsides were unsatisfactory regarding noise level, both of which should be most highly considered when conducting similar projects in the future.