• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.027 seconds

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

Factors Influencing Clinical Nurses' Practice of Personal Information Protection: Focusing on Knowledge of Personal Information Protection Law and Nursing Patient Advocacy (임상간호사의 개인정보보호 실천 영향요인: 개인정보보호법 지식, 옹호간호를 중심으로)

  • Kim, Dongeun;Park, Wanju
    • Journal of Korean Clinical Nursing Research
    • /
    • v.29 no.3
    • /
    • pp.261-270
    • /
    • 2023
  • Purpose: This study aimed to identify the influence of knowledge of personal information protection law and nursing patient advocacy on practice of personal information protection among nurses. Methods: The subjects were 130 nurses who have worked for six months or more in the ward of the tertiary or general hospitals. Data were collected from February 20 to March 3, 2023. Results: Factors influencing practice of personal information protection were acting as an advocate (β=.32, p=.004), environmental and educational influences (β=.21, p=.040), knowledge of personal information protection law (β=.19, p=.013) and clinical experience for five years or more but less than ten years (β=.17, p=.036). The regression model showed an explanatory power of 34.0%. Conclusion: Acting as an advocate has the most effect on practice of personal information protection. To promote practice of personal information protection for nurses, it is necessary to provide education related to privacy protection and encourage nursing patient advocacy.

A Study on the Legal Protection of Science and Technology Databases on the Copyright Law and Online Digital Contents Industry Development Law (저작권법과 온라인 디지털 콘텐츠 산업발전법에 의한 과학기술 데이터베이스 법적보호에 관한 연구)

  • Jang, Tae-Jong;Yoo, Jae-Young;Jeong, Eui-Seob
    • Journal of Information Management
    • /
    • v.36 no.2
    • /
    • pp.153-172
    • /
    • 2005
  • Currently the copyright law and the online digital contents industry development law aim to protect the producers of databases and digital contents. A report on databases in the United States describes that an additional protection of databases is needed as databases get more significant in terms of science and economy and become a key factor on Internet. At this moment, Korea does not recognize the importance of databases of science and technology when we look into any public or civil organizations. Accordingly this paper deals in depth with overall issues surrounding the regal protection of science and technology databases, key contents for science and technology databases protection by current laws, and additional protection problems. Considering that the industry of science and technology databases plays a pivotal role in the securement of national competitiveness, the preparation of legal measures to properly protect databases as one of the policies for the continuing development of databases should not be overlooked.

Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea (잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제)

  • Chung, Sang-Ki;Kim, Kyung-Yeol
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.

A Study on the Data Basic Law and the Personal Information Security Issue (데이터 기본법과 개인정보보호 이슈에 관한 고찰)

  • Kim, Jong-Won;Park, Jin-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.9-11
    • /
    • 2022
  • In order to sustain and revitalize the fourth industrial revolution and data economy, the world's first 'data basic law' has been enacted and implemented in Korea.,However, the law prioritizes the activation of data industry and the activation of data production, distribution and use that deals with the protection of data assets, so it can be applied and interpreted more than the Personal Information Protection Act or the Copyright Act.,In this paper, the main contents of the data basic law are examined and the personal information issue is considered.

  • PDF

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

International Conference of Consumer Protection Issues on B2C in APEC (APEC 국가의 전자상거래 소비자보호 현황과 개선방안)

  • Jun, Eui-Cheon;Kim, Jang-Ho;Kim, Seog-Min
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.27-46
    • /
    • 2002
  • Nowadays, the explosive evolvement of Internet. which is referred to as EC, has been prevailing. That has given the chance all of the world consumers to contact all of the world companies to enter into business relationship. But, electronic commerce laws have been established per conventional jurisdiction. some legal issues take place in the field of cross-border electronic commerce, including the governing law and competent courts. In this situations, it is gradually and widely required to lay down the internationally harmonized electronic commerce legal framework. Now, there are a lot of legal issues assumed in EC, in this study, we studied three precedence problems concerning B2C: Consumer Protection Law regarding B2C, Personal Information Protection Law in Private Sector regarding B2C, Web Site Trust Mark System.

  • PDF

About the Designation of Privacy and Information Protection Firm (정보보호전문업체 지정에 즈음하여)

  • Shin, Hoon
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.62-64
    • /
    • 2001
  • As of July 1. 2001, the Law of Information 8t Telecommunication Protection has been compulsory to audit protection status on national information and Telecommunications Infra facilities such as communication, electricity, waterworks, airport, railway, primary facilities of government and the first financial circles. In U.S. institutions, organizations and corporations in each field are trying to prepare for Safe Har-bor agreed on Internet privacy regulation between U.S. and Europe to be effective in 2003. The Safe Harbor was motl-vated by strict European standard. Other countries make privacy and information protection law according to their own interest. Therefore Korean technical experts have to develop the law responding to national interest and public welfare. Besides scientific Held, experts in the field of politic, economy and academy also have to work hard to develop the law.

  • PDF