• Title/Summary/Keyword: Data Protection Act

Search Result 188, Processing Time 0.027 seconds

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

A Study on the Change of Perceptions of Child Abuse Before and After Special Law (아동학대 범죄의 처벌 등에 관한 특례법 전후의 아동학대 인식 변화에 대한 고찰)

  • Lee, Keung-Eun;Kim, Do-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.629-636
    • /
    • 2019
  • In order to infer whether the Special Act on the Punishment of Child Abuse Crimes, etc. actually brought about a change in the social perception shared about child abuse in our society, we used big data to examine the change in the perception of child abuse by the public. This study selected 'child abuse' as the keyword and collected and analyzed. The results of this study are as follows. First, before the implementation of the Special Act in 2013, the words "china" are kindergarten, teacher, body, problem, reporting obligation and neglect compared to the following. After the implementation of the special law, daycare centers, incidents, eradication, campaigns, domestic violence and preventive education were newly introduced. Second, the interconnection of key words in the previous picture of 2013 shows that the left group focuses on measures to introduce to prevent child abuse while the right group consists of keyword intended to view child abuse in conjunction with domestic violence. They are still seen as a group of divorces, discipline, neglect and parental education, which they still perceive as a family problem. Since the implementation of the Special Act in 2013, it will be divided into four groups, and the top group will be highlighted by the keyword related to child abuse cases, part of suspected cases and awareness of child abuse. In addition, the Act on the Special Cases of Child Abuse and the Child Protection Agency clearly appear as a child protection system.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

A Study on Notification Method of Personal Information Usage History using MyData Model (마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

Improvement of Personal Information Protection Laws in the era of the 4th industrial revolution (4차 산업혁명 시대의 개인정보보호법제 개선방안)

  • Choi, Kyoung-jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.177-211
    • /
    • 2017
  • In the course of the emergence and development of new ICT technologies and services such as Big Data, Internet of Things and Artificial Intelligence, the future will change by these new innovations in the Fourth Industrial Revolution. The future of this fourth industrial revolution will change and our future will be data-based society or economy. Since there is personal information at the center of it, the development of the economy through the utilization of personal information will depend on how to make the personal information protection laws. In Korea, which is trying to lead the 4th industrial revolution, it is a legal interest that can not give up the use of personal information, and also it is an important legal benefit that can not give up the personal interests of individuals who want to protect from personal information. Therefore, it is necessary to change the law on personal information protection in a rational way to harmonize the two. In this regard, this article discusses the problems of duplication and incompatibility of the personal information protection law, the scope of application of the personal information protection law and the uncertainty of the judgment standard, the lack of flexibility responding to the demand for the use of reasonable personal information, And there is a problem of reverse discrimination against domestic area compared to the regulated blind spot in foreign countries. In order to solve these problems and to improve the legislation of personal information protection in the era of the fourth industrial revolution, we proposed to consider both personal information protection and safe use by improving the purpose and regulation direction of the personal information protection law. The balance and harmony between the systematical maintenance of the personal information protection legislation and laws and regulations were also set as important directions. It is pointed out that the establishment of rational judgment criteria and the legislative review to clarify it are necessary for the constantly controversial personal information definition regulation and the method of allowing anonymization information as the intermediate domain. In addition to the legislative review for the legitimate and non-invasive use of personal information, there is a need to improve the collective consent system for collecting personal information to differentiate the subject and to improve the legislation to ensure the effectiveness of the regulation on the movement of personal information between countries. In addition to the issues discussed in this article, there may be a number of challenges, but overall, the protection and use of personal information should be harmonized while maintaining the direction indicated above.

