• Title/Summary/Keyword: Information Breach

Search Result 126, Processing Time 0.028 seconds

Real Estate Double Contract and It's Prevention (부동산 이중매매와 그 예방)

  • Park, Jong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.325-332
    • /
    • 2009
  • The Korean real estate transaction makes a contract after the buying and selling person concerned agreed a business condition. As for vendee, business consists of the method that I issue documents before provision and money left over provision and the registration at the same time, and register a contract deposit in vendor. However, it latent for the real estate transaction various accidents such as fraud from a contract day to time to finish a real estate registration transfer, embezzlement, double contract by the breach of trust. Nevertheless vendee comes to match vendor by an asymmetry of the information one-sidedly to the front completing a registration transfer. I may prevent stellionate by the breach of trust of vendor if I use an ESCROW system in such a responsibility blank state.

A Study on Seeking an Alternative Approach to the Remedy for Breach of the Duty of Disclosure in English Marine Insurance Law (영국 해상보험법에서 고지의무 위반에 대한 구제의 대안에 관한 연구)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.24
    • /
    • pp.25-49
    • /
    • 2004
  • English contract law has traditionally taken the view that it is not the duty of the parties to a contract to give information voluntarily to each other. In English law, one of the principal distinctions between insurance contract law and general contract law is the existence of the duty of disclosure in insurance law. This article is, therefore, designed to analyse the scope or extent of the duty of disclosure and the remedy for breach of the duty in English marine insurance law. The main purpose of this article is also to seek the alternative remedy for the breach. The results of analysis are as following : First, the scope of the duty of disclosure is closely related to the test of materiality and the concept of a hypothetical prudent insurer. The assured is required to disclose only material circumstances subject to MIA 1906, s. 18(1). The test of materiality, which had caused a great deal of debate in English courts over 30 years, was finally settled by the House of Lords in Pan Atlantic and the House of Lords rejected the 'decisive influence' test and the 'increased risk' test, and the decision of the House of Lords is thought to accept the 'mere influence' test in subsequent case by the Court of Appeal. Secondly, an actual insurer is, in order to avoid contract, required to provide proof that he is induced to enter into the contract by reason of the non-disclosure of the assured. But this subjective test of actual inducement is somewhat meaningless in sense that English court takes the test of materiality as a starting point and assumes the presumption of inducement even in case of no clear proof on the inducement. Finally, MIA 1906, s. 18 provides expressly for the remedy of avoidance of the contract for breach of the duty of disclosure. This means rescission or retrospective avoidance of the entire contract, and the remedy is based upon a fairly crude 'all-or-nothing' approach. The remedy of rescission is too draconian from the point of view of the assured, because he can be deprived of all cover despite he is innocent perfectly. An inadvertent breach from an innocent mistake is as fatal as wilful concealment. What is, therefore, needed in English marine insurance law with respect to remedy for the breach is to introduce a more sophisticated or proportionate remedy ascertaining degrees of fault.

  • PDF

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches (온라인 정보 보호: 소셜 미디어 내 정보 유출 반응 분석)

  • Seungwoo Seo;Youngjoon Go;Hong Joo Lee
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study analyzed the changes in social media reactions of data subjects to major personal data breach incidents in South Korea from January 2014 to October 2022. We collected a total of 1,317 posts written on Naver Blogs within a week immediately following each incident. Applying the LDA topic modeling technique to these posts, five main topics were identified: personal data breaches, hacking, information technology, etc. Analyzing the temporal changes in topic distribution, we found that immediately after a data breach incident, the proportion of topics directly mentioning the incident was the highest. However, as time passed, the proportion of mentions related indirectly to the personal data breach increased. This suggests that the attention of data subjects shifts from the specific incident to related topics over time, and interest in personal data protection also decreases. The findings of this study imply a future need for research on the changes in privacy awareness of data subjects following personal data breach incidents.

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario (AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.809-820
    • /
    • 2016
  • The smart grid, a new open platform, is a core application for facilitating a creative economy in the era of the Internet of Things (IoT). Advanced Metering Infrastructure (AMI) is one of the components of the smart grid and a two-way communications infrastructure between the main utility operator and customer. The smart meter records consumption of electrical energy and communicates that information back to the utility for monitoring and billing. This paper investigates the impact of a cybersecurity attack on the smart meter. We analyze the cost to the smart grid in the case of a smart meter attack by authorized users based on a high risk scenario from NESCOR. Our findings could be used by policy makers and utility operators to create investment decision-making models for smart grid security.

