• Title/Summary/Keyword: Data Protection Act

Search Result 188, Processing Time 0.031 seconds

Study of the Introduction on the Aviation Safety Data Protection System (항공안전데이터 보호제도 도입 방안 연구)

  • Kim, Eun-jung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.1
    • /
    • pp.81-120
    • /
    • 2018
  • To promote the aviation safety reporting system that is operated to enhance aviation safety and to utilize related information, it should first be preceded by standards for non-punishment and data protection. It is because the purpose of collection and analysis of aviation safety related data through the aviation safety reporting system is to prevent recurrence of accidents by investigating their causes through collection and analysis of diverse types of information related to aviation safety. Both mandatory and voluntary reporting systems are in operation for aviation safety under the current Aviation Safety Act. It is said that they were introduced to survey causes for accidents and to prevent recurrences. In fact, however, it is hard to expect active implementation of the reporting system for aviation safety unless the reporters are firstly exempted from punishment. Therefore, the system should be improved so that it can satisfy its purpose and the purposes of data collection concerning aviation safety through examination of the purposes of the reporting system. One of the matters that needs to be considered to promote the reporting system should be the scope of aviation safety hindrances presupposed under the current institution. The voluntary aviation safety reporting system differs from the systems of ICAO or the key advanced countries, including the USA and the UK as it limits the target accidents subject to reporting to minor aviation safety hindrances only. That being said, improvements should be made by requiring mandatory reporting of aviation safety hindrances based on their severity while recognizing a greater variety of aviation safety concerns like international standards. Safety actions and sharing of information based on collection and analysis of diverse data related to aviation safety will greatly contribute to enhance aviation safety as the purposes of the reporting system are to explore causes for accidents and to prevent their recurrences. What is most important in this regard is strict data protection and non-punishment principles; compliance with them should be secured. We can hardly expect the successful operation of the system unless the reporter is exempted from punishment and the relevant data is protected as promotion of voluntary reporting is an essential factor for enhancing the safety culture. Otherwise, the current system may induce hiding of relevant facts or data to evade punishment. It is true that the regulation for enhancing safety tends to have limitations or blind spots; nevertheless, it should still be enforced strictly and completely. Technological progresses and mistakes of operators appear in different forms based on individual cases. The consequential damages may amount to a truly severe level. Therefore, we have studied and suggested to the methods of activiation and amendments on the aviation safety reporting system, which is referred for one of the proactive safety management systems. The proposed improvement of the reporting system and introduction of non-punishment for collection of aviation safety data for deploying a preemptive prevention system would serve as the backbone for enhancing aviation safety in Korea.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

A Case Study on the Establishment of Cloud Management System in Data Centers: Focusing onG-Cloud Application Case (데이터센터 클라우드관리시스템 구축 사례 연구 : G-Cloud 적용사례 중심으로)

  • Jang, Hee-Don;Kim, Seung-Cheon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.33-37
    • /
    • 2019
  • According to the enforcement of the Cloud Computing Development and User Protection Act, a new paradigm called as Cloud Computing is coming to the fore among public and private domestic enterprises. Therefore, domestic companies should develop SaaS products specialized for the domestic market and try to preempt the IaaS market ahead of global companies. Now we are facing a necessity to combine all the cloud systems in Korean government to operate seamlessly in a harmony. In this paper, we will look at the prospect of future development of related industry through cloud computing concept and G-cloud's cloud management system (G-CMS). G-CMS can be seen as the first system to comprehensively manage heterogeneous Unix virtualization systems. G-CMS can also save costs by managing heterogeneous virtualization systems in data centers.

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Perception of Privacy and Sensitivity of Personal Information among University Students (대학생들의 개인정보보호의 인식과 개인정보의 민감도에 대한 연구)

  • Boo, Yoo-Kyung;Noh, Jin-Won;Kim, Yun-Mi;Kim, Sung-Soo;Rha, Young-Ah
    • Culinary science and hospitality research
    • /
    • v.21 no.5
    • /
    • pp.25-37
    • /
    • 2015
  • By studying the awareness level of students, for the need to protect personal information, and also by studying students' level of perception as to which information needs protection, this study aims to show that increased education is beneficial, and necessary, across all university majors. This increased education is necessary to improve information security, and increase the responsible sharing of private data which has many benefits, specifically in the Healthcare field. Utilizing student volunteers across multiple majors at a university in South Korea. These questionnaires measured the students' awareness of private information, their perception of private information and also the students' experience in receiving university level education regarding private information and the need for its protection. This study shows that, when compared to students in other fields, students in the field of public health had a higher level of awareness regarding the consequences of personal information disclosure for both public purposes and medical research. Within the parameters of this study, this outcome can be explained as the result of exposure to educational curriculum which contained information related to personal information protection. This increased education raised the student's awareness of which information is considered private, as well as, which information is valuable when responsibly shared. As a result, this study shows that an increase in education regarding information privacy, should be included in all university majors, and gives us evidence to support that this additional education is valuable to students at all levels and should be encouraged.