Consideration about Radiological Technology Student's Frequent Workers Exposure Dose Rate (방사선과 재학생의 수시출입자 방사선 피폭선량에 대한 고찰)

  • Park, Hoon-Hee
    • Journal of radiological science and technology
    • /
    • v.41 no.6
    • /
    • pp.573-580
    • /
    • 2018
  • The Nuclear Safety Commission amended the Nuclear Safety Act by strengthening the safety management system for the frequent workers to the level of radiation workers. And students entering radiation management zones for testing and practical purposes are subject to frequent workers. It is inevitable that this will incur additional costs. In this paper, the validity of the amendment to the Nuclear Safety Act was to be assessed in terms of radiation protection. Study subjects are from 2014 to 2016, among university students in Seong-nam Korea and comparisons for analyses were made taking into account variables that are differences in annual, practical types, on-class and clinical practice students exposure dose. The analysis showed that exposures between on-class and clinical practice received were less than the annual dose limit of 1 mSv for the public. Then, some alternatives that excluding from frequent workers during on-class practice or mitigating the frequent workers' safety regulation for only on-class frequent workers can be considered. Optimization is how rational is the reduction in exposure dose to the costs required. Therefore, the results are hardly considered for optimization. If the data accumulated, it could be considered that the revision of the act could be evaluated and improved.

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

A Study on the Planning of Smoking Space in Apartment for the Rights of Smokers and Nonsmokers - Using the shaft space of the unit plan - (흡연자와 비흡연자의 권리보호를 위한 공동주택 내의 흡연 공간 계획에 관한 연구 - 동 평면의 샤프트 공간을 활용하여 -)

  • Kim, Tae-Hun;Bae, Si-Hwa;Suh, Sang-Wook;Choi, Hyun-Chul
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.33 no.12
    • /
    • pp.105-112
    • /
    • 2017
  • Through various media, damage of both smoking and second-hand smoking has been recognized, and brought global scale of interest in antismoking. In Korea, government has tightened regulations of smoking in non-smoking zone since December, 1980, and after National Health Promotion Act in 1995, non-smoking zone has been gradually expanded. On the other hand, there were law suits to find those regulation towards smokers are either unconstitutional or not for 4 times. In this current state, people need smoking area to prevent second-hand smoking and to consider smokers in multi-unit dwelling. Main purpose of this research is to plan smoking spaces based on various typology of multi-dwelling plan for protection of both smokers and non-smokers' right. The research group collected and analyzed the smoking behaviors in various multi-unit dwelling types such as flat type, tower type, hybrid type and others. Based on those data, the group found three phenomena. First, there are internal regulations in multi-unit dwelling to make non-smoking zone based on National Health Promotion Act and resident representative meeting decision. Second, main smoking activities are occurring at major traffic line and entrances. Third, smoking inside of multi-unit dwelling complex causes second-hand smoking to residents live in $1^{st}$ floor and when they enter. Therefore, one can achieve both smokers' and non-smokers' protection of right by creating a designated smoking space near main entrances of multi-unit dwelling complex to consider smokers' and prevents second-hand smoking by using shaft space, which is in core space, to ventilate tobacco smoke through roof.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Awareness of Dental Hygiene Department Students regarding the Protection of Patients' Personal Information (환자 개인정보보호에 대한 치위생 전공 학생의 인식도)

  • Cho, Myung-Sook;Lee, Seong-Sook
    • Journal of Korean Dental Hygiene Science
    • /
    • v.4 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • Background: The purpose of the present study was to gather basic data necessary for developing an educational program regarding the protection of patients' personal information. Such a program would stress the importance of the protection of patients' personal information for dental hygiene students obtaining clinical practice. Methods: A self-reported questionnaire-based survey was conducted targeting dental hygiene undergraduates who were obtaining clinical practice in the capital region. A total of 543 questionnaires were included in the analysis. Results: The results of this study were as follows: 1) the average score for awareness of the Patient Privacy Act was 2.93 on a 4-point scale; 2) the average score for the recognition of the protection of patients' personal information was 3.22 on a 4-point scale; 3) the area-based perception of the protection of patient's personal information was 3.37 points for communication, which scored highest, followed-by the linked-work area at 3.27 points, the patient's information management at 3.22 points, and the direct dental hygiene work at 3.18 points; 4) with regard to awareness of the protection of patients' personal information according to general characteristics, the perception was higher in the advanced academic year (p < 0.01), in those who had education regarding the protection of patients' personal information at both the university and the clinical practice institution (p < .05), and in those with higher grades (p < 0.01). Conclusions: Based on the above findings, the development and application of an educational program to improve awareness of the protection of patients' personal information are considered to be necessary by both universities and clinical practice institutions.