A Study on the Legal Explanation and Cases of Remedies for Breach of Contract by the Buyer under CISG (CISG하에서 매수인의 계약위반에 대한 매도인의 구제수단에 관한 고찰 - CISG 제3편 제3장 제3절(제61조 내지 제65조)의 규정해석과 판결례를 중심으로 -)

  • Shim, Chong-Seok
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.231-251
    • /
    • 2012
  • The remedies available to a seller that has suffered a breach of contract by the buyer are addressed in Section III of Chapter III of Part III. The first provision in the section, 61, catalogues those remedies and authorizes an aggrieved seller to resort to them. The remaining provisions of the section address particular remedies or prerequisites to remedies. The subject matter of the current section remedies for breach of contract by the buyer obviously parallels that of Section III of Chapter II of Part III remedies for breach of contract by the seller. Many individual provisions within these sections form matched pairs. Thus 61, which catalogs the seller's remedies, which catalogs the buyer's remedies. Other provisions in the current section that have analogues in the section on buyer's remedies include 62, seller's right to require buyer's performance 63, seller's right to fix an additional period for buyer to perform and 64, seller right to avoid the contract. As was the case with the provisions on buyers' remedies, the articles governing sellers' remedies operate in conjunction with a variety of provisions outside the current section. Thus the seller's right to require performance by the buyer is subject to the rule in 28 relieving a court from the obligation to order specific performance in circumstances in which it would not do so under its own law. The authorization in 61 for a seller to claim damages for a buyer's breach operates in connection with 74-76, which specify how damages are to be measured. 49, stating when an aggrieved seller can avoid the contract, is part of a network of provisions that address avoidance, including the definition of fundamental breach, the requirement of notice of avoidance, provisions governing avoidance in certain special circumstances, measures of damages available only if the contract has been avoided and the provisions of Section V of Part III, Chapter V on effects of avoidance.

  • PDF

Disputes Patterns and Resolution Approaches in the Global Trading of Digital Goods (디지털상품의 국제거래 유형과 분쟁 해결방안)

  • Shim, Sang-Ryul;Jeong, Yoon-Say
    • Journal of Arbitration Studies
    • /
    • v.17 no.3
    • /
    • pp.145-167
    • /
    • 2007
  • Digital goods are defined as intangible and non-physical goods, composed of a combination of digital signals, electronically represented as 0 and 1. They are also called as digital products, electronic transmissions, information goods, digital contents, computer information, etc. Digital goods are now traded both domestically and internationally as well as on-line and off-line. Korean government revised the Basic Law on Foreign Trade to include digital goods and services as the scope of foreign trade in 2001. Trade volume of digital goods are increasing in Korea. The supply chains of digital goods from producing the components to selling globally to consumers are different from conventional physical goods. Mostly, digital goods are traded on the license basis rather than ownership contract. End User License Agreements(EULAs), such as shrink-wrap, click- wrap, or browser-wrap licenses are very popular in online transactions. Unlike conventional physical goods. the breach of license contract is closely linked with the infringement of intellectual property rights. Digitalized intellectual property is easy to copy and transmit in the cyber space. In cases of legal disputes from the breach of license contract, commercial arbitration or on-line alternative dispute resolutions(ADRs) are regarded as better approach to solve them rather than court sues. For promoting more secure and reliable international trade of digital goods. arbitration clauses should be included in most of license contracts.

  • PDF

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF

An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization (행렬 기반 랜덤화를 적용한 프라이버시 보호 기술의 안전성 및 정확성 분석)

  • Kang, Ju-Sung;An, A-Ron;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.53-68
    • /
    • 2008
  • We study on the practical privacy-preserving techniques by matrix-based randomization approach. We clearly examine the relationship between the two parameters associated with the measure of privacy breach and the condition number of matrix in order to achieve the optimal transition matrix. We propose a simple formula for efficiently calculating the inverse of transition matrix which are needed in the re-construction process of random substitution algorithm, and deduce some useful connections among standard error and another parameters by obtaining condition numbers according to norms of matrix and the expectation and variance of the transformed data. Moreover we give some experimental results about our theoretical expressions by implementing random substitution algorithm.

Legal examination of personal information disclosure system of administrative (행정상 인적사항공개제도에 대한 법률적 검토)

  • Ryu, Gi Hwan;Shin, Mi Ae
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.89-97
    • /
    • 2016
  • Disclosure of personal information to be carried out in one of the Administrative Publicity, Administrative agency as specific information about the person who has violated the obligation imposed by the law is an unspecified number people know is through the direct or Internet media it is to be disclosed in an unspecified number of people. This is, indirect sanctions so as to fulfill its obligations by the addition of psychological pressure that exposes the personal information of the fact that in breach of his obligations to the breach of duty and it has been an unspecified number of people know it is a means. However, publication of these personal information, infringement of the moral rights of the Constitution guarantees an individual, of course, not only a matter of law that the right to self-determination of the personal information, has continued also doubts for the effectiveness of the system. As a result, in this paper, to discuss legal issues with the disclosure of management personal information and its improvement measures, and expected to be able to take advantage of the efficient development of the future of personal information disclosure system.