Estimating the Method of the Number of Visitors of Water-friendly Park Using GPS Location Information (GPS 위치정보를 활용한 친수공원 이용객 수 추정방법 연구)

  • Kim, Seong-Jun;Kim, Tae-Jeong;Kim, Chang-Sung
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.3
    • /
    • pp.171-180
    • /
    • 2020
  • With the increase in industrialization and urbanization, scarcity of space for leisure life has become an important issue. Opportunities such as natural scenery and ecological experiences provided by waterfront spaces around streams are fundamental factors in the development of the community and creation of a hydrophilic park. In the past, on-site surveys have been conducted using human resources to quantify the number of river visitors, but the accuracy of the results was not sufficient owing to limitations in expenses, manpower, space, and time. In this study, to overcome this problem, we estimated the number of visitors using the location information related to hydrophilic parks. The study areas were Samrak Ecological Park and Daejeo Ecological Park located downstream of the Nakdong River. We compared and analyzed the pattern of the visitors by using the large communication data and the visiting pattern based on GPS location information. The GPS location information is based on Google Popular Times and Kakao visitor data. When the GPS location data were used, the pattern for weekday and weekend visitors was clearer than when the large communication data were used. Therefore, it is expected to be similar to the result of GPS location information if the number of visitors is extracted under the condition of precision of pCELL size and residence time of 30 minutes or more when using future communication big data. In addition, if revisions such as the Personal Information Protection Act are made to extract more accurate data, by estimating the number of visitors based on GPS data, more accurate indicators of the number of visitors can be derived.

A Study on the Experiential Cognition of Child Care Teachers' Rights (보육교사의 권리에 대한 경험적 인식 연구)

  • Yi, Seoyoung;Yang, Sungeun
    • Korean Journal of Child Education & Care
    • /
    • v.18 no.4
    • /
    • pp.39-50
    • /
    • 2018
  • Objective: Social attention is paid to the issues concerning child care teachers' work multisibility and ambiguous legal status. Child care teachers are employees based on the "Labor Standards Act" and the "Child Care Act". They also play the role of kindergarten teachers based on the "Childhood Education Act" because of the Nuri curriculum. Based on the main tasks of the child care teachers who protect and nurture infants and toddlers, the Nuri curriculum education for infants is conducted. However, the duties and rights of child care teachers are disproportionate because there are many areas where teachers' professional roles do not suit their legal rights. Methods: The purpose of this study is to investigate how teachers perceive their own rights through field experience using qualitative method based on interpretative epistemology. Participants were 61 child care teachers working in the metropolitan area and used protocol description and focus group interview (FGI) for data collection. The collected data were derived as a central theme according to the data analysis method proposed by Creswell (2013). Results: Participants in the study described the 'Right and autonomy of education as a professional occupation', 'Right to request for improvement on working conditions, guarantee of living and to request for welfare system' and 'Right to guarantee of a teacher's status and adjustment of grievance.' They pointed out poor working conditions and welfare benefits at daycare centers, and emphasized that education and autonomy are necessary conditions to be strengthened for quality child care activities. On the other hand, they did not realize that 'Right to guarantee of a teacher's status and adjustment of grievance' was their right. And they have endured the infringement of this right. Conclusion/Implications: This study reveals the gap between teachers' responsibilities and rights, indicating the urgency of institutional arrangements. It is discussed that the social expectation for strengthening personality and professionalism as an infant and child specialist is increased and a practical alternative for the improvement of the right of teachers working in the child care field is needed considering the change of values about work.

Studies on the setting a fishing restricted area of Jeju special self-governing province (제주특별자치도의 낚시 통제구역 설정에 관한 연구)

  • KOO, Myung-Sung;KIM, Suk-Jong
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.3
    • /
    • pp.441-447
    • /
    • 2015
  • As a series of research plan, this study is to provide basic data necessary for the development of fishing industry which will contribute in establishing sound fishing culture in Jeju island through systematic management of fishing, protection of fishery resources and establishment of safety measures for fishermen in accordance with 'Fishing Management and Support Act'. To attain the proposed objective, this study conducted literature review and surveys on restriction standards of harmful substances generated from fishing equipment and baits, examined the current status of fishing management in popular fishing sites of other cities, and then reviewed and analyzed the fishing management and fishing-restriction zones in Jeju island. The survey on the opinions on the restriction criteria of fishing methods, tools and period, including the acceptable standards for harmful substances showed that general fishermen preferred 'alleviating the measure (44.8%)' to 'aggravating the measure (23.0%)'. Meanwhile, maritime police showed dominant opinion toward 'aggravating the restriction (52.2%)' over 'alleviating the measure (4.3%)'. Furthermore, fishing-related enterprise is favored 'aggravating the restriction (32.6%)' over 'alleviating the measure (27.9%)'. In the survey on the tolerance of fishing baits including criterion for content of certain substance in different types of bait, it showed 57.5% of general fishermen preferred alleviating restriction criteria while 20.7% of them favored tougher restriction. Whereas, 33.3% of maritime police group insisted such fishing baits should be more restricted while 16.7% answered it should be alleviated. 35.9% of fishing-related enterprise was in favor of alleviation while 14.3% preferred aggravation. Upon investigation on the status of fishing management in other cities and towns, it turned out that most of them had safety and convenience facilities, installed warning and guide signs in fishing sites, and set no fishing zones. The review of fishing management and restricted area showed that 10 sites required access restriction and 2 of 10 sites were considered to be partially restricted for weather and season. 82 fishing sites were regarded as unnecessary to be restricted and installation of safety facility and guide signs is necessary for the safety of fishermen.